Follow
Sajjad "JJ" Arshad
Sajjad "JJ" Arshad
Googler
Verified email at iseclab.org - Homepage
Title
Cited by
Cited by
Year
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
A Kharraz, S Arshad, C Mulliner, W Robertson, E Kirda
The 25th USENIX Security Symposium, 2016
5502016
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web
T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda
The Network and Distributed System Security Symposium, 2017
2202017
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
MA Bashir, S Arshad, W Robertson, C Wilson
The 25th USENIX Security Symposium, 2016
1562016
Alert correlation algorithms: A survey and taxonomy
SA Mirheidari, S Arshad, R Jalili
Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013
962013
On the Effectiveness of Type-based Control Flow Integrity
R Mirzazade farkhani, S Jafari, S Arshad, W Robertson, E Kirda, ...
Annual Computer Security Applications Conference (ACSAC), 2018
59*2018
An anomaly-based botnet detection approach for identifying stealthy botnets
S Arshad, M Abbaspour, M Kharrazi, H Sanatkar
2011 IEEE International Conference on Computer Applications and Industrial …, 2011
542011
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions
S Arshad, A Kharraz, W Robertson
The 20th International Conference on Financial Cryptography and Data …, 2016
492016
How tracking companies circumvented ad blockers using websockets
MA Bashir, S Arshad, E Kirda, W Robertson, C Wilson
Proceedings of the Internet Measurement Conference 2018, 471-477, 2018
462018
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing
W Blair, A Mambretti, S Arshad, M Weissbacher, W Robertson, E Kirda, ...
Network and Distributed System Security Symposium (NDSS), 2020
452020
Cached and Confused: Web Cache Deception in the Wild
SA Mirheidari, S Arshad, K Onarlioglu, B Crispo, E Kirda, W Robertson
USENIX Security Symposium, 2020
382020
Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance
S Arshad, A Kharraz, W Robertson
The 19th International Symposium on Research in Attacks, Intrusions and …, 2016
322016
A Longitudinal Analysis of the ads. txt Standard
MA Bashir, S Arshad, E Kirda, W Robertson, C Wilson
Proceedings of the Internet Measurement Conference, 294-307, 2019
312019
“Recommended For You”: A First Look at Content Recommendation Networks
MA Bashir, S Arshad, C Wilson
Proceedings of the Internet Measurement Conference 2016, 2016
212016
Monitoring and forecasting drought impact on dryland farming areas.
S Arshad, S Morid, MR Mobasheri, MA Alikhani, S Arshad
International journal of climatology 33 (8), 2013
212013
Two novel server-side attacks against log file in Shared Web Hosting servers
SA Mirheidari, S Arshad, S Khoshkdahan, R Jalili
2012 International Conference for Internet Technology and Secured …, 2012
142012
Large-scale analysis of style injection by relative path overwrite
S Arshad, SA Mirheidari, T Lauinger, B Crispo, E Kirda, W Robertson
Proceedings of the 2018 World Wide Web Conference, 237-246, 2018
112018
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers
SA Mirheidari, S Arshad, S Khoshkdahan, R Jalili
The 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
112013
Performance evaluation of shared hosting security methods
SA Mirheidari, S Arshad, S Khoshkdahan
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
112012
Hotfuzz: Discovering temporal and spatial denial-of-service vulnerabilities through guided micro-fuzzing
W Blair, A Mambretti, S Arshad, M Weissbacher, W Robertson, E Kirda, ...
ACM Transactions on Privacy and Security 25 (4), 1-35, 2022
72022
A Disk Scheduling Algorithm Based on ANT Colony Optimization
H Rahmani, S Arshad, ME Moghaddam
ISCA PDCCS, 2009
4*2009
The system can't perform the operation now. Try again later.
Articles 1–20