Abdelberi Chaabane
Abdelberi Chaabane
Bell Labs
Adresse e-mail validée de chaabane.org
Citée par
Citée par
You are what you like! information leakage through users’ interests
A Chaabane, G Acs, MA Kaafar
Proceedings of the 19th Annual Network & Distributed System Security …, 2012
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
A Chaabane, P Manils, MA Kaafar
2010 fourth international conference on network and system security, 167-174, 2010
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ...
arXiv preprint arXiv:1103.1518, 2011
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web
T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda
arXiv preprint arXiv:1811.00918, 2018
Censorship in the wild: Analyzing Internet filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
International Symposium on Engineering Secure Software and Systems, 119-132, 2015
Big friend is watching you: Analyzing online social networks tracking capabilities
A Chaabane, MA Kaafar, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
A closer look at third-party OSN applications: Are they leaking your personal information?
A Chaabane, Y Ding, R Dey, MA Kaafar, KW Ross
International conference on passive and active network measurement, 235-246, 2014
CuriousDroid: automated user interface interaction for android application analysis sandboxes
P Carter, C Mulliner, M Lindorfer, W Robertson, E Kirda
International Conference on Financial Cryptography and Data Security, 231-249, 2016
Preventing unraveling in social networks gets harder
R Chitnis, FV Fomin, PA Golovach
arXiv preprint arXiv:1304.6420, 2013
How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness
T Chen, A Chaabane, PU Tournoux, MA Kaafar, R Boreli
International Symposium on Privacy Enhancing Technologies Symposium, 225-244, 2013
When privacy meets security: Leveraging personal information for password cracking
M Dürmuth, A Chaabane, D Perito, C Castelluccia
CoRR abs/1304.6584, 2013
WHOIS Lost in Translation: (Mis) Understanding Domain Name Expiration and Re-Registration
T Lauinger, K Onarlioglu, A Chaabane, W Robertson, E Kirda
Proceedings of the 2016 Internet Measurement Conference, 247-253, 2016
Game of registrars: An empirical analysis of post-expiration domain name takeovers
T Lauinger, A Chaabane, AS Buyukkayhan, K Onarlioglu, W Robertson
26th {USENIX} Security Symposium ({USENIX} Security 17), 865-880, 2017
Holiday pictures or blockbuster movies? Insights into copyright infringement in user uploads to one-click file hosters
T Lauinger, K Onarlioglu, A Chaabane, E Kirda, W Robertson, MA Kaafar
International Workshop on Recent Advances in Intrusion Detection, 369-389, 2013
You are what you like
A Chaabane, G Acs, MA Kaafar
Information Leakage Through Users’ Interests. Netw Distrib Syst Secur Symp, 2012
You are what you like! Information leakage through users' Interests.
C Abdelberi, G Ács, MA Kâafar
NDSS, 2012
A decade of mal-activity reporting: A retrospective analysis of Internet malicious activity blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20