< Back to previous page
Researcher
Tom Van Goethem
- Disciplines:Computer system security
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From15 Aug 2013 → 4 Aug 2020
Publications
21 - 30 of 30
- Automated Website Fingerprinting through Deep Learning(2018)
Authors: Vera Rimmer, Davy Preuveneers, Tom Van Goethem, Wouter Joosen
Pages: 1 - 15Number of pages: 15 - The wolf of name street: Hijacking domains through their nameservers(2017)
Authors: Thomas Vissers, Tom Van Goethem, Wouter Joosen
Pages: 957 - 970 - Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting(2017)
Authors: Tom Van Goethem, Wouter Joosen
Pages: 553 - 567Number of pages: 15 - Request and conquer: exposing cross-origin resource size(2016)
Authors: Tom Van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen
Pages: 447 - 462 - Accelerometer-based device fingerprinting for multi-factor mobile authentication(2016)
Authors: Tom Van Goethem, Davy Preuveneers, Wouter Joosen
Pages: 106 - 121 - It's free for a reason: Exploring the ecosystem of free live streaming services(2016)
Authors: M. Zubair Rafique, Tom Van Goethem, Wouter Joosen, Christophe Huygens
Pages: 1 - 15 - Maneuvering around clouds: Bypassing cloud-based security providers(2015)
Authors: Thomas Vissers, Tom Van Goethem, Wouter Joosen
Pages: 1530 - 1541 - The clock is still ticking: Timing attacks in the modern web(2015)
Authors: Tom Van Goethem, Wouter Joosen
Pages: 1382 - 1393 - Clubbing seals: Exploring the ecosystem of third-party security seals(2014)
Authors: Tom Van Goethem, Frank Piessens, Wouter Joosen
Pages: 918 - 929 - Large-scale security analysis of the web: Challenges and findings(2014)
Authors: Tom Van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, Wouter Joosen
Pages: 110 - 125