Publications
Conferences
- E. Alashwali, R.M. Chandrashekar, M. Lanyon, and L.F. Cranor “Detection and Impact of Debit/Credit Card Fraud: Victims’ Experiences,” in proc. European Symposium on Usable Security (EuroUSEC), Sweden, 2024. PDF (pre-print)
- E. Alashwali, J. Peca, M. Lanyon, and L.F. Cranor “Work-From-Home and Privacy: What Do Workers Face and What are They Doing About it?,” (under review), US, 2024. PDF (pre-print)
- E. Alashwali L.F. Cranor “Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia,” in proc. of International Conference on Human-Computer Interaction (HCII), US, 2024. PDF (pre-print)
- X. Shen E. Alashwali L.F. Cranor “What Do Privacy Advertisements Communicate to Consumers?,” in proc. of Privacy Enhancing Technologies (PETS), UK, 2024. PDF (pre-print)
- E. Alashwali, P. Szalachowski, and A. Martin “Towards Forward Secure Internet Traffic,” in proc. of the 15th International Conference on Security and Privacy in Communication Networks (SecureComm 2019), US, 2019. PDF (pre-print)
- E. Alashwali, P. Szalachowski, and A. Martin “Does “www.” Mean Better Transport Layer Security?,” in proc. of the 14th International Conference on Availability, Reliability and Security (ARES 2019), UK, 2019. PDF (pre-print)
- E. Alashwali and P. Szalachowski “DSTC: DNS-based Strict TLS Configurations,” in proc. of the 13th Int. Conference on Risks and Security of Internet and Systems (CRISIS), France, 2018. PDF (pre-print)
- E. Alashwali and K. Rasmussen “What’s in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS,” in proc. of the 6th International Workshop on Applications and Techniques in Cyber Security (ATCS 2018) co−located with SecureComm 2018. August‚ 2018 , Singapore, 2018. PDF (pre-print)
- E. Alashwali and K. Rasmussen “On the Feasibility of Fine−Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name,” in proc. of the 14th International Conference on Security and Privacy in Communication Networks (SecureComm 2018). August‚ 2018 , Singapore, 2018. PDF (pre-print)
- E. Alashwali and H. Ben-Abdallah, “Design and Evaluation of Competition-based Hacking Exercises,” in proc. of the IEEE Global Engineering Education Conference (EDUCON 2015), Tallin, Estonia, 2015. PDF (pre-print)
- E. Alashwali, “Cryptographic Vulnerabilities in Real-Life Web Servers,” in proc. of the 3rd International Conf. on Communications and Information Technology (ICCIT 2013), Beirut, Lebanon, 2013, pp. 6-11. PDF (pre-print)
Journal
- E. Alashwali and F. Alashwali “Saudi parents’ privacy concerns about their children’s smart device applications,” Child-Computer Interaction, 2022, Vol. 33, No. 100486. PDF (pre-print)
- E. Alashwali, P. Szalachowski, and A. Martin “Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective,” Computers & Security, 2020, Vol. 97, No. 101975. PDF (pre-print)
- E. Alashwali, “Incorporating Hacking Projects in Computer and Information Security Education: an Empirical Study,” Int. J. Electronic Security and Digital Forensics, 2014, Vol. 6, No. 3, pp. 185-203. PDF (pre-print)
Miscellaneous
- E. Alashwali, “The Keys!,” Invited article by the KAU’s CS Alumni Committee, KAU, 2020. PDF
- E. Alashwali, “Cryptographic Vulnerabilities in Real-Life Web Servers,” in the 3rd International Conf. on Communications and Information Technology (ICCIT 2013), Beirut, Lebanon, 2013. PDF
- E. Alashwali (author and designer), “Labs & Technical Support Catalogue”, published by the Scientific Publishing Centre at KAU, 2011. PDF
- E. Alashwali, “Software Security Assessment smbftpd-0.96” coursework submitted to University College London (UCL) in Language Based Security Course, 2012. PDF
- E. Alashwali, “Step by Step Guide: How to Install Network Simulator (NS2) on Linux Machine (Ubuntu 8.10), 2010. PDF
- E. Alashwali, “Network Sniffing”, Coursework Submitted to University College London (UCL) in Computer Security II Course, 2012. Presentation
- E. Alashwali, Introduction to Matlab Simulink, 2014. PDF