Abdelberi Chaabane

According to our database1, Abdelberi Chaabane authored at least 22 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Thou shalt not depend on me.
Commun. ACM, 2018

From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers.
Proceedings of the 26th USENIX Security Symposium, 2017

Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

2016
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

2015
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
Online Social Networks : Is it the end of Privacy ? (Etude des menaces contre la vie privée sur les réseaux sociaux : quantification et possibles solutions).
PhD thesis, 2014

Censorship in the Wild: Analyzing Web Filtering in Syria.
CoRR, 2014

A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Censorship in the Wild: Analyzing Internet Filtering in Syria.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
When Privacy meets Security: Leveraging personal information for password cracking
CoRR, 2013

Privacy in content-oriented networking: threats and countermeasures.
Comput. Commun. Rev., 2013

Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

2012
Big friend is watching you: analyzing online social networks tracking capabilities.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

You are what you like! Information leakage through users' Interests.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

2010
Compromising Tor Anonymity Exploiting P2P Information Leakage
CoRR, 2010

De-anonymizing BitTorrent Users on Tor
CoRR, 2010

Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network.
Proceedings of the Fourth International Conference on Network and System Security, 2010


  Loading...