עקוב אחר
Abdelberi Chaabane
Abdelberi Chaabane
Bell Labs
כתובת אימייל מאומתת בדומיין chaabane.org
כותרת
צוטט על ידי
צוטט על ידי
שנה
You are what you like! information leakage through users’ interests
A Chaabane, G Acs, MA Kaafar
Proceedings of the 19th annual network & distributed system security …, 2012
1992012
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web
T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda
arXiv preprint arXiv:1811.00918, 2018
1982018
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
A Chaabane, P Manils, MA Kaafar
2010 fourth international conference on network and system security, 167-174, 2010
1732010
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
1522013
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015
1322015
Censorship in the wild: Analyzing Internet filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
1172014
One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users
S Le Blond, P Manils, A Chaabane, MA Kaafar, C Castelluccia, A Legout, ...
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
952011
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
662013
Big friend is watching you: Analyzing online social networks tracking capabilities
A Chaabane, MA Kaafar, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012
652012
A closer look at third-party OSN applications: are they leaking your personal information?
A Chaabane, Y Ding, R Dey, MA Kaafar, KW Ross
Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014
532014
Game of Registrars: An Empirical Analysis of {Post-Expiration} Domain Name Takeovers
T Lauinger, A Chaabane, AS Buyukkayhan, K Onarlioglu, W Robertson
26th USENIX Security Symposium (USENIX Security 17), 865-880, 2017
392017
WHOIS Lost in Translation: (Mis) Understanding Domain Name Expiration and Re-Registration
T Lauinger, K Onarlioglu, A Chaabane, W Robertson, E Kirda
Proceedings of the 2016 Internet Measurement Conference, 247-253, 2016
382016
How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness
T Chen, A Chaabane, PU Tournoux, MA Kaafar, R Boreli
International Symposium on Privacy Enhancing Technologies Symposium, 225-244, 2013
352013
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
322019
When privacy meets security: Leveraging personal information for password cracking
M Dürmuth, A Chaabane, D Perito, C Castelluccia
CoRR abs/1304.6584, 2013
192013
Semi-automated discovery of server-based information oversharing vulnerabilities in android applications
W Koch, A Chaabane, M Egele, W Robertson, E Kirda
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
182017
Holiday pictures or blockbuster movies? Insights into copyright infringement in user uploads to one-click file hosters
T Lauinger, K Onarlioglu, A Chaabane, E Kirda, W Robertson, MA Kaafar
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
152013
From deletion to re-registration in zero seconds: Domain registrar behaviour during the drop
T Lauinger, AS Buyukkayhan, A Chaabane, W Robertson, E Kirda
Proceedings of the Internet Measurement Conference 2018, 322-328, 2018
102018
Thou shalt not depend on me
T Lauinger, A Chaabane, CB Wilson
Communications of the ACM 61 (6), 41-47, 2018
102018
You are what you like
A Chaabane, G Acs, MA Kaafar
Information Leakage Through Users’ Interests. Netw Distrib Syst Secur Symp, 2012
82012
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20