Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1806.01156
Cited By
v1
v2
v3 (latest)
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation
4 June 2018
Victor Le Pochat
Tom van Goethem
Samaneh Tajalizadehkhoob
Maciej Korczyński
Wouter Joosen
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation"
50 / 69 papers shown
Title
PhishDebate: An LLM-Based Multi-Agent Framework for Phishing Website Detection
Wenhao Li
S. Manickam
Yung-wey Chong
Shankar Karuppayah
LLMAG
40
0
0
18 Jun 2025
SoK: Advances and Open Problems in Web Tracking
Yash Vekaria
Yohan Beugin
Shaoor Munir
Gunes Acar
Nataliia Bielova
...
Nick Nikiforakis
Jason Polakis
Franziska Roesner
Zubair Shafiq
Sebastian Zimmeck
OffRL
22
0
0
16 Jun 2025
Navigating Cookie Consent Violations Across the Globe
Brian Tang
D. Bui
Kang G. Shin
18
0
0
10 Jun 2025
Scoring the Unscorables: Cyber Risk Assessment Beyond Internet Scans
Armin Sarabi
Manish Karir
Mingyan Liu
27
0
0
07 Jun 2025
Fingerprinting Implementations of Cryptographic Primitives and Protocols that Use Post-Quantum Algorithms
Tushin Mallick
Ramana Rao Kompella
Ashish Kundu
Cristina Nita-Rotaru
64
0
0
22 Mar 2025
DomainDynamics: Lifecycle-Aware Risk Timeline Construction for Domain Names
Daiki Chiba
Hiroki Nakano
Takashi Koide
219
0
0
24 Feb 2025
Detecting Phishing Sites Using ChatGPT
Takashi Koide
Naoki Fukushi
Hiroki Nakano
Daiki Chiba
170
31
0
17 Feb 2025
MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure
Fatih Deniz
Mohamed Nabeel
Ting Yu
Issa M. Khalil
65
1
0
17 Feb 2025
Explorer: Scaling Exploration-driven Web Trajectory Synthesis for Multimodal Web Agents
Vardaan Pahuja
Yadong Lu
Corby Rosset
Boyu Gou
Arindam Mitra
Spencer Whitehead
Yu Su
Ahmed Awadallah
LLMAG
LM&Ro
Presented at
ResearchTrend Connect | LLMAG
on
14 Mar 2025
259
7
1
17 Feb 2025
PixLift: Accelerating Web Browsing via AI Upscaling
Yonas Atinafu
Sarthak Malla
HyunSeok Daniel Jang
Nouar Aldahoul
Matteo Varvello
Yasir Zaki
123
0
0
13 Feb 2025
Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting
Robin Kirchner
Jonas Moller
Marius Musch
David Klein
Konrad Rieck
Martin Johns
110
4
0
12 Feb 2025
Lazy Gatekeepers: A Large-Scale Study on SPF Configuration in the Wild
Stefan Czybik
Micha Horlboge
Konrad Rieck
132
8
0
12 Feb 2025
Harmful Terms and Where to Find Them: Measuring and Modeling Unfavorable Financial Terms and Conditions in Shopping Websites at Scale
Elisa Tsai
Neal Mangaokar
Boyuan Zheng
Haizhong Zheng
A. Prakash
87
0
0
03 Feb 2025
Exploring QUIC Dynamics: A Large-Scale Dataset for Encrypted Traffic Analysis
Barak Gahtan
Robert J. Sahala
A. Bronstein
R. Cohen
98
0
0
30 Sep 2024
Understanding Privacy Norms through Web Forms
Hao Cui
R. Trimananda
A. Markopoulou
AILaw
63
1
0
29 Aug 2024
PhishAgent: A Robust Multimodal Agent for Phishing Webpage Detection
Tri Cao
Chengyu Huang
Yuexin Li
Huilin Wang
Amy He
Nay Oo
Bryan Hooi
LLMAG
OffRL
166
7
0
20 Aug 2024
From ML to LLM: Evaluating the Robustness of Phishing Webpage Detection Models against Adversarial Attacks
Aditya Kulkarni
Vivek Balachandran
D. Divakaran
Tamal Das
AAML
123
5
0
29 Jul 2024
Automatically Generating UI Code from Screenshot: A Divide-and-Conquer-Based Approach
Yuxuan Wan
Chaozheng Wang
Yi Dong
Wenxuan Wang
Shuqing Li
Yintong Huo
Michael R. Lyu
3DV
172
14
0
24 Jun 2024
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
Pouneh Nikkhah Bahrami
Aurore Fass
Zubair Shafiq
142
1
0
08 Jun 2024
A Public and Reproducible Assessment of the Topics API on Real Data
Yohan Beugin
Patrick McDaniel
97
0
0
28 Mar 2024
An Extended View on Measuring Tor AS-level Adversaries
G. K. Gegenhuber
Markus Maier
Florian Holzbauer
Wilfried Mayer
Georg Merzdovnik
Edgar Weippl
Johanna Ullrich
48
4
0
13 Mar 2024
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research
G. K. Gegenhuber
Wilfried Mayer
Edgar Weippl
Adrian Dabrowski
28
5
0
13 Mar 2024
Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector
Shuang He
Lianying Zhao
David Lie
151
0
0
12 Feb 2024
Targeted and Troublesome: Tracking and Advertising on Children's Websites
