2 code implementations • 18 Feb 2021 • Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom Van Goethem
Furthermore, we report on several privacy and security issues inherent to the technical setup of CNAME-based tracking that we detected through a combination of automated and manual analyses.
Cryptography and Security
no code implementations • 21 Aug 2017 • Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, Wouter Joosen
In our open world evaluation, the most performant deep learning model is 2% more accurate than the state-of-the-art attack.