default search action
Nataliia Bielova
Person information
- affiliation: Cóte d'Azur University, France
- affiliation: INRIA, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Colin M. Gray, Cristiana Teixeira Santos, Nataliia Bielova, Thomas Mildner:
An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building. CHI 2024: 289:1-289:22 - [c28]Colin M. Gray, Johanna T. Gunawan, René Schäfer, Nataliia Bielova, Lorena Sánchez Chamorro, Katie Seaborn, Thomas Mildner, Hauke Sandhaus:
Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices. CHI Extended Abstracts 2024: 482:1-482:6 - [c27]Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, Estelle Hary:
The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions. USENIX Security Symposium 2024 - [e3]Colin M. Gray, Johanna Gunawan, René Schäfer, Nataliia Bielova, Lorena Sánchez Chamorro, Katie Seaborn, Thomas Mildner, Hauke Sandhaus:
Proceedings of the Workshop Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices (DDPCHI 2024) co-located with the CHI Conference on Human Factors in Computing Systems (CHI 2024), Hybrid Event, Honolulu, HI, USA, May 11-16, 2024. CEUR Workshop Proceedings 3720, CEUR-WS.org 2024 [contents] - [i18]Cristiana Santos, Nataliia Bielova, Vincent Roca, Mathieu Cunche, Gilles Mertens, Karel Kubicek, Hamed Haddadi:
Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive. CoRR abs/2402.02877 (2024) - [i17]Gayatri Priyadarsini Kancherla, Nataliia Bielova, Cristiana Santos, Abhishek Bichhawat:
Measuring Compliance of Consent Revocation on the Web. CoRR abs/2411.15414 (2024) - 2023
- [c26]Colin M. Gray, Cristiana Teixeira Santos, Nataliia Bielova:
Towards a Preliminary Ontology of Dark Patterns Knowledge. CHI Extended Abstracts 2023: 286:1-286:9 - [i16]Colin M. Gray, Thomas Mildner, Nataliia Bielova:
Temporal Analysis of Dark Patterns: A Case Study of a User's Odyssey to Conquer Prime Membership Cancellation through the "Iliad Flow". CoRR abs/2309.09635 (2023) - [i15]Colin M. Gray, Cristiana Teixeira Santos, Nataliia Bielova, Thomas Mildner:
An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building. CoRR abs/2309.09640 (2023) - [i14]Gilles Mertens, Nataliia Bielova, Vincent Roca, Cristiana Santos, Michael Toth:
Google Tag Manager: Hidden Data Leaks and its Potential Violations under EU Data Protection Law. CoRR abs/2312.08806 (2023) - 2022
- [j8]Imane Fouad, Cristiana Teixeira Santos, Arnaud Legout, Nataliia Bielova:
My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting. Proc. Priv. Enhancing Technol. 2022(3): 79-98 (2022) - [j7]Michael Toth, Nataliia Bielova, Vincent Roca:
On dark patterns and manipulation of website publishers by CMPs. Proc. Priv. Enhancing Technol. 2022(3): 478-497 (2022) - 2021
- [b2]Nataliia Bielova:
Protecting Privacy of Web Users. (Protection de la vie privée des internautes). Côte d'Azur University, Nice, France, 2021 - [c25]Cristiana Teixeira Santos, Midas Nouwens, Michael Toth, Nataliia Bielova, Vincent Roca:
Consent Management Platforms Under the GDPR: Processors and/or Controllers? APF 2021: 47-69 - [c24]Colin M. Gray, Cristiana Teixeira Santos, Nataliia Bielova, Michael Toth, Damian Clifford:
Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective. CHI 2021: 172:1-172:18 - [c23]Vera Wesselkamp, Imane Fouad, Cristiana Teixeira Santos, Yanis Boussad, Nataliia Bielova, Arnaud Legout:
In-Depth Technical and Legal Analysis of Tracking on Health Related Websites with ERNIE Extension. WPES@CCS 2021: 151-166 - [i13]Cristiana Santos, Midas Nouwens, Michael Toth, Nataliia Bielova, Vincent Roca:
