default search action
Steven Van Acker
Person information
- affiliation: Chalmers University of Technology, Gothenburg, Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c16]Alexander Sjösten, Steven Van Acker, Pablo Picazo-Sanchez, Andrei Sabelfeld:
Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks. NDSS 2019 - 2018
- [c15]Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld:
Raising the Bar: Evaluating Origin-wide Security Manifests. ACSAC 2018: 342-354 - 2017
- [c14]Alexander Sjösten, Steven Van Acker, Andrei Sabelfeld:
Discovering Browser Extensions via Web Accessible Resources. CODASPY 2017: 329-336 - [c13]Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld:
Measuring login webpage security. SAC 2017: 1753-1760 - 2016
- [c12]Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld:
Data Exfiltration in the Face of CSP. AsiaCCS 2016: 853-864 - [c11]Steven Van Acker, Andrei Sabelfeld:
JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript. FOSAD 2016: 32-86 - 2015
- [b1]Steven Van Acker:
Isolating and Restricting Client-Side JavaScript ; Isoleren en beperken van JavaScript aan de cliëntzijde. Katholieke Universiteit Leuven, Belgium, 2015 - [c10]Steven Van Acker, Daniel Hausknecht, Wouter Joosen, Andrei Sabelfeld:
Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right. CODASPY 2015: 253-262 - 2014
- [c9]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. AsiaCCS 2014: 525-530 - 2013
- [c8]Nick Nikiforakis, Steven Van Acker, Wannes Meert, Lieven Desmet, Frank Piessens, Wouter Joosen:
Bitsquatting: exploiting bit-flips for fun, or profit? WWW 2013: 989-998 - 2012
- [c7]Pieter Agten, Steven Van Acker, Yoran Brondsema, Phu H. Phung, Lieven Desmet, Frank Piessens:
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications. ACSAC 2012: 1-10 - [c6]Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens:
FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. AsiaCCS 2012: 12-13 - [c5]Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna:
You are what you include: large-scale evaluation of remote javascript inclusions. CCS 2012: 736-747 - [c4]Nick Nikiforakis, Steven Van Acker, Frank Piessens, Wouter Joosen:
Exploring the Ecosystem of Referrer-Anonymizing Services. Privacy Enhancing Technologies 2012: 259-278 - 2011
- [c3]Steven Van Acker, Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
WebJail: least-privilege integration of third-party components in web mashups. ACSAC 2011: 307-316 - [c2]Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti:
Exposing the Lack of Privacy in File Hosting Services. LEET 2011 - 2010
- [c1]Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, Frank Piessens:
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows. ICISS 2010: 156-170
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint