What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wouter Joosen
Google Scholar
88
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Robust and reusable LINDDUN privacy threat knowledge.
Laurens Sion
Dimitri Van Landuyt
Kim Wuyts
Wouter Joosen
2025
conf/eurosp
From Cluttered to Clustered: Addressing Privacy Threat Explosion through Automated Clustering.
Jonah Bellemans
Mario Raciti
Dimitri Van Landuyt
Laurens Sion
Giampaolo Bella
Lieven Desmet
Wouter Joosen
2024
journals/compsec
A study of NoSQL query injection in Neo4j.
Dimitri Van Landuyt
Vincent Wijshoff
Wouter Joosen
2024
journals/tifs
A Novel Evaluation Framework for Biometric Security: Assessing Guessing Difficulty as a Metric.
Tim Van hamme
Giuseppe Garofalo
Enrique Argones-Rúa
Davy Preuveneers
Wouter Joosen
2024
conf/uss
Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps.
Karel Dhondt
Victor Le Pochat
Yana Dimova
Wouter Joosen
Stijn Volckaert
2024
conf/soups
Threat modeling state of practice in Dutch organizations.
Stef Verreydt
Koen Yskout
Laurens Sion
Wouter Joosen
2024
conf/esorics
Leveraging the Domain Experts: Specializing Privacy Threat Knowledge.
Laurens Sion
Dimitri Van Landuyt
Wouter Joosen
2024
conf/esorics
A DPIA Repository for Interdisciplinary Data Protection Research.
Laurens Sion
Dimitri Van Landuyt
Wouter Joosen
2023
journals/compsec
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections.
Davy Preuveneers
Wouter Joosen
2023
journals/popets
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web.
Yana Dimova
Tom van Goethem
Wouter Joosen
2023
conf/uss
Analyzing Cyber Security Research Practices through a Meta-Research Framework.
Victor Le Pochat
Wouter Joosen
2023
conf/uss
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs.
Gertjan Franken
Tom van Goethem
Lieven Desmet
Wouter Joosen
2023
conf/sp
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection.
Tom van Goethem
Iskander Sánchez-Rola
Wouter Joosen
2023
conf/eurosp
Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study.
Pieter Philippaerts
Davy Preuveneers
Wouter Joosen
2023
conf/eurosp
Effective Machine Learning-based Access Control Administration through Unlearning.
Javier Martínez Llamas
Davy Preuveneers
Wouter Joosen
2023
conf/eurosp
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors.
Tim Van hamme
Giuseppe Garofalo
Davy Preuveneers
Wouter Joosen
2023
conf/esorics
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers.
Davy Preuveneers
Javier Martínez Llamas
Irfan Bulut
Enrique Argones-Rúa
Pieter Verfaillie
Vince Demortier
Dimitri Surinx
Wouter Joosen
2023
conf/esorics
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations.
Shirin Kalantari
Pieter Philippaerts
Yana Dimova
Danny Hughes
Wouter Joosen
Bart De Decker
2022
journals/popets
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor.
Vera Rimmer
Theodor Schnitzler
Tom van Goethem
Abel Rodríguez Romero
Wouter Joosen
Katharina Kohls
2022
conf/ccs
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks.
Karel Dhondt
Victor Le Pochat
Alexios Voulimeneas
Wouter Joosen
Stijn Volckaert
2022
conf/uss
Helping hands: Measuring the impact of a large threat intelligence sharing community.
Xander Bouwman
Victor Le Pochat
Pawel Foremski
Tom van Goethem
Carlos Hernandez Gañán
Giovane C. M. Moura
Samaneh Tajalizadehkhoob
Wouter Joosen
Michel van Eeten
2022
conf/uss
An Audit of Facebook's Political Ad Policy Enforcement.
Victor Le Pochat
Laura Edelson
Tom van Goethem
Wouter Joosen
Damon McCoy
Tobias Lauinger
2022
conf/sp
Towards Improving the Deprecation Process of Web Features through Progressive Web Security.
Tom van Goethem
Wouter Joosen
2022
conf/eurosp
Captcha me if you can: Imitation Games with Reinforcement Learning.
Ilias Tsingenopoulos
Davy Preuveneers
Lieven Desmet
Wouter Joosen
2022
conf/eurosp
Applying Machine Learning to use security oracles: a case study in virus and malware detection.
Davy Preuveneers
Emma Lavens
Wouter Joosen
2022
conf/asiaccs
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model.
Tom van Goethem
Gertjan Franken
Iskander Sánchez-Rola
David Dworken
Wouter Joosen
2022
conf/cns
Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018.
