What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ben Stock
Google Scholar
47
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
403 Forbidden? Ethically Evaluating Broken Access Control in the Wild.
Saiid El Hajj Chehade
Florian Hantke
Ben Stock
2025
conf/ndss
The (Un)usual Suspects - Studying Reasons for Lacking Updates in WordPress.
Maria Hellenthal
Lena Gotsche
Rafael Mrowczynski
Sarah Kugel
Michael Schilling
Ben Stock
2025
conf/asiaccs
Open Access Alert: Studying the Privacy Risks in Android WebView's Web Permission Enforcement.
Trung Tin Nguyen
Ben Stock
2025
conf/uss
Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements.
Florian Hantke
Peter Snyder
Hamed Haddadi
Ben Stock
2025
conf/uss
Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers.
Saiid El Hajj Chehade
Ben Stock
Carmela Troncoso
2025
conf/uss
"I have no idea how to make it safer": Studying Security and Privacy Mindsets of Browser Extension Developers.
Shubham Agarwal
Rafael Mrowczynski
Maria Hellenthal
Ben Stock
2024
conf/ccs
Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions.
Shubham Agarwal
Aurore Fass
Ben Stock
2024
conf/uss
Trust Me If You Can - How Usable Is Trusted Types In Practice?
Sebastian Roth
Lea Gröber
Philipp Baus
Katharina Krombholz
Ben Stock
2024
conf/sp
Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy Research.
Florian Hantke
Sebastian Roth
Rafael Mrowczynski
Christine Utz
Ben Stock
2024
conf/sp
To Auth or Not To Auth? A Comparative Analysis of the Pre- and Post-Login Security Landscape.
Jannis Rautenstrauch
Metodi Mitkov
Thomas Helbrecht
Lorenz Hetterich
Ben Stock
2024
conf/asiaccs
Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact.
Jannis Rautenstrauch
Ben Stock
2023
journals/popets
Comparing Large-Scale Privacy and Security Notifications.
Christine Utz
Matthias Michels
Martin Degeling
Ninja Marnau
Ben Stock
2023
conf/ccs
You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements.
Florian Hantke
Stefano Calzavara
Moritz Wilhelm
Alvise Rabitti
Ben Stock
2023
conf/uss
Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild.
Birk Blechschmidt
Ben Stock
2023
conf/sp
The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.
Jannis Rautenstrauch
Giancarlo Pellegrino
Ben Stock
2023
conf/ndss
DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing.
Seongil Wi
Trung Tin Nguyen
Jihwan Kim
Ben Stock
Sooel Son
2022
conf/ccs
Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
Trung Tin Nguyen
Michael Backes
Ben Stock
2022
conf/uss
The Security Lottery: Measuring Client-Side Web Security Inconsistencies.
Sebastian Roth
Stefano Calzavara
Moritz Wilhelm
Alvise Rabitti
Ben Stock
2022
conf/sp
To hash or not to hash: A security assessment of CSP's unsafe-hashes expression.
Peter Stolz
Sebastian Roth
Ben Stock
2022
conf/eurosp
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions.
David Klein
Thomas Barber
Souphiane Bensalim
Ben Stock
Martin Johns
2021
conf/ccs
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP.
Sebastian Roth
Lea Gröber
Michael Backes
Katharina Krombholz
Ben Stock
2021
conf/ccs
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale.
Aurore Fass
Dolière Francis Somé
Michael Backes
Ben Stock
2021
conf/uss
Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps.
Trung Tin Nguyen
Michael Backes
Ninja Marnau
Ben Stock
2021
conf/asiaccs
Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication.
Gordon Meiser
Pierre Laperdrix
Ben Stock
2021
conf/ndss
Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI.
Marius Steffens
Marius Musch
Martin Johns
Ben Stock
2021
conf/ndss
Reining in the Web's Inconsistencies with Site Policy.
Stefano Calzavara
Tobias Urban
Dennis Tatang
Marius Steffens
Ben Stock
2020
conf/ccs
Assessing the Impact of Script Gadgets on CSP at Scale.
Sebastian Roth
Michael Backes
Ben Stock
2020
conf/ccs
PMForce: Systematically Analyzing postMessage Handlers at Scale.
Marius Steffens
Ben Stock
2020
conf/uss
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
Stefano Calzavara
Sebastian Roth
Alvise Rabitti
Michael Backes
Ben Stock
2020
conf/eurosp
SecWeb 2020 Preface.
