default search action
Tobias Lauinger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c23]Bruno Coelho, Tobias Lauinger, Laura Edelson, Ian Goldstein, Damon McCoy:
Propaganda Política Pagada: Exploring U.S. Political Facebook Ads en Español. WWW 2023: 2742-2753 - [i6]Ian Goldstein, Laura Edelson, Damon McCoy, Tobias Lauinger:
Understanding the (In)Effectiveness of Content Moderation: A Case Study of Facebook in the Context of the U.S. Capitol Riot. CoRR abs/2301.02737 (2023) - 2022
- [c22]Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:
An Audit of Facebook's Political Ad Policy Enforcement. USENIX Security Symposium 2022: 607-624 - [c21]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. WWW 2022: 2707-2718 - [i5]Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories. CoRR abs/2205.15943 (2022) - 2021
- [c20]Laura Edelson, Minh-Kha Nguyen, Ian Goldstein, Oana Goga, Damon McCoy, Tobias Lauinger:
Understanding engagement with U.S. (mis)information news sources on Facebook. Internet Measurement Conference 2021: 444-463 - [c19]Maxwell Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy:
A large-scale characterization of online incitements to harassment across platforms. Internet Measurement Conference 2021: 621-638 - [c18]Maxwell Aliapoulios, Cameron Ballard, Rasika Bhalerao, Tobias Lauinger, Damon McCoy:
Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards. USENIX Security Symposium 2021: 4151-4168 - 2020
- [c17]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez:
Understanding Incentivized Mobile App Installs on Google Play Store. Internet Measurement Conference 2020: 696-709 - [c16]Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda:
What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques. RAID 2020: 107-120 - [c15]Laura Edelson, Tobias Lauinger, Damon McCoy:
A Security Analysis of the Facebook Ad Library. SP 2020: 661-678 - [i4]Paz Grimberg, Tobias Lauinger, Damon McCoy:
Empirical Analysis of Indirect Internal Conversions in Cryptocurrency Exchanges. CoRR abs/2002.12274 (2020) - [i3]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez:
Understanding Incentivized Mobile App Installs on Google Play Store. CoRR abs/2010.01497 (2020)
2010 – 2019
- 2019
- [c14]Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. CNS 2019: 259-267 - [c13]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists. ISC 2019: 255-276 - [c12]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research. PAM 2019: 161-177 - 2018
- [j2]Tobias Lauinger, Abdelberi Chaabane, Christo Wilson:
Thou shalt not depend on me. Commun. ACM 61(6): 41-47 (2018) - [c11]Tobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda:
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. Internet Measurement Conference 2018: 322-328 - [c10]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. WWW 2018: 237-246 - [i2]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. CoRR abs/1811.00917 (2018) - [i1]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William K. Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. CoRR abs/1811.00918 (2018) - 2017
- [c9]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. NDSS 2017 - [c8]Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson:
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers. USENIX Security Symposium 2017: 865-880 - 2016
- [c7]Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda:
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. Internet Measurement Conference 2016: 247-253 - 2014
- [c6]Michael Weissbacher, Tobias Lauinger, William K. Robertson:
Why Is CSP Failing? Trends and Challenges in CSP Adoption. RAID 2014: 212-233 - 2013
- [c5]Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel:
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. NDSS 2013 - [c4]Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. RAID 2013: 369-389 - 2012
- [j1]Tobias Lauinger, Nikolaos Laoutaris, Pablo Rodriguez, Thorsten Strufe, Ernst W. Biersack, Engin Kirda:
Privacy risks in named data networking: what is the cost of performance? Comput. Commun. Rev. 42(5): 54-57 (2012) - [c3]Tobias Lauinger, Engin Kirda, Pietro Michiardi:
Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. RAID 2012: 169-189 - 2010
- [c2]Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda:
Honeybot, Your Man in the Middle for Automated Social Engineering. LEET 2010
2000 – 2009
- 2008
- [c1]Sebastian Kaune, Tobias Lauinger, Aleksandra Kovacevic, Konstantin Pussep:
Embracing the Peer Next Door: Proximity in Kademlia. Peer-to-Peer Computing 2008: 343-350
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint