- document
-
Van Eijk, Rob (author), Asghari, H. (author), Winter, Philipp (author), Narayanan, Arvind (author)The web is global, but privacy laws differ by country. Which set of privacy rules do websites follow? We empirically study this question by detecting and analyzing cookie notices in an automated way. We crawl 1,500 European, American,and Canadian websites from each of 18 countries. We detect cookie notices on 40% of websites in our sample. We...conference paper 2019
- document
- Pudane, B. (author), Rataj, Michal (author), Molin, E.J.E. (author), Mouter, N. (author), Asghari, H. (author), van Cranenburgh, S. (author), Chorus, C.G. (author) conference paper 2018
- document
-
Lone, Q.B. (author), Luckie, Matthew (author), Korczyński, MacIej (author), Asghari, H. (author), Javed, Mobin (author), van Eeten, M.J.G. (author)Internet measurement tools are used to make inferences about network policies and practices across the Internet, such as censorship, traffic manipulation, bandwidth, and security measures. Some tools must be run from vantage points within individual networks, so are dependent on volunteer recruitment. A small pool of volunteers limits the...conference paper 2018
- document
- Bisogni, F. (author), Asghari, H. (author), van Eeten, M.J.G. (author) conference paper 2017
- document
- Asghari, H. (author), Mahieu, R.L.P. (author), Mittal, Prateek (author), Greenstadt, Rachel (author) conference paper 2017
- document
-
Asghari, H. (author), Ciere, M. (author), Van Eeten, M.J.G. (author)Research on botnet mitigation has focused predominantly on methods to technically disrupt the commandand-control infrastructure. Much less is known about the effectiveness of large-scale efforts to clean up infected machines. We analyze longitudinal data from the sinkhole of Conficker, one the largest botnets ever seen, to assess the impact of...conference paper 2015
- document
-
Moreira Moura, G.C. (author), Ganan, C.H.G. (author), Lone, Q.B. (author), Poursaied, P. (author), Asghari, H. (author), Van Eeten, M.J.G. (author)IP address counts are typically used as a surrogate metric for the number of hosts in a network, as in the case of ISP rankings based on botnet infected addresses. However, due to effects of dynamic IP address allocation, such counts tend to overestimate the number of hosts, sometimes by an order of magnitude. In the literature, the rate at...conference paper 2015
- document
- Tajalizadehkhoob, S.T. (author), Asghari, H. (author), Ganan, C. (author), Van Eeten, M.J.G. (author) conference paper 2014
- document
-
Asghari, H. (author), Van Eeten, M.J.G. (author), Mueller, M. (author)Large and impressive data collection efforts often fail to make their data useful for answering policy questions. In this paper, we argue that this is due to a systematic gap between the ways measurement engineers think about their data, and how other disciplines typically make use of data. We recap our own efforts to use the data generated by a...conference paper 2013