default search action
Peter Snyder
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Mir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi:
Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles. CCS 2024: 2192-2206 - [c23]Stephen McQuistin, Peter Snyder, Hamed Haddadi, Gareth Tyson:
A First Look at Related Website Sets. IMC 2024: 107-113 - [i19]Mir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi:
Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles. CoRR abs/2405.00596 (2024) - [i18]Stephen McQuistin, Peter Snyder, Hamed Haddadi, Gareth Tyson:
A First Look at Related Website Sets. CoRR abs/2408.07495 (2024) - [i17]Ali Shahin Shamsabadi, Peter Snyder, Ralph Giles, Aurélien Bellet, Hamed Haddadi:
Nebula: Efficient, Private and Accurate Histogram Estimation. CoRR abs/2409.09676 (2024) - 2023
- [c22]Salim Chouaki, Oana Goga, Hamed Haddadi, Peter Snyder:
Understanding the Privacy Risks of Popular Search Engine Advertising Systems. IMC 2023: 370-382 - [c21]Stephen McQuistin, Peter Snyder, Colin Perkins, Hamed Haddadi, Gareth Tyson:
A First Look at the Privacy Harms of the Public Suffix List. IMC 2023: 383-390 - [c20]Aurélien Buchet, Peter Snyder, Hamed Haddadi, Cristel Pelsser:
Detecting IP-tracking proof interfaces by looking for NATs. TMA 2023: 1-4 - [c19]Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi:
Pool-Party: Exploiting Browser Resource Pools for Web Tracking. USENIX Security Symposium 2023: 7091-7105 - [i16]Salim Chouaki, Oana Goga, Hamed Haddadi, Peter Snyder:
Understanding the Privacy Risks of Popular Search Engine Advertising Systems. CoRR abs/2308.15309 (2023) - 2022
- [j4]Michael Smith, Peter Snyder, Moritz Haller, Benjamin Livshits, Deian Stefan, Hamed Haddadi:
Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites. Proc. Priv. Enhancing Technol. 2022(4): 6-23 (2022) - [c18]Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi:
STAR: Secret Sharing for Private Threshold Aggregation Reporting. CCS 2022: 697-710 - [c17]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman:
Measuring UID smuggling in the wild. IMC 2022: 230-243 - [c16]Jordan Jueckstock, Peter Snyder, Shaown Sarker, Alexandros Kapravelos, Benjamin Livshits:
Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking. WWW 2022: 710-720 - [i15]Michael Smith, Peter Snyder, Moritz Haller, Benjamin Livshits, Deian Stefan, Hamed Haddadi:
Blocked or Broken? Automatically Detecting When Privacy Interventions Break Websites. CoRR abs/2203.03528 (2022) - [i14]Audrey Randall, Peter Snyder, Alisha Ukani, Alex C. Snoeren, Geoff Voelker, Stefan Savage, Aaron Schulman:
Trackers Bounce Back: Measuring Evasion of Partitioned Storage in the Wild. CoRR abs/2203.10188 (2022) - 2021
- [c15]Michael Smith, Peter Snyder, Benjamin Livshits, Deian Stefan:
SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking. CCS 2021: 2844-2857 - [c14]Quan Chen, Peter Snyder, Ben Livshits, Alexandros Kapravelos:
Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures. SP 2021: 1715-1729 - [c13]Jordan Jueckstock, Shaown Sarker, Peter Snyder, Aidan Beggs, Panagiotis Papadopoulos, Matteo Varvello, Benjamin Livshits, Alexandros Kapravelos:
Towards Realistic and ReproducibleWeb Crawl Measurements. WWW 2021: 80-91 - [i13]Philipp Winter, Anna Harbluk Lorimer, Peter Snyder, Benjamin Livshits:
What's in Your Wallet? Privacy and Security Issues in Web 3.0. CoRR abs/2109.06836 (2021) - [i12]Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits:
STAR: Distributed Secret Sharing for Private Threshold Aggregation Reporting. CoRR abs/2109.10074 (2021) - [i11]Peter Snyder, Soroush Karami, Benjamin Livshits, Hamed Haddadi:
Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking. CoRR abs/2112.06324 (2021) - 2020
- [j3]Peter Snyder, Antoine Vastel, Ben Livshits:
Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. Proc. ACM Meas. Anal. Comput. Syst. 4(2): 26:1-26:24 (2020) - [c12]Peter Snyder, Antoine Vastel, Ben Livshits:
Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. SIGMETRICS (Abstracts) 2020: 75-76 - [c11]Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq:
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking. SP 2020: 763-776 - [c10]Panagiotis Papadopoulos, Peter Snyder, Dimitrios Athanasakis, Benjamin Livshits:
Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls. WWW 2020: 1433-1444 - [c9]Alexander Sjösten, Peter Snyder, Antonio Pastor, Panagiotis Papadopoulos, Benjamin Livshits:
Filter List Generation for Underserved Regions. WWW 2020: 1682-1692 - [i10]Quan Chen, Peter Snyder, Ben Livshits, Alexandros Kapravelos:
Improving Web Content Blocking With Event-Loop-Turn Granularity JavaScript Signatures. CoRR abs/2005.11910 (2020) - [i9]Jordan Jueckstock, Peter Snyder, Shaown Sarker, Alexandros Kapravelos, Benjamin Livshits:
There's No Trick, Its Just a Simple Trick: A Web-Compat and Privacy Improving Approach to Third-party Web Storage. CoRR abs/2011.01267 (2020)
2010 – 2019
- 2019
- [c8]Mohammad Ghasemisharif, Peter Snyder, Andrius Aucinas, Benjamin Livshits:
SpeedReader: Reader Mode Made Fast and Private. WWW 2019: 526-537 - [i8]Panagiotis Papadopoulos, Peter Snyder, Benjamin Livshits:
Another Brick in the Paywall: The Popularity and Privacy Implications of Paywalls. CoRR abs/1903.01406 (2019) - [i7]Jordan Jueckstock, Shaown Sarker, Peter Snyder, Panagiotis Papadopoulos, Matteo Varvello, Benjamin Livshits, Alexandros Kapravelos:
The Blind Men and the Internet: Multi-Vantage Point Web Measurements. CoRR abs/1905.08767 (2019) - [i6]Alexander Sjösten, Peter Snyder, Antonio Pastor, Panagiotis Papadopoulos, Benjamin Livshits:
Filter List Generation for Underserved Regions. CoRR abs/1910.07303 (2019) - 2018
- [i5]Umar Iqbal, Zubair Shafiq, Peter Snyder, Shitong Zhu, Zhiyun Qian, Benjamin Livshits:
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking. CoRR abs/1805.09155 (2018) - [i4]Antoine Vastel, Peter Snyder, Benjamin Livshits:
Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. CoRR abs/1810.09160 (2018) - [i3]Mohammad Ghasemisharif, Peter Snyder, Andrius Aucinas, Benjamin Livshits:
SpeedReader: Reader Mode Made Fast and Private. CoRR abs/1811.03661 (2018) - 2017
- [c7]Peter Snyder, Cynthia Bagier Taylor, Chris Kanich:
Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security. CCS 2017: 179-194 - [c6]Peter Snyder, Periwinkle Doerfler, Chris Kanich, Damon McCoy:
Fifteen minutes of unwanted fame: detecting and characterizing doxing. Internet Measurement Conference 2017: 432-444 - [i2]Peter Snyder, Cynthia Bagier Taylor, Chris Kanich:
Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security. CoRR abs/1708.08510 (2017) - 2016
- [j2]Peter Snyder, Chris Kanich:
Characterizing fraud and its ramifications in affiliate marketing networks. J. Cybersecur. 2(1): 71-81 (2016) - [c5]Peter Snyder, Lara Ansari, Cynthia Bagier Taylor, Chris Kanich:
Browser Feature Usage on the Modern Web. Internet Measurement Conference 2016: 97-110 - [i1]Peter Snyder, Lara Ansari, Cynthia Bagier Taylor, Chris Kanich:
Browser Feature Usage on the Modern Web. CoRR abs/1605.06467 (2016) - 2015
- [c4]Jason W. Clark, Peter Snyder, Damon McCoy, Chris Kanich:
"I Saw Images I Didn't Even Know I Had": Understanding User Perceptions of Cloud Storage Privacy. CHI 2015: 1641-1644 - [c3]Peter Snyder, Chris Kanich:
One Thing Leads to Another: Credential Based Privilege Escalation. CODASPY 2015: 135-137 - [c2]Peter Snyder, Chris Kanich:
No Please, After You: Detecting Fraud in Affiliate Marketing Networks. WEIS 2015 - 2014
- [j1]Peter Snyder, Chris Kanich:
Cloudsweeper and data-centric security. SIGCAS Comput. Soc. 44(2): 8-10 (2014) - 2013
- [c1]Peter Snyder, Chris Kanich:
CloudSweeper: enabling data-centric document management for secure cloud archives. CCSW 2013: 47-54
Coauthor Index
aka: Ben Livshits
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint