The use of blockchains for automated and adversarial trading has become
...
A core problem in the development and maintenance of crowd-sourced filte...
We identify a new class of side-channels in browsers that are not mitiga...
While quantitative automation related to trading crypto-assets such as E...
In practice and research, threshold aggregation systems – that attempt...
In order to preserve the possibility of an Internet that is free at the ...
Much of the recent excitement around decentralized finance (DeFi) comes ...
Online advertising fuels the (seemingly) free internet. However, althoug...
Recommender systems are commonly trained on centrally collected user
int...
In this paper, we investigate two methods that allow us to automatically...
The median webpage has increased in size by more than 80
years. This ext...
While much current web privacy research focuses on browser fingerprintin...
Mobile web browsing has recently surpassed desktop browsing both in term...
Online advertising fuels the (seemingly) free internet. However, althoug...
Credit allows a lender to loan out surplus capital to a borrower. In the...
Scalability has been a bottleneck for major blockchains such as Bitcoin ...
The Global Financial Crisis of 2008, caused by excessive financial risk,...
CAPTCHA systems have been widely deployed to identify and block fraudule...
Recent advances in cloud computing have simplified the way that both sof...
Filter lists play a large and growing role in protecting and assisting w...
Metering is an approach developed to assign cost to smart contract execu...
In this paper, we design and deploy a synchronized multi-vantage point w...
Online advertising has been a long-standing concern for user privacy and...
Funding the production and distribution of quality online content is an ...
In the last year we have seen a great deal of both academic and practica...
Asynchrony has become an inherent element of JavaScript, as an effort to...
While pump-and-dump schemes have attracted the attention of cryptocurren...
Nowadays, all major web browsers have a private browsing mode. However, ...
Most popular web browsers include "reader modes" that improve the user
e...
Ad and tracking blocking extensions are among the most popular browser
e...
Decentralized content curation is the process through which uploaded pos...
Filter lists are widely deployed by adblockers to block ads and other fo...
Analyzing Ethereum bytecode, rather than the source code from which it w...
As malware, exploits, and cyber-attacks advance over time, so do the
mit...