| | Cached and Confused: Web Cache Deception in the Wild [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past | 2 comments |
|
| | HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities ... [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | A Longitudinal Analysis of the ads.txt Standard [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | Understanding and Mitigating Security Risks of Content Inclusion in Web Browsers [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | On the Effectiveness of Type-Based Control Flow Integrity [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | Tracking Companies Circumvented Ad Blockers Using WebSockets [pdf] (sajjadium.github.io) |
| 2 points by sajjadium on Feb 27, 2020 | past |
|
| | Large-Scale Analysis of Style Injection by Relative Path Overwrite [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | Thou Shalt Not Depend on Me: Analysing Use of Outdated JavaScript Libraries ... (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | “Recommended for You”: A First Look at Content Recommendation Networks [pdf] (sajjadium.github.io) |
| 2 points by sajjadium on Feb 27, 2020 | past |
|
| | Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | Tracing Information Flows Between Ad Exchanges Using Retargeted Ads [pdf] (sajjadium.github.io) |
| 2 points by sajjadium on Feb 27, 2020 | past |
|
| | Unveil: A Large-Scale, Automated Approach to Detecting Ransomware [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | Alert Correlation Algorithms: A Survey and Taxonomy [pdf] (sajjadium.github.io) |
| 2 points by sajjadium on Feb 27, 2020 | past |
|
| | A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | Comparison of Routing Protocols in Mobile Ad-Hoc Wireless Networks [pdf] (sajjadium.github.io) |
| 3 points by sajjadium on Feb 27, 2020 | past |
|
| | Two Novel Server-Side Attacks Against Log File in Shared Web Hosting Servers [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | Performance Evaluation of Shared Hosting Security Methods [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 27, 2020 | past |
|
| | An Anomaly-Based Botnet Detection Approach for Identifying Stealthy Botnets [pdf] (sajjadium.github.io) |
| 1 point by sajjadium on Feb 26, 2020 | past |
|
| | A disk scheduling algorithm based on ant colony optimization (2009) [pdf] (sajjadium.github.io) |
| 47 points by sajjadium on Feb 26, 2020 | past | 8 comments |
|