Theme Selector
Filter by
No Results Found, Please Adjust Your Search
security
Protecting accounts from credential stuffing with password breach alerting
Usenix Security 2019
anti-abuse
Deconstructing the Phishing Campaigns that Target Gmail Users
Black Hat USA 2019
security
Password checkup: from 0 to 650, 000 users in 20 days
Mar 2019
privacy
Understanding how people use private browsing
Jul 2017
web security
Understanding the prevalence of web traffic interception
Jun 2017
web security
Learn web security with Google
IO 2016
web security
The Security Impact of HTTPS Interception
NDSS 2017
anti-abuse
Picasso: Lightweight Device Class Fingerprinting for Web Clients
SPSM 2016
web security
How google helps 600,000 webmasters re-secure their hacked sites every year
Jun 2016
anti-abuse
Cloak of visibility: detecting when machines browse a different web
S&P 2016
web security
Remedying web hijacking notification effectiveness and webmaster comprehension
WWW 2016
hacking
The dark side of online poker or the commoditization and weaponization of big data and espionage
Feb 2016
anti-abuse
How phishing works
Aug 2015
anti-abuse
Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google
WWW 2015
anti-abuse
Ad injection at scale: assessing deceptive advertisement modifications
S&P 2015
web security
19.5% of https sites trigger browser warning as they use sha-1 signed certificates
Jan 2015
web security
The end is nigh: generic solving of text-based captchas
WOOT 2014
user experience
Meaning matters: why google switched to numeric captchas
Apr 2014
anti-abuse
When a porn site masquerades as the apple app store
May 2013
web security
Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities
Mar 2013
web security
Sessionjuggler secure web login from an untrusted terminal using session hijacking
WWW 2012
web security
The Art of Breaking and Designing CAPTCHAS
RSA 2012
web security
How we broke the nucaptcha video scheme and what we propose to fix it
Feb 2012
anti-abuse
What phishing sites look like ? (study)
Nov 2011
web security
Evolution of the https lock icon (infographic)
Nov 2011
web security
Text-based captcha strengths and weaknesses
CCS 2011
web security
Reclaiming the blogosphere talkback a secure linkback protocol for weblogs
ESORICS 2011
web security
Towards secure embedded web interfaces
Usenix Security 2011
privacy
Using the microsoft geolocalization api to retrace where a windows laptop has been
Jul 2011
web security
Tracking users that block cookies with a http redirect
Jul 2011
web security
The failure of noise-based non-continuous audio captchas
S&P 2011
web security
Five surprising captcha schemes
Mar 2011
hacking
Identifying internet explorer user with a smb query
Aug 2010
privacy
An analysis of private browsing modes in modern browsers
Usenix Security 2010
hacking
Framing attacks on smartphones and dumb routers: social sites tap-jacking and geo-localization attacks
WOOT 2010
web security
Webseclab security education workbench
CEST 2010
hacking
Bad memories
Black Hat & Defcon 2010
web security
The emergence of cross channel scripting
CACM 2010
web security
Busting frame busting a study of clickjacking vulnerabilities on popular sites
W2SP 2010
web security
How good are humans at solving captchas a large scale evaluation
S&P 2010
web security
State of the art automated black-box web application vulnerability testing
S&P 2010
web security
Trackback spam abuse and prevention
CCSW 2009
web security
Xcs cross channel scripting and its impact on web applications
CCS 2009
web security
Decaptcha breaking 75% of ebay audio captchas
WOOT 2009
hacking
Embedded management interfaces emerging massive insecurity
Black Hat 2009