2009 |
10 | EE | Collin Jackson,
Adam Barth,
Andrew Bortz,
Weidong Shao,
Dan Boneh:
Protecting browsers from DNS rebinding attacks.
TWEB 3(1): 2 (2009) |
2008 |
9 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Robust defenses for cross-site request forgery.
ACM Conference on Computer and Communications Security 2008: 75-88 |
8 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Securing Frame Communication in Browsers.
USENIX Security Symposium 2008: 17-30 |
7 | EE | Collin Jackson,
Adam Barth:
Forcehttps: protecting high-security web sites from network attacks.
WWW 2008: 525-534 |
2007 |
6 | EE | Collin Jackson,
Adam Barth,
Andrew Bortz,
Weidong Shao,
Dan Boneh:
Protecting browsers from dns rebinding attacks.
ACM Conference on Computer and Communications Security 2007: 421-431 |
5 | EE | Collin Jackson,
Daniel R. Simon,
Desney S. Tan,
Adam Barth:
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.
Financial Cryptography 2007: 281-293 |
4 | EE | Helen J. Wang,
Xiaofeng Fan,
Jon Howell,
Collin Jackson:
Protection and communication abstractions for web browsers in MashupOS.
SOSP 2007: 1-16 |
3 | EE | Collin Jackson,
Helen J. Wang:
Subspace: secure cross-domain communication for web mashups.
WWW 2007: 611-620 |
2006 |
2 | EE | Collin Jackson,
Andrew Bortz,
Dan Boneh,
John C. Mitchell:
Protecting browser state from web privacy attacks.
WWW 2006: 737-744 |
1 | EE | Collin Jackson,
Andrew Bortz,
Dan Boneh,
John C. Mitchell:
Protecting browser state from web privacy attacks.
WWW 2006: 737-744 |