Follow
Tom Van Goethem
Tom Van Goethem
KU Leuven & Google
Verified email at cs.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation
V Le Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, ...
Proceedings of the 26th Network and Distributed System Security Symposium …, 2019
7402019
Automated Website Fingerprinting through Deep Learning
V Rimmer, D Preuveneers, M Juarez, T Van Goethem, W Joosen
Proceedings of the 25th Network and Distributed System Security Symposium …, 2018
4282018
The clock is still ticking: Timing attacks in the modern web
T Van Goethem, W Joosen, N Nikiforakis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1192015
It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services.
MZ Rafique, T Van Goethem, W Joosen, C Huygens, N Nikiforakis
NDSS, 2016
832016
Accelerometer-based device fingerprinting for multi-factor mobile authentication
T Van Goethem, W Scheepers, D Preuveneers, W Joosen
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
792016
Large-scale security analysis of the web: Challenges and findings
T Van Goethem, P Chen, N Nikiforakis, L Desmet, W Joosen
Proceedings of the 7th International Conference on Trust & Trustworthy …, 2014
792014
Maneuvering around clouds: Bypassing cloud-based security providers
T Vissers, T Van Goethem, W Joosen, N Nikiforakis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
772015
Who left open the cookie jar? A comprehensive evaluation of third-party cookie policies
G Franken, T Van Goethem, W Joosen
27th USENIX Security Symposium (USENIX Security 18), 151-168, 2018
642018
The wolf of name street: Hijacking domains through their nameservers
T Vissers, T Barron, T Van Goethem, W Joosen, N Nikiforakis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
562017
Herding vulnerable cats: a statistical approach to disentangle joint responsibility for web security in shared hosting
S Tajalizadehkhoob, T Van Goethem, M Korczyński, A Noroozian, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
512017
The cname of the game: Large-scale analysis of dns-based tracking evasion
Y Dimova, G Acar, L Olejnik, W Joosen, T Van Goethem
arXiv preprint arXiv:2102.09301, 2021
482021
Request and conquer: Exposing cross-origin resource size
T Van Goethem, M Vanhoef, F Piessens, W Joosen
25th USENIX Security Symposium (USENIX Security 16), 447-462, 2016
432016
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections
T Van Goethem, C Pöpper, W Joosen, M Vanhoef
29th USENIX Security Symposium (USENIX Security 20), 1985-2002, 2020
412020
An audit of Facebook's political ad policy enforcement
V Le Pochat, L Edelson, T Van Goethem, W Joosen, D McCoy, T Lauinger
31st USENIX Security Symposium (USENIX Security 22), 607-624, 2022
382022
HEIST: HTTP Encrypted Information can be Stolen through TCP-windows
M Vanhoef, T Van Goethem
Black Hat USA, 2016
332016
Funny accents: Exploring genuine interest in internationalized domain names
V Le Pochat, T Van Goethem, W Joosen
Passive and Active Measurement: 20th International Conference, PAM 2019 …, 2019
272019
Helping hands: Measuring the impact of a large threat intelligence sharing community
X Bouwman, V Le Pochat, P Foremski, T Van Goethem, CH Gañán, ...
31st USENIX Security Symposium (USENIX Security 22), 1149-1165, 2022
242022
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.
V Le Pochat, Tim Van hamme, S Maroofi, T Van Goethem, D Preuveneers, ...
NDSS, 2020
232020
Evaluating the long-term effects of parameters on the characteristics of the tranco top sites ranking
V Le Pochat, T Van Goethem, W Joosen
12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019
212019
Exposing cookie policy flaws through an extensive evaluation of browsers and their extensions
G Franken, T Van Goethem, W Joosen
IEEE Security & Privacy 17 (4), 25-34, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20