All Stories

  1. The Power to Never Be Wrong: Evasions and Anachronistic Attacks Against Web Archives
  2. What Gets Measured Gets Managed: Mitigating Supply Chain Attacks with a Link Integrity Management System
  3. A Decade-long Analysis of Global Trends in Advanced Persistent Threats
  4. The Poorest Man in Babylon: A Longitudinal Study of Cryptocurrency Investment Scams
  5. Panning for gold.eth: Understanding and Analyzing ENS Domain Dropcatching
  6. Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning
  7. The More Things Change, the More They Stay the Same: Integrity of Modern JavaScript
  8. Role Models: Role-based Debloating for Web Applications
  9. Introduction to the Special Issue on Vulnerabilities
  10. Verba Volant, Scripta Volant: Understanding Post-publication Title Changes in News Outlets
  11. Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits
  12. Click This, Not That: Extending Web Authentication with Deception
  13. Where are you taking me?Understanding Abusive Traffic Distribution Systems
  14. You've Changed: Detecting Malicious Browser Extensions through their Update Deltas
  15. Betrayed by Your Dashboard
  16. Panning for gold.com
  17. Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers
  18. Hiding in Plain Sight
  19. Hindsight
  20. The Wolf of Name Street
  21. What's in a Name?
  22. No Honor Among Thieves
  23. Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms
  24. The Clock is Still Ticking
  25. Maneuvering Around Clouds
  26. Drops for Stuff