All Stories

  1. Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning
  2. The More Things Change, the More They Stay the Same: Integrity of Modern JavaScript
  3. Role Models: Role-based Debloating for Web Applications
  4. Introduction to the Special Issue on Vulnerabilities
  5. Verba Volant, Scripta Volant: Understanding Post-publication Title Changes in News Outlets
  6. Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits
  7. Click This, Not That: Extending Web Authentication with Deception
  8. Where are you taking me?Understanding Abusive Traffic Distribution Systems
  9. You've Changed: Detecting Malicious Browser Extensions through their Update Deltas
  10. Betrayed by Your Dashboard
  11. Panning for gold.com
  12. Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers
  13. Hiding in Plain Sight
  14. Hindsight
  15. The Wolf of Name Street
  16. What's in a Name?
  17. No Honor Among Thieves
  18. Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms
  19. The Clock is Still Ticking
  20. Maneuvering Around Clouds
  21. Drops for Stuff