Cited By
View all- Drescher JMirzaei SKhodayari SKlein DBarber TJohns MPellegrino GHuang CChen JShieh SLie DCortier V(2025)In the DOM We Trust: Exploring the Hidden Dangers of Reading from the DOM on the WebProceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security10.1145/3719027.3765117(3042-3056)Online publication date: 19-Nov-2025
- Pisu LBalzarotti DMaiorca DGiacinto G(2025){{alert(’CSTI’)}}: Large-Scale Detection of Client-Side Template Injection2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)10.1109/RAID67961.2025.00057(363-377)Online publication date: 19-Oct-2025
- Roth SGröber LBaus PKrombholz KStock BBalzarotti DXu W(2024)Trust me if you canProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699236(6003-6020)Online publication date: 14-Aug-2024
- Show More Cited By