Consent Management Platforms under the GDPR: processors and/or controllers? CoRR abs/2104.06861 (2021) - [i12]Imane Fouad, Cristiana Santos, Arnaud Legout, Nataliia Bielova:
Did I delete my cookies? Cookies respawning with browser fingerprinting. CoRR abs/2105.04381 (2021) - 2020
- [j6]Imane Fouad, Nataliia Bielova, Arnaud Legout, Natasa Sarafijanovic-Djukic:
Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels. Proc. Priv. Enhancing Technol. 2020(2): 499-518 (2020) - [j5]Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, Gildas Avoine:
Browser Fingerprinting: A Survey. ACM Trans. Web 14(2): 8:1-8:33 (2020) - [c22]Célestin Matte, Cristiana Santos, Nataliia Bielova:
Purposes in IAB Europe's TCF: Which Legal Basis and How Are They Used by Advertisers? APF 2020: 163-185 - [c21]Imane Fouad, Cristiana Santos, Feras Al Kassar, Nataliia Bielova, Stefano Calzavara:
On Compliance of Cookie Purposes with the Purpose Specification Principle. EuroS&P Workshops 2020: 326-333 - [c20]Célestin Matte, Nataliia Bielova, Cristiana Santos:
Do Cookie Banners Respect my Choice? : Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework. SP 2020: 791-809 - [i11]Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, Cédric Lauradoux, Daniel Le Métayer, Vincent Roca:
DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems. CoRR abs/2008.01621 (2020) - [i10]Colin M. Gray, Cristiana Santos, Nataliia Bielova, Michael Toth, Damian Clifford:
Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective. CoRR abs/2009.10194 (2020)
2010 – 2019
- 2019
- [c19]Coline Boniface, Imane Fouad, Nataliia Bielova, Cédric Lauradoux, Cristiana Santos:
Security Analysis of Subject Access Request Procedures - How to Authenticate Data Subjects Safely When They Request for Their Data. APF 2019: 182-209 - [i9]Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, Gildas Avoine:
Browser Fingerprinting: A survey. CoRR abs/1905.01051 (2019) - [i8]Célestin Matte, Nataliia Bielova, Cristiana Santos:
Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework. CoRR abs/1911.09964 (2019) - [i7]Cristiana Santos, Nataliia Bielova, Célestin Matte:
Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners. CoRR abs/1912.07144 (2019) - 2018
- [c18]Gábor György Gulyás, Dolière Francis Somé, Nataliia Bielova, Claude Castelluccia:
To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins. WPES@CCS 2018: 14-27 - [c17]Minh Ngo, Nataliia Bielova, Cormac Flanagan, Tamara Rezk, Alejandro Russo, Thomas Schmitz:
A Better Facet of Dynamic Information Flow Control. WWW (Companion Volume) 2018: 731-739 - [i6]Gábor György Gulyás, Dolière Francis Somé, Nataliia Bielova, Claude Castelluccia:
To Extend or not to Extend: on the Uniqueness of Browser Extensions and Web Logins. CoRR abs/1808.07359 (2018) - [i5]Imane Fouad, Nataliia Bielova, Arnaud Legout, Natasa Sarafijanovic-Djukic:
Tracking the Pixels: Detecting Web Trackers via Analyzing Invisible Pixels. CoRR abs/1812.01514 (2018) - 2017
- [c16]Nataliia Bielova:
Web Tracking Technologies and Protection Mechanisms. CCS 2017: 2607-2609 - [c15]Nataliia Bielova, Marco Gaboardi:
PLAS 2017: ACM SIGSAC Workshop on Programming Languages and Analysis for Security. CCS 2017: 2639-2640 - [c14]Dolière Francis Somé, Nataliia Bielova, Tamara Rezk:
Control What You Include! - Server-Side Protection Against Third Party Web Tracking. ESSoS 2017: 115-132 - [c13]Dolière Francis Somé, Nataliia Bielova, Tamara Rezk:
On the Content Security Policy Violations due to the Same-Origin Policy. WWW 2017: 877-886 - [i4]Dolière Francis Somé, Nataliia Bielova, Tamara Rezk:
