Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2026 Accepted Papers

View the detailed program page to learn when each paper will be presented during the upcoming event.

A Closer Look at QUIC Traffic: Characterizing QUIC Usage and Privacy Issues in the Wild

Shaoqi Jiang (Concordia University), Mohammad Mannan (Concordia University)

Echoes of the Past: Detecting and Analyzing DNS Re-registrations using Real-time Telemetry and Generative AI

Muhammad Muzammil (Stony Brook University), Zafir Ansari (Infoblox), Nick Nikiforakis (Stony Brook University), Darin Johnson (Infoblox)

Finding Behavioural Biometrics Scripts on the Web Using Dynamic Taint Analysis

Alexandru Bara (University of Waterloo), Aswad Tariq (University of Waterloo), Urs Hengartner (University of Waterloo)

From Matrix to Metrics: Introducing and Applying a Configuration Matrix to Evaluate DMARC Policies

Tobias Länge (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Fabian Lucas Ballreich (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Anne Hennig (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Peter Mayer (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany), Melanie Volkamer (SECUSO, Karlsruhe Institute of Technology, Karlsruhe, Germany)

From Reports to Insights: Challenges and Opportunities in Citizen-Driven Malicious Website Datasets

Daan Vansteenhuyse (DistriNet, KU Leuven), Hadji Musaev (DistriNet, KU Leuven), Lieven Desmet (DistriNet, KU Leuven)

NinjaDoH: A Censorship-Resistant Moving Target DoH Server Using Hyperscalers and IPNS

Scott Seidenberger (University of Oklahoma), Marc Beret (University of Oklahoma), Raveen Wijewickrama (University of Texas at San Antonio), Murtuza Jadliwala (University of Texas at San Antonio), Anindya Maiti (University of Oklahoma)

Not What It Used To Be: Generational Analysis of Top-level Domain Reputation

Janos Szurdi (Palo Alto Networks), Reethika Ramesh (Palo Alto Networks), Ram Sundara Raman (University of California Santa Cruz), Daiping Liu (Palo Alto Networks)

The Fragility of DNS-Based Security Under Imperfect DNS Operation

Tino Hager (Mailtower.app), Ronald Petrlic (Nuremberg Institute of Technology)

Two Heads are Better Than One: Analysing Browser Extensions Across Stores

Abdullah Hassan Chaudhry (CISPA Helmholtz Center for Information Security), Valentino Dalla Valle (CISPA Helmholtz Center for Information Security), Aurore Fass (Inria Centre at Université Côte d’Azur)

Work-in-progress: Assertive Trace

Shun Kashiwa (UC San Diego), Michael Coblenz (UC San Diego), Deian Stefan (UC San Diego)

Work-in-progress: Deobfuscating Academic Email Addresses: A Security Evaluation of Modern LLMs

Ron Amsalem (Ariel University), Harel Berger (Ariel University)

Work-in-progress: From the Wild Web to the Zoo: A Realistic Environment for Evaluating Web Agents

Brian Grinstead (Mozilla Corporation), Christoph Kerschbaumer (Mozilla Corporation), Mariana Meireles (Independent), Cameron Allen (UC Berkeley)

Work-in-progress: JaVulIn: Scalable Vulnerability Injection for JavaScript Web Applications

Dominic Troppmann (CISPA Helmholtz Center for Information Security), Cristian-Alexandru Staicu (Endor Labs), Aurore Fass (Inria Centre at Université Côte d’Azur)

Work-in-progress: RegTrack: Uncovering Global Disparities in Third-party Advertising and Tracking

Tanya Prasad (University of British Columbia), Rut Vora (University of British Columbia), Soo Yee Lim (University of British Columbia), Nguyen Phong Hoang (University of British Columbia), Thomas Pasquier (University of British Columbia)

Work-in-progress: Spurious Credentials in Breach Compilations

Lucas Stephens (Oregon State University), Jacob Porter (Oregon State University), Zane Ma (Oregon State University)

Work-in-progress: Uncovering the Invisible: A Large-Scale Analysis of Service Worker Security Risks in the Wild

Sivakanesan Dhanushkanda (Old Dominion University), Mustafa Ibrahim (Old Dominion University), Shuai Hao (Old Dominion University)