Sajjad Arshad

Orcid: 0000-0001-5311-451X

According to our database1, Sajjad Arshad authored at least 21 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Matter of Captchas: An Analysis of a Brittle Security Feature on the Modern Web.
Proceedings of the ACM on Web Conference 2024, 2024

2022
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
ACM Trans. Priv. Secur., 2022

2020
Understanding and Mitigating the Security Risks of Content Inclusion in Web Browsers.
CoRR, 2020

Cached and Confused: Web Cache Deception in the Wild.
Proceedings of the 29th USENIX Security Symposium, 2020

HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
A Longitudinal Analysis of the ads.txt Standard.
Proceedings of the Internet Measurement Conference, 2019

2018
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets.
CoRR, 2018

Large-Scale Analysis of Style Injection by Relative Path Overwrite.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

How Tracking Companies Circumvented Ad Blockers Using WebSockets.
Proceedings of the Internet Measurement Conference 2018, 2018

On the Effectiveness of Type-based Control Flow Integrity.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware.
Proceedings of the 25th USENIX Security Symposium, 2016

Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.
Proceedings of the 25th USENIX Security Symposium, 2016

Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

"Recommended For You": A First Look at Content Recommendation Networks.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions.
Proceedings of the Financial Cryptography and Data Security, 2016

2013
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Alert Correlation Algorithms: A Survey and Taxonomy.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Performance Evaluation of Shared Hosting Security Methods.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Two novel server-side attacks against log file in Shared Web Hosting servers.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2009
A Disk Scheduling Algorithm Based on ANT Colony Optimization.
Proceedings of the 22nd International Conference on Parallel and Distributed Computing and Communication Systems, 2009


  Loading...