| 2009 |
| 10 | EE | Collin Jackson,
Adam Barth,
Andrew Bortz,
Weidong Shao,
Dan Boneh:
Protecting browsers from DNS rebinding attacks.
TWEB 3(1): 2 (2009) |
| 2008 |
| 9 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Robust defenses for cross-site request forgery.
ACM Conference on Computer and Communications Security 2008: 75-88 |
| 8 | EE | Adam Barth,
Collin Jackson,
John C. Mitchell:
Securing Frame Communication in Browsers.
USENIX Security Symposium 2008: 17-30 |
| 7 | EE | Collin Jackson,
Adam Barth:
Forcehttps: protecting high-security web sites from network attacks.
WWW 2008: 525-534 |
| 2007 |
| 6 | EE | Collin Jackson,
Adam Barth,
Andrew Bortz,
Weidong Shao,
Dan Boneh:
Protecting browsers from dns rebinding attacks.
ACM Conference on Computer and Communications Security 2007: 421-431 |
| 5 | EE | Collin Jackson,
Daniel R. Simon,
Desney S. Tan,
Adam Barth:
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.
Financial Cryptography 2007: 281-293 |
| 4 | EE | Helen J. Wang,
Xiaofeng Fan,
Jon Howell,
Collin Jackson:
Protection and communication abstractions for web browsers in MashupOS.
SOSP 2007: 1-16 |
| 3 | EE | Collin Jackson,
Helen J. Wang:
Subspace: secure cross-domain communication for web mashups.
WWW 2007: 611-620 |
| 2006 |
| 2 | EE | Collin Jackson,
Andrew Bortz,
Dan Boneh,
John C. Mitchell:
Protecting browser state from web privacy attacks.
WWW 2006: 737-744 |
| 1 | EE | Collin Jackson,
Andrew Bortz,
Dan Boneh,
John C. Mitchell:
Protecting browser state from web privacy attacks.
WWW 2006: 737-744 |