Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Cached and Confused: Web Cache Deception in the Wild [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past | 2 comments
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities ... [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
A Longitudinal Analysis of the ads.txt Standard [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
Understanding and Mitigating Security Risks of Content Inclusion in Web Browsers [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
On the Effectiveness of Type-Based Control Flow Integrity [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
Tracking Companies Circumvented Ad Blockers Using WebSockets [pdf] (sajjadium.github.io)
2 points by sajjadium on Feb 27, 2020 | past
Large-Scale Analysis of Style Injection by Relative Path Overwrite [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
Thou Shalt Not Depend on Me: Analysing Use of Outdated JavaScript Libraries ... (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
“Recommended for You”: A First Look at Content Recommendation Networks [pdf] (sajjadium.github.io)
2 points by sajjadium on Feb 27, 2020 | past
Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads [pdf] (sajjadium.github.io)
2 points by sajjadium on Feb 27, 2020 | past
Unveil: A Large-Scale, Automated Approach to Detecting Ransomware [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
Alert Correlation Algorithms: A Survey and Taxonomy [pdf] (sajjadium.github.io)
2 points by sajjadium on Feb 27, 2020 | past
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
Comparison of Routing Protocols in Mobile Ad-Hoc Wireless Networks [pdf] (sajjadium.github.io)
3 points by sajjadium on Feb 27, 2020 | past
Two Novel Server-Side Attacks Against Log File in Shared Web Hosting Servers [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
Performance Evaluation of Shared Hosting Security Methods [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 27, 2020 | past
An Anomaly-Based Botnet Detection Approach for Identifying Stealthy Botnets [pdf] (sajjadium.github.io)
1 point by sajjadium on Feb 26, 2020 | past
A disk scheduling algorithm based on ant colony optimization (2009) [pdf] (sajjadium.github.io)
47 points by sajjadium on Feb 26, 2020 | past | 8 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: