Skip to main content

Showing 1–6 of 6 results for author: Mirheidari, S A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1912.10190  [pdf, other

    cs.CR

    Cached and Confused: Web Cache Deception in the Wild

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson

    Abstract: Web cache deception (WCD) is an attack proposed in 2017, where an attacker tricks a caching proxy into erroneously storing private information transmitted over the Internet and subsequently gains unauthorized access to that cached data. Due to the widespread use of web caches and, in particular, the use of massive networks of caching proxies deployed by content distribution network (CDN) providers… ▽ More

    Submitted 13 February, 2020; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: USENIX Security Symposium, Boston, MA, USA, August 2020

  2. Performance Evaluation of Shared Hosting Security Methods

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan

    Abstract: Shared hosting is a kind of web hosting in which multiple websites reside on one webserver. It is cost-effective and makes the administration easier for websites' owners. However, shared hosting has some performance and security issues. In default shared hosting configuration, all websites' scripts are executed under the webserver's user account regardless of their owners. Therefore, a website is… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, June 2012

  3. arXiv:1811.00923  [pdf

    cs.CR

    Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili

    Abstract: Shared Web Hosting service enables hosting multitude of websites on a single powerful server. It is a well-known solution as many people share the overall cost of server maintenance and also, website owners do not need to deal with administration issues is not necessary for website owners. In this paper, we illustrate how shared web hosting service works and demonstrate the security weaknesses ris… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: IEEE Conference for Internet Technology and Secured Transactions (ICITST), London, UK, December 2012

  4. A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili

    Abstract: With the growing of network technology along with the need of human for social interaction, using websites nowadays becomes critically important which leads in the increasing number of websites and servers. One popular solution for managing these large numbers of websites is using shared web hosting servers in order to decrease the overall cost of server maintenance. Despite affordability, this so… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, July 2013

  5. Alert Correlation Algorithms: A Survey and Taxonomy

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili

    Abstract: Alert correlation is a system which receives alerts from heterogeneous Intrusion Detection Systems and reduces false alerts, detects high level patterns of attacks, increases the meaning of occurred incidents, predicts the future states of attacks, and detects root cause of attacks. To reach these goals, many algorithms have been introduced in the world with many advantages and disadvantages. In t… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: Symposium on Cyberspace Safety and Security (CSS), Lecture Notes in Computer Science, Springer International Publishing, vol 8300, pp 183-197, Zhangjiajie, China, November 2013

  6. Large-Scale Analysis of Style Injection by Relative Path Overwrite

    Authors: Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William Robertson

    Abstract: Relative Path Overwrite (RPO) is a recent technique to inject style directives into sites even when no style sink or markup injection vulnerability is present. It exploits differences in how browsers and web servers interpret relative paths (i.e., path confusion) to make a HTML page reference itself as a stylesheet; a simple text injection vulnerability along with browsers' leniency in parsing CSS… ▽ More

    Submitted 13 February, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Comments: The Web Conference (WWW), Lyon, France, April 2018