Peter Snyder
Peter Snyder
Brave Software
Verified email at - Homepage
Cited by
Cited by
Adgraph: A graph-based approach to ad and tracker blocking
U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq
2020 IEEE Symposium on security and privacy (SP), 763-776, 2020
Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing
P Snyder, P Doerfler, C Kanich, D McCoy
ACM Internet Measurement Conference, 2017
Who filters the filters: Understanding the growth, usefulness and efficiency of crowdsourced ad blocking
P Snyder, A Vastel, B Livshits
Most websites don't need to vibrate: A cost-benefit approach to improving browser security
P Snyder, C Taylor, C Kanich
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Browser Feature Usage on The Modern Web
P Snyder, L Ansari, C Taylor, C Kanich
Proceedings of the 2016 ACM on Internet Measurement Conference, 97-110, 2016
Towards Realistic and Reproducible Web Crawl Measurements
J Jueckstock, S Sarker, P Snyder, A Beggs, P Papadopoulos, M Varvello, ...
Proceedings of the Web Conference 2021, 80-91, 2021
I Saw Images I Didn't Even Know I Had
JW Clarky, P Snyder, D Mccoyy, C Kanich
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
Detecting filter list evasion with event-loop-turn granularity javascript signatures
Q Chen, P Snyder, B Livshits, A Kapravelos
2021 IEEE Symposium on Security and Privacy (SP), 1715-1729, 2021
Filter list generation for underserved regions
A Sjösten, P Snyder, A Pastor, P Papadopoulos, B Livshits
Proceedings of The Web Conference 2020, 1682-1692, 2020
No Please, After You: Detecting Fraud in Affiliate Marketing Networks.
P Snyder, C Kanich
Workshop on the Economics of Information Security, 2015
Keeping out the masses: Understanding the popularity and implications of internet paywalls
P Papadopoulos, P Snyder, D Athanasakis, B Livshits
Proceedings of The Web Conference 2020, 1433-1444, 2020
Characterizing Fraud and Its Ramifications in Affiliate Marketing Networks
P Snyder, C Kanich
Journal of Cybersecurity 2 (1), 71-81, 2016
Speedreader: Reader mode made fast and private
M Ghasemisharif, P Snyder, A Aucinas, B Livshits
The World Wide Web Conference, 526-537, 2019
Sugarcoat: Programmatically generating privacy-preserving, web-compatible resource replacements for content blocking
M Smith, P Snyder, B Livshits, D Stefan
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Star: Secret sharing for private threshold aggregation reporting
A Davidson, P Snyder, EB Quirk, J Genereux, B Livshits, H Haddadi
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Yao’s Garbled Circuits: Recent Directions and Implementations
P Snyder
Measuring the privacy vs. compatibility trade-off in preventing third-party stateful tracking
J Jueckstock, P Snyder, S Sarker, A Kapravelos, B Livshits
Proceedings of the ACM Web Conference 2022, 710-720, 2022
Cloudsweeper: Enabling Data-centric Document Management for Secure Cloud Archives
P Snyder, C Kanich
Proceedings of the 2013 ACM Workshop on Cloud Computing Security, 47-54, 2013
Measuring UID smuggling in the wild
A Randall, P Snyder, A Ukani, AC Snoeren, GM Voelker, S Savage, ...
Proceedings of the 22nd ACM Internet Measurement Conference, 230-243, 2022
Blocked or broken? Automatically detecting when privacy interventions break websites
M Smith, P Snyder, M Haller, B Livshits, D Stefan, H Haddadi
Proceedings on Privacy Enhancing Technologies 19 (1), 2022
The system can't perform the operation now. Try again later.
Articles 1–20