Stevens Le Blond

Affiliations:
  • Max Planck Institute for Software Systems


According to our database1, Stevens Le Blond authored at least 19 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices.
Proc. Priv. Enhancing Technol., 2022

2018
On Enforcing the Digital Immunity of a Large Humanitarian Organization.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

A Broad View of the Ecosystem of Socially Engineered Exploit Documents.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2015
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

2014
A Look at Targeted Attacks Through the Lense of an NGO.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Towards efficient traffic-analysis resistant anonymity networks.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

2012
Choosing partners based on availability in P2P networks.
ACM Trans. Auton. Adapt. Syst., 2012

2011
I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy
CoRR, 2011

Pushing BitTorrent locality to the limit.
Comput. Networks, 2011

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2010
Compromising Tor Anonymity Exploiting P2P Information Leakage
CoRR, 2010

De-anonymizing BitTorrent Users on Tor
CoRR, 2010

Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

2009
Finding Good Partners in Availability-Aware P2P Networks.
Proceedings of the Stabilization, 2009

2005
Clustering in P2P Exchanges and Consequences on Performances.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

2004
Statistical Properties of Exchanges in P2P Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-Evolution.
Proceedings of the Distributed Computing, 2004


  Loading...