Publications

Google Scholar

  1. G. Acar, D. Y. Huang, F. Li, A. Narayanan, N. Feamster, "Web-based Attacks to Discover and Control Local IoT Devices," In Proceedings of the 2018 SIGCOMM Workshop on IoT Security and Privacy, 29-35.
  2. A. Das, G. Acar, N. Borisov and A. Pradeep. "The Web’s Sixth Sense: A Study of Scripts Accessing Smartphone Sensors," In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, October 15–19, 2018.
  3. B. Overdorf, M. Juarez, G. Acar, C. Diaz, and R. Greenstadt, "How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services," In ACM Conference on Computer and Communications Security, ACM, 16 pages, 2017.
  4. G. Acar, "Online Tracking Technologies and Web Privacy," PhD thesis, KU Leuven, C. Diaz, and B. Preneel (promotors), 242 pages, 2017.
  5. E. Vanrykel, G. Acar, M. Herrmann, and C. Diaz, "Leaky Birds: Exploiting Mobile Application Traffic for Surveillance," In Financial Cryptography and Data Security - 20th International Conference, FC 2016, Lecture Notes in Computer Science, Springer-Verlag, pp. 1-22, 2016.
  6. S. Preibusch, T. Peetz, G. Acar, and B. Berendt, "Shopping for privacy: Purchase details leaked to PayPal," Electronic Commerce Research and Applications(15), pp. 52-64, 2016.
  7. E. Vanrykel, G. Acar, M. Herrmann, and C. Diaz, "Exploiting Unencrypted Mobile Application Traffic for Surveillance," Technical report, pp. 1-22, 2016.
  8. L. Olejnik, G. Acar, C. Casteluccia, and C. Diaz, "The leaking battery: A privacy analysis of the HTML5 Battery Status API," In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, Lecture Notes in Computer Science 9481, Springer-Verlag, 8 pages, 2015.
  9. G. Acar, B. Van Alsenoy, F. Piessens, C. Diaz, and B. Preneel, "Facebook Tracking Through Social Plug-ins," Technical report prepared for the Belgian Privacy Commission, 24 pages, 2015.
  10. S. Preibusch, T. Peetz, G. Acar, and B. Berendt, "Purchase details leaked to PayPal," In Financial Cryptography and Data Security - 19th International Conference, FC 2015, Lecture Notes in Computer Science, Springer-Verlag, 10 pages, 2015.
  11. G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, "The Web never forgets: Persistent tracking mechanisms in the wild," In ACM Conference on Computer and Communications Security, ACM, pp. 674-689, 2014.
  12. M. Juarez, S. Afroz, G. Acar, C. Diaz, and R. Greenstadt, "A Critical Evaluation of Website Fingerprinting Attacks," In ACM Conference on Computer and Communications Security, ACM, pp. 263-274, 2014.
  13. N. Nikiforakis, G. Acar, and D. Salinger, "Browse at your own risk," IEEE Spectrum Magazine 35(8), pp. 30-35, 2014.
  14. G. Acar, "Position paper: Obfuscation for and against device fingerprinting," In Symposium on Obfuscation, 5 pages, 2014.
  15. G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gurses, F. Piessens, and B. Preneel, "FPDetective: Dusting the web for fingerprinters," In 20th ACM Conference on Computer and Communications Security, ACM, pp. 1129-1140, 2013.