Cited By
View all- Jha NTrevisan MLeonardi EMellia M(2024)Re-Identification Attacks against the Topics APIACM Transactions on the Web10.1145/367540018:3(1-24)Online publication date: 27-Jun-2024
- Ali MSnyder PKanich CHaddadi HLuo BLiao XXu JKirda ELie D(2024)Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript BundlesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690262(2192-2206)Online publication date: 2-Dec-2024
- Roongta RGreenstadt RQuek TGao DZhou JCardenas A(2024)From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser ExtensionsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657028(1753-1769)Online publication date: 1-Jul-2024
- Show More Cited By