Sajjad Arshad
Sajjad Arshad
Mobile Security @Google
Verified email at iseclab.org - Homepage
Title
Cited by
Cited by
Year
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
A Kharraz, S Arshad, C Mulliner, W Robertson, E Kirda
The 25th USENIX Security Symposium, 2016
2282016
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web
T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda
The Network and Distributed System Security Symposium, 2017
772017
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
MA Bashir, S Arshad, W Robertson, C Wilson
The 25th USENIX Security Symposium, 2016
772016
Alert correlation algorithms: A survey and taxonomy
SA Mirheidari, S Arshad, R Jalili
Cyberspace Safety and Security, 183-197, 2013
572013
An anomaly-based botnet detection approach for identifying stealthy botnets
S Arshad, M Abbaspour, M Kharrazi, H Sanatkar
2011 IEEE International Conference on Computer Applications and Industrial …, 2011
382011
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions
S Arshad, A Kharraz, W Robertson
The 20th International Conference on Financial Cryptography and Data …, 2016
292016
How tracking companies circumvented ad blockers using websockets
MA Bashir, S Arshad, E Kirda, W Robertson, C Wilson
Proceedings of the Internet Measurement Conference 2018, 471-477, 2018
182018
Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance
S Arshad, A Kharraz, W Robertson
The 19th International Symposium on Research in Attacks, Intrusions and …, 2016
162016
On the Effectiveness of Type-based Control Flow Integrity
R Mirzazade farkhani, S Jafari, S Arshad, W Robertson, E Kirda, ...
Annual Computer Security Applications Conference (ACSAC), 2018
13*2018
“Recommended For You”: A First Look at Content Recommendation Networks
MA Bashir, S Arshad, C Wilson
Proceedings of the Internet Measurement Conference 2016, 2016
122016
Monitoring and forecasting drought impact on dryland farming areas
S Arshad, S Morid, MR Mobasheri, MA Alikhani, S Arshad
International journal of climatology 33 (8), 2068-2081, 2013
112013
Large-scale analysis of style injection by relative path overwrite
S Arshad, SA Mirheidari, T Lauinger, B Crispo, E Kirda, W Robertson
Proceedings of the 2018 World Wide Web Conference, 237-246, 2018
82018
Two novel server-side attacks against log file in Shared Web Hosting servers
SA Mirheidari, S Arshad, S Khoshkdahan, R Jalili
2012 International Conference for Internet Technology and Secured …, 2012
72012
Performance evaluation of shared hosting security methods
SA Mirheidari, S Arshad, S Khoshkdahan
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
72012
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing
W Blair, A Mambretti, S Arshad, M Weissbacher, W Robertson, E Kirda, ...
Network and Distributed System Security Symposium (NDSS), 2020
42020
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers
SA Mirheidari, S Arshad, S Khoshkdahan, R Jalili
The 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
42013
A Disk Scheduling Algorithm Based on ANT Colony Optimization
H Rahmani, S Arshad, ME Moghaddam
ISCA PDCCS, 2009
2*2009
Cached and Confused: Web Cache Deception in the Wild
SA Mirheidari, S Arshad, K Onarlioglu, B Crispo, E Kirda, W Robertson
USENIX Security Symposium, 2020
12020
A Longitudinal Analysis of the ads. txt Standard
MA Bashir, S Arshad, E Kirda, W Robertson, C Wilson
Proceedings of the Internet Measurement Conference, 294-307, 2019
12019
Understanding and Mitigating the Security Risks of Content Inclusion in Web Browsers
S Arshad
Khoury College of Computer Sciences, Northeastern University, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20