Abstract. As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and authenticated sessions are kept using HTTP cookies, data theft becomes extremely easy to achieve. In this paper, we study the architecture of the world’s largest service provider, i.e., Google. First, with the exception of a few services that can only be accessed over HTTPS (e.g., Gmail), we find that many Google services are still vulnerable to simple session hijacking. Next, we present the Historiographer, a novel attack that reconstructs the web search history of Google users, i.e., Google’s Web History, even though such a service is supposedly protec...
Cloud computing is a recent paradigm that is creating high expectations about benefits such as the p...
Abstract Protection of personal data is a requirement from both ethical and legal perspectives. In t...
Web Search engines have become an indispensable online service to retrieve content on the Internet. ...
Abstract. As the amount of personal information stored at remote service providers increases, so doe...
Abstract. Web browser history detection using CSS visited styles has long been dismissed as an issue...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
With the success of Web applications, most of our data is now stored on various third-party servers ...
Web browser history detection using CSS $visited$ styles has long been dismissed as an issue of marg...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
Abstract. Protection of personal data is a requirement from both eth-ical and legal perspectives. In...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
Nowadays it is easy to track web users among websites: cookies, web bugs or browser fingerprints are...
Abstract. Attackers compromise web servers in order to host fraudulent content, such as malware and ...
Protection of personal data is a privacy right from both ethical and legislation perspectives. In-te...
Privacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to ...
Cloud computing is a recent paradigm that is creating high expectations about benefits such as the p...
Abstract Protection of personal data is a requirement from both ethical and legal perspectives. In t...
Web Search engines have become an indispensable online service to retrieve content on the Internet. ...
Abstract. As the amount of personal information stored at remote service providers increases, so doe...
Abstract. Web browser history detection using CSS visited styles has long been dismissed as an issue...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
With the success of Web applications, most of our data is now stored on various third-party servers ...
Web browser history detection using CSS $visited$ styles has long been dismissed as an issue of marg...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
Abstract. Protection of personal data is a requirement from both eth-ical and legal perspectives. In...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
Nowadays it is easy to track web users among websites: cookies, web bugs or browser fingerprints are...
Abstract. Attackers compromise web servers in order to host fraudulent content, such as malware and ...
Protection of personal data is a privacy right from both ethical and legislation perspectives. In-te...
Privacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to ...
Cloud computing is a recent paradigm that is creating high expectations about benefits such as the p...
Abstract Protection of personal data is a requirement from both ethical and legal perspectives. In t...
Web Search engines have become an indispensable online service to retrieve content on the Internet. ...