Lisa Liu
Gints Engelen
Timothy M. Lynar
Daryl Essam
Wouter Joosen
2021
journals/tifs
On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication.
Tim Van hamme
Enrique Argones-Rúa
Davy Preuveneers
Wouter Joosen
2021
journals/popets
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion.
Yana Dimova
Gunes Acar
Lukasz Olejnik
Wouter Joosen
Tom van Goethem
2021
conf/sp
Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study.
Gints Engelen
Vera Rimmer
Wouter Joosen
2021
conf/sp
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems.
Gertjan Franken
Tom van Goethem
Wouter Joosen
2021
conf/eurosp
An Overview of Runtime Data Protection Enforcement Approaches.
Laurens Sion
Dimitri Van Landuyt
Wouter Joosen
2020
conf/uss
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Tom van Goethem
Christina Pöpper
Wouter Joosen
Mathy Vanhoef
2020
conf/eurosp
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment.
Laurens Sion
Dimitri Van Landuyt
Wouter Joosen
2020
conf/eurosp
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeling.
Kim Wuyts
Laurens Sion
Wouter Joosen
2020
conf/eurosp
A Siamese Adversarial Anonymizer for Data Minimization in Biometric Applications.
Giuseppe Garofalo
Tim Van hamme
Davy Preuveneers
Wouter Joosen
2020
conf/esorics
The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment.
Dimitri Van Landuyt
Laurens Sion
Pierre Dewitte
Wouter Joosen
2020
conf/ndss
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.
Victor Le Pochat
Tim Van hamme
Sourena Maroofi
Tom van Goethem
Davy Preuveneers
Andrzej Duda
Wouter Joosen
Maciej Korczynski
2019
conf/ccs
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites.
Tom van Goethem
Victor Le Pochat
Wouter Joosen
2019
conf/ccs
Purchased Fame: Exploring the Ecosystem of Private Blog Networks.
Tom van Goethem
Najmeh Miramirkhani
Wouter Joosen
Nick Nikiforakis
2019
conf/uss
Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking.
Victor Le Pochat
Tom van Goethem
Wouter Joosen
2019
conf/sp
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation.
Kim Wuyts
Laurens Sion
Dimitri Van Landuyt
Wouter Joosen
2019
conf/sp
A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting.
Victor Le Pochat
Tom van Goethem
Wouter Joosen
2019
conf/sp
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations.
Thomas Vissers
Peter Janssen
Wouter Joosen
Lieven Desmet
2019
conf/sp
Privacy Risk Assessment for Data Subject-Aware Threat Modeling.
Laurens Sion
Dimitri Van Landuyt
Kim Wuyts
Wouter Joosen
2019
conf/eurosp
Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices.
Davy Preuveneers
Wouter Joosen
2019
conf/eurosp
AutoAttacker: A reinforcement learning approach for black-box adversarial attacks.
Ilias Tsingenopoulos
Davy Preuveneers
Wouter Joosen
2019
conf/esorics
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications.
Dimitri Van Landuyt
Laurens Sion
Emiel Vandeloo
Wouter Joosen
2019
conf/ndss
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.
Victor Le Pochat
Tom van Goethem
Samaneh Tajalizadehkhoob
Maciej Korczynski
Wouter Joosen
2019
conf/acsac
Premadoma: an operational solution for DNS registries to prevent malicious domain registrations.
Jan Spooren
Thomas Vissers
Peter Janssen
Wouter Joosen
Lieven Desmet
2018
journals/istr
Managing distributed trust relationships for multi-modal authentication.
Tim Van hamme
Davy Preuveneers
Wouter Joosen
2018
conf/uss
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies.
Gertjan Franken
Tom van Goethem
Wouter Joosen
2018
conf/eurosp
Interaction-Based Privacy Threat Elicitation.
Laurens Sion
Kim Wuyts
Koen Yskout
Dimitri Van Landuyt
Wouter Joosen
2018
conf/ndss
Automated Website Fingerprinting through Deep Learning.
Vera Rimmer
Davy Preuveneers
Marc Juarez
Tom van Goethem
Wouter Joosen
2017
conf/ccs
The Wolf of Name Street: Hijacking Domains Through Their Nameservers.
Thomas Vissers
Timothy Barron
Tom van Goethem
Wouter Joosen
Nick Nikiforakis
2017
conf/ccs
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Samaneh Tajalizadehkhoob
Tom van Goethem
Maciej Korczynski
Arman Noroozian
Rainer Böhme
Tyler Moore
Wouter Joosen
Michel van Eeten
2016
conf/uss
Request and Conquer: Exposing Cross-Origin Resource Size.
