scispace - formally typeset
W

Wouter Joosen

Researcher at Katholieke Universiteit Leuven

Publications -  791
Citations -  12544

Wouter Joosen is an academic researcher from Katholieke Universiteit Leuven. The author has contributed to research in topics: Middleware & Wireless sensor network. The author has an hindex of 48, co-authored 746 publications receiving 10597 citations. Previous affiliations of Wouter Joosen include IMEC & Red Hat.

Papers
More filters
Proceedings ArticleDOI

Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting

TL;DR: By analyzing the code of three popular browser-fingerprinting code providers, it is revealed the techniques that allow websites to track users without the need of client-side identifiers and how fragile the browser ecosystem is against fingerprinting through the use of novel browser-identifying techniques.
Journal ArticleDOI

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

TL;DR: This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above.
Proceedings ArticleDOI

You are what you include: large-scale evaluation of remote javascript inclusions

TL;DR: A large-scale crawl of more than three million pages of the top 10,000 Alexa sites is reported, showing that in some cases, top Internet sites trust remote providers that could be successfully compromised by determined attackers and subsequently serve malicious JavaScript.
Journal ArticleDOI

Predicting Vulnerable Software Components via Text Mining

TL;DR: In an exploratory validation with 20 Android applications, it is discovered that a dependable prediction model can be built and could be useful to prioritize the validation activities, e.g., to identify the components needing special scrutiny.
Proceedings ArticleDOI

Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation

TL;DR: In this paper, the authors empirically validate that the ranks of domains in each of the lists are easily altered, in the case of Alexa through as little as a single HTTP request.