What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tom van Goethem
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/soups
Shiny Shells, Rusty Cores: A Crowdsourced Security Evaluation of Integrated Web Browsers.
Gertjan Franken
Pieter Claeys
Tom van Goethem
Lieven Desmet
2023
journals/popets
Everybody's Looking for SSOmething: A large-scale evaluation on the privacy of OAuth authentication on the web.
Yana Dimova
Tom van Goethem
Wouter Joosen
2023
conf/uss
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs.
Gertjan Franken
Tom van Goethem
Lieven Desmet
Wouter Joosen
2023
conf/sp
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection.
Tom van Goethem
Iskander Sánchez-Rola
Wouter Joosen
2023
conf/esorics
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers.
Vik Vanderlinden
Tom van Goethem
Mathy Vanhoef
2022
journals/popets
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor.
Vera Rimmer
Theodor Schnitzler
Tom van Goethem
Abel Rodríguez Romero
Wouter Joosen
Katharina Kohls
2022
conf/uss
Helping hands: Measuring the impact of a large threat intelligence sharing community.
Xander Bouwman
Victor Le Pochat
Pawel Foremski
Tom van Goethem
Carlos Hernandez Gañán
Giovane C. M. Moura
Samaneh Tajalizadehkhoob
Wouter Joosen
Michel van Eeten
2022
conf/uss
An Audit of Facebook's Political Ad Policy Enforcement.
Victor Le Pochat
Laura Edelson
Tom van Goethem
Wouter Joosen
Damon McCoy
Tobias Lauinger
2022
conf/sp
Towards Improving the Deprecation Process of Web Features through Progressive Web Security.
Tom van Goethem
Wouter Joosen
2022
conf/asiaccs
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model.
Tom van Goethem
Gertjan Franken
Iskander Sánchez-Rola
David Dworken
Wouter Joosen
2021
journals/popets
The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion.
Yana Dimova
Gunes Acar
Lukasz Olejnik
Wouter Joosen
Tom van Goethem
2021
conf/sp
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems.
Gertjan Franken
Tom van Goethem
Wouter Joosen
2020
conf/uss
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Tom van Goethem
Christina Pöpper
Wouter Joosen
Mathy Vanhoef
2020
conf/ndss
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.
Victor Le Pochat
Tim Van hamme
Sourena Maroofi
Tom van Goethem
Davy Preuveneers
Andrzej Duda
Wouter Joosen
Maciej Korczynski
2019
conf/ccs
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites.
Tom van Goethem
Victor Le Pochat
Wouter Joosen
2019
conf/ccs
Purchased Fame: Exploring the Ecosystem of Private Blog Networks.
Tom van Goethem
Najmeh Miramirkhani
Wouter Joosen
Nick Nikiforakis
2019
conf/uss
Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites Ranking.
Victor Le Pochat
Tom van Goethem
Wouter Joosen
2019
conf/sp
A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting.
Victor Le Pochat
Tom van Goethem
Wouter Joosen
2019
conf/ndss
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.
Victor Le Pochat
Tom van Goethem
Samaneh Tajalizadehkhoob
Maciej Korczynski
Wouter Joosen
2018
conf/uss
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies.
Gertjan Franken
Tom van Goethem
Wouter Joosen
2018
conf/ndss
Automated Website Fingerprinting through Deep Learning.
Vera Rimmer
Davy Preuveneers
Marc Juarez
Tom van Goethem
Wouter Joosen
2017
conf/ccs
The Wolf of Name Street: Hijacking Domains Through Their Nameservers.
Thomas Vissers
Timothy Barron
Tom van Goethem
Wouter Joosen
Nick Nikiforakis
2017
conf/ccs
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Samaneh Tajalizadehkhoob
Tom van Goethem
Maciej Korczynski
Arman Noroozian
Rainer Böhme
Tyler Moore
Wouter Joosen
Michel van Eeten
2016
conf/uss
Request and Conquer: Exposing Cross-Origin Resource Size.
Tom van Goethem
Mathy Vanhoef
Frank Piessens
Wouter Joosen
2016
conf/ndss
It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services.
M. Zubair Rafique
Tom van Goethem
Wouter Joosen
Christophe Huygens
Nick Nikiforakis
2015
conf/ccs
The Clock is Still Ticking: Timing Attacks in the Modern Web.
Tom van Goethem
Wouter Joosen
Nick Nikiforakis
2015
conf/ccs
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers.
Thomas Vissers
Tom van Goethem
Wouter Joosen
Nick Nikiforakis
2014
conf/ccs
Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals.
Tom van Goethem
Frank Piessens
Wouter Joosen
Nick Nikiforakis
Coauthors
Abel Rodríguez Romero
(1)
Andrzej Duda
(1)
Arman Noroozian
(1)
Carlos Hernandez Gañán
(1)
Christina Pöpper
(1)
Christophe Huygens
(1)
Damon McCoy
(1)
David Dworken
(1)
Davy Preuveneers
(2)
Frank Piessens
(2)
Gertjan Franken
(5)
Giovane C. M. Moura
(1)
Gunes Acar
(1)
Iskander Sánchez-Rola
(2)
Katharina Kohls
(1)
Laura Edelson
(1)
Lieven Desmet
(2)
Lukasz Olejnik
(1)
M. Zubair Rafique
(1)
Maciej Korczynski
(3)
Marc Juarez
(1)
Mathy Vanhoef
(3)
Michel van Eeten
(2)
Najmeh Miramirkhani
(1)
Nick Nikiforakis
(6)
Pawel Foremski
(1)
Pieter Claeys
(1)
Rainer Böhme
(1)
Samaneh Tajalizadehkhoob
(3)
Sourena Maroofi
(1)
Theodor Schnitzler
(1)
Thomas Vissers
(2)
Tim Van hamme
(1)
Timothy Barron
(1)
Tobias Lauinger
(1)
Tom van Goethem
(28)
Tyler Moore
(1)
Vera Rimmer
(2)
Victor Le Pochat
(7)
Vik Vanderlinden
(1)
Wouter Joosen
(26)
Xander Bouwman
(1)
Yana Dimova
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to