Name
Papers
Collaborators
BEN LIVSHITS
97
193
Citations 
PageRank 
Referers 
2108
123.83
3703
Referees 
References 
2388
1453
Search Limit
1001000
Title
Citations
PageRank
Year
STAR: Secret Sharing for Private Threshold Aggregation Reporting00.342022
Measuring the Privacy vs. Compatibility Trade-off in Preventing Third-Party Stateful Tracking00.342022
BatteryLab: A Collaborative Platform for Power Monitoring https://batterylab.dev00.342022
Finding Typing Compiler Bugs00.342022
Shedding (Some) Light on Mobile Browsers Energy Consumption.00.342021
Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited00.342021
Towards Realistic and ReproducibleWeb Crawl Measurements00.342021
VPN-Zero: A Privacy-Preserving Decentralized Virtual Private Network00.342021
BrowseLite: A Private Data Saving Solution for the Web00.342021
SugarCoat: Programmatically Generating Privacy-Preserving, Web-Compatible Resource Replacements for Content Blocking00.342021
Stronger Privacy for Federated Collaborative Filtering With Implicit Feedback00.342021
Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls00.342020
Revisiting Transactional Statistics of High-scalability Blockchains00.342020
The Decentralized Financial Crisis20.392020
Broken Metre: Attacking Resource Metering in EVM00.342020
Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking00.342020
Filter List Generation for Underserved Regions10.352020
When The Signal Is In The Noise: Exploiting Diffix'S Sticky Noise00.342019
Another Brick in the Paywall: The Popularity and Privacy Implications of Paywalls.00.342019
Static Analysis for Asynchronous JavaScript Programs.00.342019
BatteryLab, A Distributed Power Monitoring Platform For Mobile Devices.10.362019
The Blind Men and the Internet: Multi-Vantage Point Web Measurements.00.342019
Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning.00.342019
Smart Contract Vulnerabilities: Does Anyone Care?10.362019
SpeedReader: Reader Mode Made Fast and Private.10.362019
SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS.40.392018
A Puff of Steem: Security Analysis of Decentralized Content Curation.00.342018
Toward an Evidence-based Design for Reactive Security Policies and Mechanisms.10.352018
Evaluating the End-User Experience of Private Browsing Mode10.352018
Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking.10.352018
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking.10.352018
The Anatomy Of A Cryptocurrency Pump-And-Dump Scheme10.362018
EthIR: A Framework for High-Level Analysis of Ethereum Bytecode.110.752018
Toward full elasticity in distributed static analysis: the case of callgraph analysis40.382017
Just-in-time static analysis.70.472017
BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model.140.672017
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming.70.542017
Cheetah: just-in-time taint analysis for Android apps.20.362017
Kizzle: A Signature Compiler for Detecting Exploit Kits40.412016
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser110.652015
PriVaricator: Deceiving Fingerprinters with Little White Lies411.602015
In defense of soundiness: a manifesto421.032015
Detecting JavaScript races that matter140.662015
Program Boosting: Program Synthesis via Crowd-Sourcing100.592015
Data-Parallel String-Manipulating Programs60.432015
InterPoll: Crowd-Sourced Internet Polls.00.342015
ZØ: an optimizing distributing zero-knowledge compiler50.392014
Let's do it at my place instead?: attitudinal and behavioral study of privacy in client-side personalization110.542014
Saving Money While Polling with InterPoll Using Power Analysis.40.382014
Fast: a transducer-based language for tree manipulation150.672014
  • 1
  • 2