Follow
Abdelberi Chaabane
Abdelberi Chaabane
Bell Labs
Verified email at chaabane.org
Title
Cited by
Cited by
Year
You are what you like! information leakage through users’ interests
A Chaabane, G Acs, MA Kaafar
Proceedings of the 19th annual network & distributed system security …, 2012
1992012
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web
T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda
arXiv preprint arXiv:1811.00918, 2018
1952018
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
A Chaabane, P Manils, MA Kaafar
2010 fourth international conference on network and system security, 167-174, 2010
1732010
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
1522013
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015
1292015
Censorship in the wild: Analyzing Internet filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
1172014
One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users
S Le Blond, P Manils, A Chaabane, MA Kaafar, C Castelluccia, A Legout, ...
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
952011
Big friend is watching you: Analyzing online social networks tracking capabilities
A Chaabane, MA Kaafar, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012
652012
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
642013
A closer look at third-party OSN applications: are they leaking your personal information?
A Chaabane, Y Ding, R Dey, MA Kaafar, KW Ross
Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014
532014
Game of Registrars: An Empirical Analysis of {Post-Expiration} Domain Name Takeovers
T Lauinger, A Chaabane, AS Buyukkayhan, K Onarlioglu, W Robertson
26th USENIX Security Symposium (USENIX Security 17), 865-880, 2017
382017
WHOIS Lost in Translation: (Mis) Understanding Domain Name Expiration and Re-Registration
T Lauinger, K Onarlioglu, A Chaabane, W Robertson, E Kirda
Proceedings of the 2016 Internet Measurement Conference, 247-253, 2016
372016
How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness
T Chen, A Chaabane, PU Tournoux, MA Kaafar, R Boreli
International Symposium on Privacy Enhancing Technologies Symposium, 225-244, 2013
342013
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
322019
When privacy meets security: Leveraging personal information for password cracking
M Dürmuth, A Chaabane, D Perito, C Castelluccia
CoRR abs/1304.6584, 2013
182013
Semi-automated discovery of server-based information oversharing vulnerabilities in android applications
W Koch, A Chaabane, M Egele, W Robertson, E Kirda
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
172017
Holiday pictures or blockbuster movies? Insights into copyright infringement in user uploads to one-click file hosters
T Lauinger, K Onarlioglu, A Chaabane, E Kirda, W Robertson, MA Kaafar
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
152013
From deletion to re-registration in zero seconds: Domain registrar behaviour during the drop
T Lauinger, AS Buyukkayhan, A Chaabane, W Robertson, E Kirda
Proceedings of the Internet Measurement Conference 2018, 322-328, 2018
102018
Thou shalt not depend on me
T Lauinger, A Chaabane, CB Wilson
Communications of the ACM 61 (6), 41-47, 2018
102018
You are what you like
A Chaabane, G Acs, MA Kaafar
Information Leakage Through Users’ Interests. Netw Distrib Syst Secur Symp, 2012
82012
The system can't perform the operation now. Try again later.
Articles 1–20