User talk:Anonymoususerwiki

Academic publication and mainstream news coverage
While at UCLA, Hmaghsoud discovered a method by which collisions in the hash function used in Internet Protocol datagrams may be leveraged to enable covert channel communications. His discovery was a centerpiece of covert communications methodology and was the primary citation for an Association for Computing Machinery paper on covert channel detection and another on a similar technique using TCP timestamps, the two most well-cited and widely republished papers on the subject.

In 2011 while working at Cloudmark, hmaghsoud spent six months examining the phishing underworld from the inside. hmaghsoud discovered that phishers were using IRC channels in order to trade personal information. He stalked and collected messages from thirteen chat rooms phishers use. Whereas past phishing researchers believed that phishing was coordinated by highly organized criminals, hmaghsoud discovered that phishing rings were decentralized. hmaghsoud published his findings in First Monday. This paper was the first examination of how the economy of phishing agents functioned, and highlighted the high degree of specialization within the economy.