Zahra Moti
Asuman Senol
Hamid Bostani
F. Z. Borgesius
Veelasha Moonsamy
Arunesh Mathur
Gunes Acar
89
2
0
09 Aug 2023
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers
Arthur Drichel
Ulrike Meyer
50
7
0
10 Jul 2023
Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention
Yarin Ozery
Asaf Nadler
A. Shabtai
123
6
0
05 Jul 2023
Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3
C. F. Torres
Fiona Willi
Shweta Shinde
44
8
0
13 Jun 2023
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection
Chika Komiya
Naoto Yanai
Kyosuke Yamashita
Shingo Okamura
29
1
0
09 Jun 2023
A Survey on Malware Detection with Graph Representation Learning
Tristan Bilot
Nour El Madhoun
Khaldoun Al Agha
Anis Zouaoui
AAML
94
28
0
28 Mar 2023
Exploiting Input Sanitization for Regex Denial of Service
Efe Barlas
Xin Du
James C. Davis
AAML
SILM
OnRL
61
16
0
03 Mar 2023
A Transcontinental Analysis of Account Remediation Protocols of Popular Websites
Philipp Markert
Andrick Adhikari
Sanchari Das
44
6
0
02 Feb 2023
SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild
M.R.M. Westers
Tobias Wich
Louis Jannett
Vladislav Mladenov
Christian Mainka
Andreas Mayer
38
6
0
02 Feb 2023
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms
N. Weissgerber
Thorsten Jenke
Elmar Padilla
Lilli Bruckschen
20
0
0
12 Jan 2023
Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming
Siyuan Tang
Eihal Alowaisheq
Xianghang Mi
Yi Chen
Wenyuan Xu
Yanzhi Dou
15
1
0
06 Dec 2022
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)
Sanam Ghorbani Lyastani
Michael Backes
Sven Bugiel
24
12
0
17 Oct 2022
"Sign in with ... Privacy'': Timely Disclosure of Privacy Differences among Web SSO Login Options
Srivathsan G. Morkonda
Sonia Chiasson
P. V. Oorschot
148
5
0
09 Sep 2022
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools
Juan Caballero
Gibran Gómez
S. Matic
Gustavo Sánchez
Silvia Sebastián
Arturo Villacañas
57
17
0
29 Jul 2022
PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool
R. Purwanto
Arindam Pal
Alan Blair
S. Jha
31
18
0
13 Jul 2022
PLAtE: A Large-scale Dataset for List Page Web Extraction
Aidan San
Yuan Zhuang
J. Bakus
Colin Lockard
David M. Ciemiewicz
Sandeep Atluri
Yangfeng Ji
Kevin Small
Heba Elfardy
75
5
0
24 May 2022
Analysing and strengthening OpenWPM's reliability
Benjamin Krumnow
H. Jonker
S. Karsch
56
0
0
18 May 2022
Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem
Umar Iqbal
Pouneh Nikkhah Bahrami
R. Trimananda
Hao Cui
Alexander Gamero-Garrido
Daniel Dubois
David Choffnes
A. Markopoulou
Franziska Roesner
Zubair Shafiq
MLAU
117
26
0
22 Apr 2022
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild
A. Randall
Peter Snyder
Alisha Ukani
A. Snoeren
Geoff Voelker
Stefan Savage
Aaron Schulman
18
2
0
18 Mar 2022
AutoFR: Automated Filter Rule Generation for Adblocking
Hieu Le
Salma Elmalaki
A. Markopoulou
Zubair Shafiq
135
12
0
25 Feb 2022
Towards Understanding First-Party Cookie Tracking in the Field
Nurullah Demir
Daniel Theis
Tobias Urban
N. Pohlmann
49
8
0
03 Feb 2022
Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering
Nguyen Phong Hoang
M. Polychronakis
Phillipa Gill
58
14
0
01 Feb 2022
Cookie Banners, What's the Purpose? Analyzing Cookie Banner Text Through a Legal Lens
Cristiana Santos
Arianna Rossi
Lorena Sánchez Chamorro
Kerstin Bongard-Blanchy
Ruba Abu-Salma
123
46
0
06 Oct 2021
Unsupervised Detection and Clustering of Malicious TLS Flows
Gibran Gómez
Platon Kotzias
Matteo DellÁmico
Leyla Bilge
Juan Caballero
36
11
0
08 Sep 2021
Feature Importance Guided Attack: A Model Agnostic Adversarial Attack
Gilad Gressel
Niranjan Hegde
A. Sreekumar
Rishikumar Radhakrishnan
Kalyani Harikumar
Michael C. Darling
Krishnashree Achuthan
AAML
158
18
0
28 Jun 2021
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs
Arthur Drichel
Vincent Drury
Justus von Brandt
Ulrike Meyer
87
22
0
23 Jun 2021
Best Practices for Notification Studies for Security and Privacy Issues on the Internet
Max Maass
H. Pridöhl
Dominik Herrmann
M. Hollick
44
13
0
15 Jun 2021
1
2
Next