Searched for: author%3A%22Tajalizadehkhoob%2C+S.%22
(1 - 8 of 8)
document
Le Pochat, Victor (author), Van Goethem, Tom (author), Tajalizadehkhoob, S. (author), Joosen, Wouter (author)
In order to evaluate the prevalence of security and privacy practices on a representative sample of the Web, researchers rely on website popularity rankings such as the Alexa list. While the validity and representativeness of these rankings are rarely questioned, our findings show the contrary: we show for four main rankings how their inherent...
conference paper 2019
document
Tajalizadehkhoob, S. (author)
In theory, hosting providers can play an important role in fighting cybercrime and misuse. This is because many online threats, be they high-profile or mundane, use online storage infrastructure maintained by hosting providers at the core of their criminal operations. <br/>However, in practice, we see large differences in the security measures...
doctoral thesis 2018
document
van Wegberg, R.S. (author), Tajalizadehkhoob, S. (author), Soska, Kyle (author), Akyazi, U. (author), Hernandez Ganan, C. (author), Klievink, A.J. (author), Christin, Nicolas (author), van Eeten, M.J.G. (author)
Researchers have observed the increasing commoditization of cybercrime, that is, the offering of capabilities, services, and resources as commodities by specialized suppliers in the underground economy. Commoditization enables outsourcing, thus lowering entry barriers for aspiring criminals, and potentially driving further growth in cybercrime....
conference paper 2018
document
Noroozian, A. (author), Ciere, M. (author), Korczynski, M.T. (author), Tajalizadehkhoob, S. (author), van Eeten, M.J.G. (author)
conference paper 2017
document
Tajalizadehkhoob, S. (author), Hernandez Ganan, C. (author), Noroozian, A. (author), van Eeten, M.J.G. (author)
A variety of botnets are used in attacks on financial services. Banks and security firms invest a lot of effort in detecting and combating malware-assisted takeover of customer accounts. A critical resource of these botnets is their command-and-control (C&amp;C) infrastructure. Attackers rent or compromise servers to operate their C&amp;C...
conference paper 2017
document
Tajalizadehkhoob, S. (author), Van Goethem, Tom (author), Korczynski, M.T. (author), Noroozian, A. (author), Böhme, Rainer (author), Moore, Tyler (author), Joosen, Wouter (author), van Eeten, M.J.G. (author)
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. Shared hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical...
conference paper 2017
document
Aertsen, Maarten (author), Korczynski, M.T. (author), Moura, Giovane C. M. (author), Tajalizadehkhoob, S. (author), van den Berg, Jan (author)
The 2013 National Security Agency revelations of pervasive monitoring have led to an "encryption rush" across the computer and Internet industry. To push back against massive surveillance and protect users' privacy, vendors, hosting and cloud providers have widely deployed encryption on their hardware, communication links, and applications....
conference paper 2017
document
Tajalizadehkhoob, S. (author)
master thesis 2013
Searched for: author%3A%22Tajalizadehkhoob%2C+S.%22
(1 - 8 of 8)