ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1809.04774
  4. Cited By
Fidelius: Protecting User Secrets from Compromised Browsers
v1v2v3 (latest)

Fidelius: Protecting User Secrets from Compromised Browsers

13 September 2018
Saba Eskandarian
Jonathan Cogan
Sawyer Birnbaum
Peh Chang Wei Brandon
Dillon Franke
Forest Fraser
Gaspar Garcia
Eric Gong
Hung T. Nguyen
Taresh K. Sethi
Vishal Subbiah
Michael Backes
Giancarlo Pellegrino
Dan Boneh
ArXiv (abs)PDFHTML

Papers citing "Fidelius: Protecting User Secrets from Compromised Browsers"

11 / 11 papers shown
User Profiles: The Achilles' Heel of Web Browsers
User Profiles: The Achilles' Heel of Web Browsers
Dolière Francis Somé
Moaz Airan
Zakir Durumeric
Cristian-Alexandru Staicu
249
0
0
24 Apr 2025
Devlore: Device Interrupt Protection for Confidential VMs
Devlore: Device Interrupt Protection for Confidential VMs
Andrin Bertschi
Supraja Sridhara
Friederike Groschupp
Mark Kuhne
Benedict Schluter
Clément Thorens
Nicolas Dutly
Srdjan Capkun
Shweta Shinde
388
7
0
11 Aug 2024
InfoGuard: A Design and Usability Study of User-Controlled
  Application-Independent Encryption for Privacy-Conscious Users
InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users
T. Yadav
Austin Cook
Justin Hales
Kenneth R. Seamons
FedML
88
0
0
01 Nov 2023
STELLA: Sparse Taint Analysis for Enclave Leakage Detection
STELLA: Sparse Taint Analysis for Enclave Leakage Detection
Yang Chen
Jia Jiang
Shoumeng Yan
Hui Xu
119
3
0
09 Aug 2022
Internet-based Social Engineering Attacks, Defenses and Psychology: A
  Survey
Internet-based Social Engineering Attacks, Defenses and Psychology: A Survey
Theodore Longtchi
Rosana Montañez Rodriguez
L. Al-Shawaf
A. Atyabi
Shouhuai Xu
133
4
0
15 Mar 2022
Knowledge & Learning-based Adaptable System for Sensitive Information
  Identification and Handling
Knowledge & Learning-based Adaptable System for Sensitive Information Identification and HandlingIEEE International Conference on Cloud Computing (CLOUD), 2021
Akshar Kaul
M. Kesarwani
Hong Min
Qi Zhang
204
5
0
08 Sep 2021
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones
Friederike Groschupp
Moritz Schneider
Ivan Puddu
Shweta Shinde
Srdjan Capkun
146
1
0
04 Feb 2021
Composite Enclaves: Towards Disaggregated Trusted Execution
Composite Enclaves: Towards Disaggregated Trusted Execution
Moritz Schneider
Aritra Dhar
Ivan Puddu
Kari Kostiainen
Srdjan Capkun
331
21
0
20 Oct 2020
Hector: Using Untrusted Browsers to Provision Web Applications
Hector: Using Untrusted Browsers to Provision Web Applications
David Goltzsche
Tim Siebels
Lennard Golsch
R. Kapitza
122
0
0
19 Oct 2020
vWitness: Certifying Web Page Interactions with Computer Vision
vWitness: Certifying Web Page Interactions with Computer VisionDependable Systems and Networks (DSN), 2020
Shuang He
Lianying Zhao
David Lie
173
2
0
31 Jul 2020
CACTI: Captcha Avoidance via Client-side TEE Integration
CACTI: Captcha Avoidance via Client-side TEE Integration
Yoshimichi Nakatsuka
Ercan Ozturk
Andrew Paverd
Gene Tsudik
138
11
0
20 Jul 2020
1
Page 1 of 1