Alert correlation algorithms: A survey and taxonomy SA Mirheidari, S Arshad, R Jalili Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013 | 99 | 2013 |
Cached and confused: Web cache deception in the wild SA Mirheidari, S Arshad, K Onarlioglu, B Crispo, E Kirda, W Robertson 29th USENIX Security Symposium (USENIX Security 20), 665-682, 2020 | 43 | 2020 |
Web cache deception escalates! SA Mirheidari, M Golinelli, K Onarlioglu, E Kirda, B Crispo 31st USENIX Security Symposium (USENIX Security 22), 179-196, 2022 | 25 | 2022 |
Two novel server-side attacks against log file in Shared Web Hosting servers SA Mirheidari, S Arshad, S Khoshkdahan, R Jalili 2012 International Conference for Internet Technology and Secured …, 2012 | 15 | 2012 |
A comprehensive approach to abusing locality in shared web hosting servers SA Mirheidari, S Arshad, S Khoshkdahan, R Jalili 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 13 | 2013 |
You’ve got (a reset) mail: A security analysis of email-based password reset procedures T Innocenti, SA Mirheidari, A Kharraz, B Crispo, E Kirda Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021 | 12 | 2021 |
The full gamut of an attack: An empirical analysis of OAuth csrf in the wild M Benolli, SA Mirheidari, E Arshad, B Crispo Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021 | 12 | 2021 |
Large-scale analysis of style injection by relative path overwrite S Arshad, SA Mirheidari, T Lauinger, B Crispo, E Kirda, W Robertson Proceedings of the 2018 World Wide Web Conference, 237-246, 2018 | 12 | 2018 |
Performance evaluation of shared hosting security methods SA Mirheidari, S Arshad, S Khoshkdahan 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 10 | 2012 |
OAuth 2.0 Redirect URI Validation Falls Short, Literally T Innocenti, M Golinelli, K Onarlioglu, A Mirheidari, B Crispo, E Kirda Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | 5 | 2023 |
Generative adversarial networks for subdomain enumeration L Degani, F Bergadano, SA Mirheidari, F Martinelli, B Crispo Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, 1636-1645, 2022 | 4 | 2022 |
Confused by Path: Analysis of Path Confusion Based Attacks SA Mirheidari University of Trento, 2020 | | 2020 |