Tom van Goethem
Mathy Vanhoef
Frank Piessens
Wouter Joosen
2016
conf/sec
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware.
Ping Chen
Christophe Huygens
Lieven Desmet
Wouter Joosen
2016
conf/ndss
It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services.
M. Zubair Rafique
Tom van Goethem
Wouter Joosen
Christophe Huygens
Nick Nikiforakis
2015
conf/ccs
The Clock is Still Ticking: Timing Attacks in the Modern Web.
Tom van Goethem
Wouter Joosen
Nick Nikiforakis
2015
conf/ccs
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers.
Thomas Vissers
Tom van Goethem
Wouter Joosen
Nick Nikiforakis
2015
conf/ndss
Parking Sensors: Analyzing and Detecting Parked Domains.
Thomas Vissers
Wouter Joosen
Nick Nikiforakis
2015
conf/ndss
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.
Pieter Agten
Wouter Joosen
Frank Piessens
Nick Nikiforakis
2015
conf/acsac
Entity-Based Access Control: supporting more expressive access control policies.
Jasper Bogaerts
Maarten Decat
Bert Lagaisse
Wouter Joosen
2015
conf/acsac
Scalable and Secure Concurrent Evaluation of History-based Access Control Policies.
Maarten Decat
Bert Lagaisse
Wouter Joosen
2014
conf/ccs
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Steven Van Acker
Nick Nikiforakis
Lieven Desmet
Frank Piessens
Wouter Joosen
2014
conf/ccs
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals.
Tom van Goethem
Frank Piessens
Wouter Joosen
Nick Nikiforakis
2014
conf/acsac
Network dialog minimization and network dialog diffing: two novel primitives for network security applications.
M. Zubair Rafique
Juan Caballero
Christophe Huygens
Wouter Joosen
2013
conf/ccs
TabShots: client-side detection of tabnabbing attacks.
Philippe De Ryck
Nick Nikiforakis
Lieven Desmet
Wouter Joosen
2013
conf/sp
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
Nick Nikiforakis
Alexandros Kapravelos
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2012
conf/ccs
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Steven Van Acker
Nick Nikiforakis
Lieven Desmet
Wouter Joosen
Frank Piessens
2012
conf/ccs
You are what you include: large-scale evaluation of remote javascript inclusions.
Nick Nikiforakis
Luca Invernizzi
Alexandros Kapravelos
Steven Van Acker
Wouter Joosen
Christopher Kruegel
Frank Piessens
Giovanni Vigna
2012
conf/sec
HyperForce: Hypervisor-enForced Execution of Security-Critical Code.
Francesco Gadaleta
Nick Nikiforakis
Jan Tobias Mühlberg
Wouter Joosen
2011
conf/esorics
Automatic and Precise Client-Side Protection against CSRF Attacks.
Philippe De Ryck
Lieven Desmet
Wouter Joosen
Frank Piessens
2011
conf/acsac
RIPE: runtime intrusion prevention evaluator.
John Wilander
Nick Nikiforakis
Yves Younan
Mariam Kamkar
Wouter Joosen
2011
conf/acsac
WebJail: least-privilege integration of third-party components in web mashups.
Steven Van Acker
Philippe De Ryck
Lieven Desmet
Frank Piessens
Wouter Joosen
2010
conf/ccs
PAriCheck: an efficient pointer arithmetic checker for C programs.
Yves Younan
Pieter Philippaerts
Lorenzo Cavallaro
R. Sekar
Frank Piessens
Wouter Joosen
2009
conf/ccs
Filter-resistant code injection on ARM.
Yves Younan
Pieter Philippaerts
Frank Piessens
Wouter Joosen
Sven Lachmund
Thomas Walter
2009
conf/ccs
Browser protection against cross-site request forgery.
Wim Maes
Thomas Heyman
Lieven Desmet
Wouter Joosen
2008
journals/istr
Security-by-contract on the .NET platform.
Lieven Desmet
Wouter Joosen
Fabio Massacci
Pieter Philippaerts
Frank Piessens
Ida Sri Rejeki Siahaan
Dries Vanoverberghe
2007
conf/ccs
A flexible security architecture to support third-party applications on mobile devices.
Lieven Desmet
Wouter Joosen
Fabio Massacci
Katsiaryna Naliuka
Pieter Philippaerts
Frank Piessens
Dries Vanoverberghe
2007
conf/sec
A Credential-Based System for the Anonymous Delegation of Rights.
Liesje Demuynck
Bart De Decker
Wouter Joosen
2006
conf/ccs
Towards a measuring framework for security properties of software.
