Mohammad Ghasemisharif

ORCID: 0009-0002-8710-7742
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Web Data Mining and Analysis
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Web Application Security Vulnerabilities
  • Network Security and Intrusion Detection
  • Green IT and Sustainability
  • Multimedia Communication and Technology
  • Business Process Modeling and Analysis
  • Service-Oriented Architecture and Web Services
  • Access Control and Trust
  • IPv6, Mobility, Handover, Networks, Security
  • Spam and Phishing Detection
  • Peer-to-Peer Network Technologies

University of Illinois Chicago
2018-2023

University of Illinois at Springfield
2016

Single Sign-On (SSO) is both a core and critical component of user authentication authorization on the modern web, as it often offered by web mobile applications alongside credential-based to facilitate account creation login process. However, interplay between local management SSO functionality in backend leads flaws that enable or magnify hijacking attacks. These are not baked into actual protocols, but manifest due complexity supporting separate intermingling paths. As result, these types...

10.1109/sp46214.2022.9833753 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2022-05-01

Most popular web browsers include "reader modes" that improve the user experience by removing un-useful page elements. Reader modes reformat to hide elements are not related page's main content. Such site navigation, advertising videos and images, most JavaScript. The intended end result is users can enjoy content they interested in, without distraction.

10.1145/3308558.3313596 article EN 2019-05-13

We describe a novel method of securing services by adding windowed whitelisting to an arbitrary and constantly changing assignment ports (or virtual ports). This is aimed at mitigating port scanning threats unauthorized intrusion attempts, protect community known users from data loss. In essence, numbers, time, IP address will be used as part the password/access mechanism; this segregates traffic so that content-based restrictions can more effective. It also provides connection-based...

10.1109/eit.2016.7535294 article EN 2016-05-01

Web push notifications are becoming an increasingly prevalent capability of modern web apps, intended to create a direct communication pipeline with users and increase user engagement. The seemingly straightforward functionality obscures the complexities underlying design implementation, which deviates from near-universal practice in ecosystem: ability access account (and associated functionality) practically any browser or device upon successful completion authentication process. Instead,...

10.1145/3627106.3627186 article EN Annual Computer Security Applications Conference 2023-12-02

Most popular web browsers include "reader modes" that improve the user experience by removing un-useful page elements. Reader modes reformat to hide elements are not related page's main content. Such site navigation, advertising videos and images, most JavaScript. The intended end result is users can enjoy content they interested in, without distraction. In this work, we consider whether mode" be widened also provide performance privacy improvements. Instead of its use as a post-render...

10.48550/arxiv.1811.03661 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Modern web browsers constitute complex application platforms with a wide range of APIs and features.Critically, this includes multitude heterogeneous mechanisms that allow sites to store information explicitly or implicitly alters clientside state functionality.This behavior implicates any browser storage, cache, access control, policy mechanism as potential tracking vector.As demonstrated by prior work, vectors can manifest through elaborate behaviors exhibit varying characteristics differ...

10.14722/ndss.2023.24072 article EN 2023-01-01

Browsers and extensions that aim to block online ads tracking scripts predominantly rely on rules from filter lists for determining which resource requests must be blocked. These are often manually curated by a community of users. However, due the arms race between blockers ad-supported websites, these continuously get updated so as adapt novel bypassing techniques modified requests, thus rendering detection rule-generation process cumbersome reactive (which can result in major delays...

10.1145/3576915.3616637 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15
Coming Soon ...