Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing P Snyder, P Doerfler, C Kanich, D McCoy ACM Internet Measurement Conference, 2017 | 37 | 2017 |
Most websites don't need to vibrate: A cost-benefit approach to improving browser security P Snyder, C Taylor, C Kanich Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 35 | 2017 |
Browser Feature Usage on The Modern Web P Snyder, L Ansari, C Taylor, C Kanich Proceedings of the 2016 ACM on Internet Measurement Conference, 97-110, 2016 | 34 | 2016 |
No Please, After You: Detecting Fraud in Affiliate Marketing Networks. P Snyder, C Kanich Workshop on the Economics of Information Security, 2015 | 26 | 2015 |
Adgraph: A graph-based approach to ad and tracker blocking U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq 2020 IEEE Symposium on Security and Privacy (SP), 763-776, 2020 | 25 | 2020 |
Who filters the filters: Understanding the growth, usefulness and efficiency of crowdsourced ad blocking P Snyder, A Vastel, B Livshits SIGMETRICS, 2020 | 25* | 2020 |
I Saw Images I Didn't Even Know I Had JW Clarky, P Snyder, D Mccoyy, C Kanich Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015 | 21 | 2015 |
Adgraph: A machine learning approach to automatic and effective adblocking U Iqbal, Z Shafiq, P Snyder, S Zhu, Z Qian, B Livshits arXiv preprint arXiv:1805.09155 41, 2018 | 19 | 2018 |
Characterizing Fraud and Its Ramifications in Affiliate Marketing Networks P Snyder, C Kanich Journal of Cybersecurity 2 (1), 71-81, 2016 | 11 | 2016 |
Cloudsweeper: Enabling Data-centric Document Management for Secure Cloud Archives P Snyder, C Kanich Proceedings of the 2013 ACM Workshop on Cloud Computing Security, 47-54, 2013 | 10 | 2013 |
Yao˘s Garbled Circuits: Recent Directions and Implementations P Snyder | 7 | 2014 |
The blind men and the internet: Multi-vantage point web measurements J Jueckstock, S Sarker, P Snyder, P Papadopoulos, M Varvello, B Livshits, ... arXiv preprint arXiv:1905.08767, 2019 | 6 | 2019 |
Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures Q Chen, P Snyder, B Livshits, A Kapravelos Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2021 | 5* | 2021 |
Speedreader: Reader mode made fast and private M Ghasemisharif, P Snyder, A Aucinas, B Livshits The World Wide Web Conference, 526-537, 2019 | 5 | 2019 |
Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls P Papadopoulos, P Snyder, D Athanasakis, B Livshits Proceedings of The Web Conference 2020, 1433-1444, 2020 | 3 | 2020 |
Filter List Generation for Underserved Regions A Sjösten, P Snyder, A Pastor, P Papadopoulos, B Livshits Proceedings of The Web Conference 2020, 1682-1692, 2020 | 3 | 2020 |
Another brick in the paywall: The popularity and privacy implications of paywalls P Papadopoulos, P Snyder, B Livshits CoRR, abs/1903.01406, 2019 | 3 | 2019 |
Next steps for browser privacy: Pursuing privacy protections beyond extensions P Snyder | 1 | 2019 |
One Thing Leads to Another: Credential Based Privilege Escalation P Snyder, C Kanich Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 1 | 2015 |
There's No Trick, Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage J Jueckstock, P Snyder, S Sarker, A Kapravelos, B Livshits arXiv preprint arXiv:2011.01267, 2020 | | 2020 |