- Advanced Malware Detection Techniques
- Web Data Mining and Analysis
- Caching and Content Delivery
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Web Application Security Vulnerabilities
- Network Security and Intrusion Detection
- Green IT and Sustainability
- Multimedia Communication and Technology
- Business Process Modeling and Analysis
- Service-Oriented Architecture and Web Services
- Access Control and Trust
- IPv6, Mobility, Handover, Networks, Security
- Spam and Phishing Detection
- Peer-to-Peer Network Technologies
University of Illinois Chicago
2018-2023
University of Illinois at Springfield
2016
Single Sign-On (SSO) is both a core and critical component of user authentication authorization on the modern web, as it often offered by web mobile applications alongside credential-based to facilitate account creation login process. However, interplay between local management SSO functionality in backend leads flaws that enable or magnify hijacking attacks. These are not baked into actual protocols, but manifest due complexity supporting separate intermingling paths. As result, these types...
Most popular web browsers include "reader modes" that improve the user experience by removing un-useful page elements. Reader modes reformat to hide elements are not related page's main content. Such site navigation, advertising videos and images, most JavaScript. The intended end result is users can enjoy content they interested in, without distraction.
We describe a novel method of securing services by adding windowed whitelisting to an arbitrary and constantly changing assignment ports (or virtual ports). This is aimed at mitigating port scanning threats unauthorized intrusion attempts, protect community known users from data loss. In essence, numbers, time, IP address will be used as part the password/access mechanism; this segregates traffic so that content-based restrictions can more effective. It also provides connection-based...
Web push notifications are becoming an increasingly prevalent capability of modern web apps, intended to create a direct communication pipeline with users and increase user engagement. The seemingly straightforward functionality obscures the complexities underlying design implementation, which deviates from near-universal practice in ecosystem: ability access account (and associated functionality) practically any browser or device upon successful completion authentication process. Instead,...
Most popular web browsers include "reader modes" that improve the user experience by removing un-useful page elements. Reader modes reformat to hide elements are not related page's main content. Such site navigation, advertising videos and images, most JavaScript. The intended end result is users can enjoy content they interested in, without distraction. In this work, we consider whether mode" be widened also provide performance privacy improvements. Instead of its use as a post-render...
Modern web browsers constitute complex application platforms with a wide range of APIs and features.Critically, this includes multitude heterogeneous mechanisms that allow sites to store information explicitly or implicitly alters clientside state functionality.This behavior implicates any browser storage, cache, access control, policy mechanism as potential tracking vector.As demonstrated by prior work, vectors can manifest through elaborate behaviors exhibit varying characteristics differ...
Browsers and extensions that aim to block online ads tracking scripts predominantly rely on rules from filter lists for determining which resource requests must be blocked. These are often manually curated by a community of users. However, due the arms race between blockers ad-supported websites, these continuously get updated so as adapt novel bypassing techniques modified requests, thus rendering detection rule-generation process cumbersome reactive (which can result in major delays...