< Back to previous page
Researcher
Tom Van Goethem
- Disciplines:Computer system security
Affiliations
- Distributed and Secure Software (DistriNet) (Division)
Member
From1 Aug 2020 → Today - Informatics Section (Division)
Member
From15 Aug 2013 → 4 Aug 2020
Publications
1 - 10 of 30
- Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers(2023)
Authors: Vik Vanderlinden, Tom Van Goethem, Mathy Vanhoef
Pages: 3 - 22Number of pages: 20 - A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs(2023)
Authors: Gertjan Franken, Tom Van Goethem, Lieven Desmet, Wouter Joosen
Pages: 3673 - 3690Number of pages: 18 - Helping hands: Measuring the impact of a large threat intelligence sharing community(2022)
Authors: Victor Le Pochat, Tom Van Goethem, Wouter Joosen
Pages: 1149 - 1165 - An Audit of Facebook’s Political Ad Policy Enforcement(2022)
Authors: Victor Le Pochat, Tom Van Goethem, Wouter Joosen
Pages: 607 - 624 - Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor(2022)
Authors: Vera Rimmer, Tom Van Goethem, Abel Rodríguez Romero, Wouter Joosen
Pages: 314 - 335 - SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model(2022)
Authors: Tom Van Goethem, Gertjan Franken, Wouter Joosen
Pages: 784 - 798 - Towards Improving the Deprecation Process of Web Features through Progressive Web Security(2022)
Authors: Tom Van Goethem, Wouter Joosen
Pages: 20 - 30Number of pages: 11 - The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion(2021)
Authors: Gunes Acar, Wouter Joosen, Tom Van Goethem
Pages: 394 - 412 - Reading between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems(2021)
Authors: Gertjan Franken, Tom Van Goethem, Wouter Joosen
Pages: 247 - 264 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections(2020)
Authors: Tom Van Goethem, Wouter Joosen, Mathy Vanhoef
Pages: 1985 - 2002Number of pages: 17