Stevens Le Blond
Stevens Le Blond
Affiliation inconnue
Aucune adresse e-mail validée
Titre
Citée par
Citée par
Année
Pushing bittorrent locality to the limit
S Le Blond, A Legout, W Dabbous
Computer Networks 55 (3), 541-557, 2011
1332011
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ...
Proceedings of the 4th USENIX workshop on Large-scale exploits and emergent …, 2011
742011
Spying the World from your Laptop--Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
SL Blond, A Legout, FL Fessant, W Dabbous, MA Kaafar
Proceedings of the 3rd USENIX workshop on Large-scale exploits and emergent …, 2010
73*2010
Towards efficient traffic-analysis resistant anonymity networks
S Le Blond, D Choffnes, W Zhou, P Druschel, H Ballani, P Francis
ACM SIGCOMM Computer Communication Review 43 (4), 303-314, 2013
712013
A Look at Targeted Attacks Through the Lense of an {NGO}
S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda
23rd {USENIX} Security Symposium ({USENIX} Security 14), 543-558, 2014
692014
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy
S Le Blond, C Zhang, A Legout, K Ross, W Dabbous
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
542011
Clustering in p2p exchanges and consequences on performances
S Le-Blond, JL Guillaume, M Latapy
Proceedings of the 4-th international workshop on Peer-to-Peer Systems (IPTPS), 2005
512005
Statistical analysis of a P2P query graph based on degrees and their time-evolution
JL Guillaume, M Latapy, S Le-Blond
International Workshop on Distributed Computing, 126-137, 2004
48*2004
Herd: A scalable, traffic analysis resistant anonymity network for VoIP systems
S Le Blond, D Choffnes, W Caldwell, P Druschel, N Merritt
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
452015
Finding good partners in availability-aware p2p networks
S Le Blond, F Le Fessant, E Le Merrer
Symposium on Self-Stabilizing Systems, 472-484, 2009
422009
Compromising Tor anonymity exploiting P2P information leakage
P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ...
arXiv preprint arXiv:1004.1461, 2010
402010
To catch a ratter: Monitoring the behavior of amateur darkcomet rat operators in the wild
B Farinholt, M Rezaeirad, P Pearce, H Dharmdasani, H Yin, S Le Blond, ...
2017 IEEE symposium on Security and Privacy (SP), 770-787, 2017
282017
Clustering in p2p exchanges and consequences on performances
JL Guillaume, S Le-Blond, M Latapy
Lecture Notes in Computer Sciences (LNCS), proceedings of the 4-th …, 2005
142005
A Broad View of the Ecosystem of Socially Engineered Exploit Documents.
S Le Blond, C Gilbert, U Upadhyay, M Gomez-Rodriguez, DR Choffnes
NDSS, 2017
132017
Choosing partners based on availability in P2P networks
SL Blond, FL Fessant, EL Merrer
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-14, 2012
132012
On enforcing the digital immunity of a large humanitarian organization
S Le Blond, A Cuevas, JR Troncoso-Pastoriza, P Jovanovic, B Ford, ...
2018 IEEE Symposium on Security and Privacy (SP), 424-440, 2018
92018
Early application experience with the grid application toolkit (gat)
S Le Blond, AM Oprescu, C Zhang
Workshop on Grid Applications held in conjunction with the Fourteenth Global …, 2005
7*2005
I know where you are and what you are sharing
S Blond, C Zhang, A Legout, K Ross, W Dabbous
Proceedings of ACM SIGCOMM Internet Measurement Conference, 2-4, 2011
22011
Attacking Large-Scale, Real-World Systems
S Le Blond, P Manils, A Chaabane, MA Kaafar
2011
PriFi: A Traffic-Analysis Resistant, Low-Latency Anonymous Communication Protocol for Local Area Networks
L Barman, I Dacosta, M Zamani, E Zhai, S Le Blond, B Ford, JP Hubaux, ...
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20