Stefano Calzavara
Ben Stock
2020
conf/ndss
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
Sebastian Roth
Timothy Barron
Stefano Calzavara
Nick Nikiforakis
Ben Stock
2019
conf/ccs
ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices.
Marius Musch
Marius Steffens
Sebastian Roth
Ben Stock
Martin Johns
2019
conf/ccs
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
Aurore Fass
Michael Backes
Ben Stock
2019
conf/ndss
Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
Marius Steffens
Christian Rossow
Martin Johns
Ben Stock
2019
conf/acsac
JStap: a static pre-filter for malicious JavaScript detection.
Aurore Fass
Michael Backes
Ben Stock
2018
conf/ndss
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications.
Ben Stock
Giancarlo Pellegrino
Frank Li
Michael Backes
Christian Rossow
2017
conf/uss
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
Ben Stock
Martin Johns
Marius Steffens
Michael Backes
2017
conf/eurosp
Efficient and Flexible Discovery of PHP Application Vulnerabilities.
Michael Backes
Konrad Rieck
Malte Skoruppa
Ben Stock
Fabian Yamaguchi
2016
conf/ccs
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
Ben Stock
Giancarlo Pellegrino
Christian Rossow
Martin Johns
Michael Backes
2016
conf/uss
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Ben Stock
Giancarlo Pellegrino
Christian Rossow
Martin Johns
Michael Backes
2016
conf/dsn
Kizzle: A Signature Compiler for Detecting Exploit Kits.
Ben Stock
Benjamin Livshits
Benjamin G. Zorn
2015
conf/ccs
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting.
Ben Stock
Stephan Pfistner
Bernd Kaiser
Sebastian Lekies
Martin Johns
2015
conf/uss
The Unexpected Dangers of Dynamic JavaScript.
Sebastian Lekies
Ben Stock
Martin Wentzel
Martin Johns
2014
conf/ccs
Protecting users against XSS-based password manager abuse.
Ben Stock
Martin Johns
2014
conf/uss
Precise Client-side Protection against DOM-based Cross-Site Scripting.
Ben Stock
Sebastian Lekies
Tobias Mueller
Patrick Spiegel
Martin Johns
2013
conf/ccs
25 million flows later: large-scale detection of DOM-based XSS.
Sebastian Lekies
Ben Stock
Martin Johns
2013
conf/uss
Eradicating DNS Rebinding with the Extended Same-origin Policy.
Martin Johns
Sebastian Lekies
Ben Stock
Coauthors
Alvise Rabitti
(3)
Aurore Fass
(4)
Ben Stock
(47)
Benjamin G. Zorn
(1)
Benjamin Livshits
(1)
Bernd Kaiser
(1)
Birk Blechschmidt
(1)
Carmela Troncoso
(1)
Christian Rossow
(4)
Christine Utz
(2)
David Klein
(1)
Dennis Tatang
(1)
Dolière Francis Somé
(1)
Fabian Yamaguchi
(1)
Florian Hantke
(4)
Frank Li
(1)
Giancarlo Pellegrino
(4)
Gordon Meiser
(1)
Hamed Haddadi
(1)
Jannis Rautenstrauch
(3)
Jihwan Kim
(1)
Katharina Krombholz
(2)
Konrad Rieck
(1)
Lea Gröber
(2)
Lena Gotsche
(1)
Lorenz Hetterich
(1)
Malte Skoruppa
(1)
Maria Hellenthal
(2)
Marius Musch
(2)
Marius Steffens
(6)
Martin Degeling
(1)
Martin Johns
(13)
Martin Wentzel
(1)
Matthias Michels
(1)
Metodi Mitkov
(1)
Michael Backes
(13)
Michael Schilling
(1)
Moritz Wilhelm
(2)
Nick Nikiforakis
(1)
Ninja Marnau
(2)
Patrick Spiegel
(1)
Peter Snyder
(1)
Peter Stolz
(1)
Philipp Baus
(1)
Pierre Laperdrix
(1)
Rafael Mrowczynski
(3)
Saiid El Hajj Chehade
(2)
Sarah Kugel
(1)
Sebastian Lekies
(5)
Sebastian Roth
(9)
SeongIl Wi
(1)
Shubham Agarwal
(2)
Sooel Son
(1)
Souphiane Bensalim
(1)
Stefano Calzavara
(6)
Stephan Pfistner
(1)
Thomas Barber
(1)
Thomas Helbrecht
(1)
Timothy Barron
(1)
Tobias Mueller
(1)
Tobias Urban
(1)
Trung Tin Nguyen
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to