Cited By
View all- Nayak AKhandelwal RFernandes EFawaz KChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Experimental Security Analysis of Sensitive Data Access by Browser ExtensionsProceedings of the ACM Web Conference 202410.1145/3589334.3645683(1283-1294)Online publication date: 13-May-2024
- Xia PGuo YLin ZWu JDuan PHe NWang KLiu TYue YXu GWang H(2024)WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency walletsAutomated Software Engineering10.1007/s10515-024-00430-331:1Online publication date: 31-Mar-2024
- Kim YLee BCalandrino JTroncoso C(2023)Extending a hand to attackersProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620632(7055-7071)Online publication date: 9-Aug-2023
- Show More Cited By