Riccardo Scandariato
Bart De Win
Wouter Joosen
2006
conf/ccs
Bridging the gap between web application firewalls and web applications.
Lieven Desmet
Frank Piessens
Wouter Joosen
Pierre Verbaeten
2006
conf/icics
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic.
Yves Younan
Wouter Joosen
Frank Piessens
2006
conf/acsac
Extended Protection against Stack Smashing Attacks without Performance Loss.
Yves Younan
Davide Pozza
Frank Piessens
Wouter Joosen
2005
conf/acsac
Uniform Application-level Access Control Enforcement of Organizationwide Policies.
Tine Verhanneman
Frank Piessens
Bart De Win
Wouter Joosen
2000
conf/sec
A Security Architecture for Electronic Commerce Applications.
Bart De Win
Jan Van den Bergh
Frank Matthijs
Bart De Decker
Wouter Joosen
Coauthors
Abel Rodríguez Romero
(1)
Alexandros Kapravelos
(2)
Alexios Voulimeneas
(1)
Andrzej Duda
(1)
Arman Noroozian
(1)
Bart De Decker
(3)
Bart De Win
(3)
Bert Lagaisse
(2)
Carlos Hernandez Gañán
(1)
Christina Pöpper
(1)
Christophe Huygens
(3)
Christopher Kruegel
(2)
Damon McCoy
(1)
Danny Hughes
(1)
Daryl Essam
(1)
David Dworken
(1)
Davide Pozza
(1)
Davy Preuveneers
(15)
Dimitri Surinx
(1)
Dimitri Van Landuyt
(12)
Dries Vanoverberghe
(2)
Emiel Vandeloo
(1)
Emma Lavens
(1)
Enrique Argones-Rúa
(3)
Fabio Massacci
(2)
Francesco Gadaleta
(1)
Frank Matthijs
(1)
Frank Piessens
(17)
Gertjan Franken
(4)
Giampaolo Bella
(1)
Gints Engelen
(2)
Giovane C. M. Moura
(1)
Giovanni Vigna
(2)
Giuseppe Garofalo
(3)
Gunes Acar
(1)
Ida Sri Rejeki Siahaan
(1)
Ilias Tsingenopoulos
(2)
Irfan Bulut
(1)
Iskander Sánchez-Rola
(2)
Jan Spooren
(1)
Jan Tobias Mühlberg
(1)
Jan Van den Bergh
(1)
Jasper Bogaerts
(1)
Javier Martínez Llamas
(2)
John Wilander
(1)
Jonah Bellemans
(1)
Juan Caballero
(1)
Karel Dhondt
(2)
Katharina Kohls
(1)
Katsiaryna Naliuka
(1)
Kim Wuyts
(5)
Koen Yskout
(2)
Laura Edelson
(1)
Laurens Sion
(13)
Liesje Demuynck
(1)
Lieven Desmet
(15)
Lisa Liu
(1)
Lorenzo Cavallaro
(1)
Luca Invernizzi
(1)
Lukasz Olejnik
(1)
M. Zubair Rafique
(2)
Maarten Decat
(2)
Maciej Korczynski
(3)
Marc Juarez
(1)
Mariam Kamkar
(1)
Mario Raciti
(1)
Mathy Vanhoef
(2)
Michel van Eeten
(2)
Najmeh Miramirkhani
(1)
Nick Nikiforakis
(15)
Pawel Foremski
(1)
Peter Janssen
(2)
Philippe De Ryck
(3)
Pierre Dewitte
(1)
Pierre Verbaeten
(1)
Pieter Agten
(1)
Pieter Philippaerts
(6)
Pieter Verfaillie
(1)
Ping Chen
(1)
R. Sekar
(1)
Rainer Böhme
(1)
Riccardo Scandariato
(1)
Samaneh Tajalizadehkhoob
(3)
Shirin Kalantari
(1)
Sourena Maroofi
(1)
Stef Verreydt
(1)
Steven Van Acker
(4)
Stijn Volckaert
(2)
Sven Lachmund
(1)
Theodor Schnitzler
(1)
Thomas Heyman
(1)
Thomas Vissers
(5)
Thomas Walter
(1)
Tim Van hamme
(6)
Timothy Barron
(1)
Timothy M. Lynar
(1)
Tine Verhanneman
(1)
Tobias Lauinger
(1)
Tom van Goethem
(26)
Tyler Moore
(1)
Vera Rimmer
(3)
Victor Le Pochat
(10)
Vince Demortier
(1)
Vincent Wijshoff
(1)
Wim Maes
(1)
Wouter Joosen
(88)
Xander Bouwman
(1)
Yana Dimova
(4)
Yves Younan
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to