W
Wouter Joosen
Researcher at Katholieke Universiteit Leuven
Publications - 791
Citations - 12544
Wouter Joosen is an academic researcher from Katholieke Universiteit Leuven. The author has contributed to research in topics: Middleware & Wireless sensor network. The author has an hindex of 48, co-authored 746 publications receiving 10597 citations. Previous affiliations of Wouter Joosen include IMEC & Red Hat.
Papers
More filters
Proceedings ArticleDOI
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
Nick Nikiforakis,Alexandros Kapravelos,Wouter Joosen,Christopher Kruegel,Frank Piessens,Giovanni Vigna +5 more
TL;DR: By analyzing the code of three popular browser-fingerprinting code providers, it is revealed the techniques that allow websites to track users without the need of client-side identifiers and how fragile the browser ecosystem is against fingerprinting through the use of novel browser-identifying techniques.
Journal ArticleDOI
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
TL;DR: This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above.
Proceedings ArticleDOI
You are what you include: large-scale evaluation of remote javascript inclusions
Nick Nikiforakis,Luca Invernizzi,Alexandros Kapravelos,Steven Van Acker,Wouter Joosen,Christopher Kruegel,Frank Piessens,Giovanni Vigna +7 more
TL;DR: A large-scale crawl of more than three million pages of the top 10,000 Alexa sites is reported, showing that in some cases, top Internet sites trust remote providers that could be successfully compromised by determined attackers and subsequently serve malicious JavaScript.
Journal ArticleDOI
Predicting Vulnerable Software Components via Text Mining
TL;DR: In an exploratory validation with 20 Android applications, it is discovered that a dependable prediction model can be built and could be useful to prioritize the validation activities, e.g., to identify the components needing special scrutiny.
Proceedings ArticleDOI
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation
TL;DR: In this paper, the authors empirically validate that the ranks of domains in each of the lists are easily altered, in the case of Alexa through as little as a single HTTP request.