Control What You Include! Server-Side Protection against Third Party Web Tracking. CoRR abs/1703.07578 (2017) - [i3]Nataliia Bielova, Nikolaos Laoutaris, Arvind Narayanan, Nick Nikiforakis:
Online Privacy and Web Transparency (Dagstuhl Seminar 17162). Dagstuhl Reports 7(4): 83-106 (2017) - 2016
- [c12]Nataliia Bielova:
Short Paper: Dynamic leakage: A Need for a New Quantitative Information Flow Measure. PLAS@CCS 2016: 83-88 - [c11]Frédéric Besson, Nataliia Bielova, Thomas P. Jensen:
Hybrid Monitoring of Attacker Knowledge. CSF 2016: 225-238 - [c10]Nataliia Bielova, Tamara Rezk:
Spot the Difference: Secure Multi-execution and Multiple Facets. ESORICS (1) 2016: 501-519 - [c9]Nataliia Bielova, Tamara Rezk:
A Taxonomy of Information Flow Monitors. POST 2016: 46-67 - [i2]Dolière Francis Somé, Nataliia Bielova, Tamara Rezk:
On the Content Security Policy Violations due to the Same-Origin Policy. CoRR abs/1611.02875 (2016) - [i1]Nataliia Bielova, Frédéric Besson, Thomas P. Jensen:
Using JavaScript Monitoring to Prevent Device Fingerprinting. ERCIM News 2016(106) (2016) - 2015
- [e2]Frank Piessens, Juan Caballero, Nataliia Bielova:
Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings. Lecture Notes in Computer Science 8978, Springer 2015, ISBN 978-3-319-15617-0 [contents] - 2014
- [c8]Frédéric Besson, Nataliia Bielova, Thomas P. Jensen:
Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach. NordSec 2014: 181-196 - [e1]Jan Jürjens, Frank Piessens, Nataliia Bielova:
Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Lecture Notes in Computer Science 8364, Springer 2014, ISBN 978-3-319-04896-3 [contents] - 2013
- [j4]Nataliia Bielova:
Survey on JavaScript security policies and their enforcement mechanisms in a web browser. J. Log. Algebraic Methods Program. 82(8): 243-262 (2013) - [c7]Frédéric Besson, Nataliia Bielova, Thomas P. Jensen:
Hybrid Information Flow Monitoring against Web Tracking. CSF 2013: 240-254 - 2012
- [j3]Nataliia Bielova, Fabio Massacci:
Iterative enforcement by suppression: Towards practical enforcement theories. J. Comput. Secur. 20(1): 51-79 (2012) - 2011
- [b1]Nataliia Bielova:
A theory of constructive and predictable runtime enforcement mechanisms. University of Trento, Italy, 2011 - [j2]Nataliia Bielova, Fabio Massacci:
Do you really mean what you actually enforced? - Edited automata revisited. Int. J. Inf. Sec. 10(4): 239-254 (2011) - [c6]Nataliia Bielova, Fabio Massacci:
Predictability of Enforcement. ESSoS 2011: 73-86 - [c5]Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens:
Reactive non-interference for a browser model. NSS 2011: 97-104 - [c4]Nataliia Bielova, Fabio Massacci:
Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies. POLICY 2011: 89-96
2000 – 2009
- 2009
- [j1]Nataliia Bielova, Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Sri Rejeki Siahaan:
Matching in security-by-contract for mobile code. J. Log. Algebraic Methods Program. 78(5): 340-358 (2009) - [c3]Nataliia Bielova, Fabio Massacci, Andrea Micheletti:
Towards Practical Enforcement Theories. NordSec 2009: 239-254 - 2008
- [c2]Nataliia Bielova, Marco Dalla Torre, Nicola Dragoni, Ida Sri Rejeki Siahaan:
Matching Policies with Security Claims of Mobile Applications. ARES 2008: 128-135 - [c1]Nataliia Bielova, Fabio Massacci:
Do You Really Mean What You Actually Enforced?. Formal Aspects in Security and Trust 2008: 287-301
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 20:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint