Abdelberi Chaabane
Abdelberi Chaabane
Bell Labs
Verified email at
Cited by
Cited by
You are what you like! information leakage through users’ interests
A Chaabane, G Acs, MA Kaafar
Proceedings of the 19th annual network & distributed system security …, 2012
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
A Chaabane, P Manils, MA Kaafar
2010 fourth international conference on network and system security, 167-174, 2010
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web
T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda
arXiv preprint arXiv:1811.00918, 2018
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
International symposium on engineering secure software and systems, 119-132, 2015
Censorship in the wild: Analyzing Internet filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users
S Le Blond, P Manils, A Chaabane, MA Kaafar, C Castelluccia, A Legout, ...
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
Big friend is watching you: Analyzing online social networks tracking capabilities
A Chaabane, MA Kaafar, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
A closer look at third-party OSN applications: are they leaking your personal information?
A Chaabane, Y Ding, R Dey, MA Kaafar, KW Ross
International conference on passive and active network measurement, 235-246, 2014
How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness
T Chen, A Chaabane, PU Tournoux, MA Kaafar, R Boreli
International Symposium on Privacy Enhancing Technologies Symposium, 225-244, 2013
Game of Registrars: An Empirical Analysis of {Post-Expiration} Domain Name Takeovers
T Lauinger, A Chaabane, AS Buyukkayhan, K Onarlioglu, W Robertson
26th USENIX Security Symposium (USENIX Security 17), 865-880, 2017
WHOIS Lost in Translation: (Mis) Understanding Domain Name Expiration and Re-Registration
T Lauinger, K Onarlioglu, A Chaabane, W Robertson, E Kirda
Proceedings of the 2016 Internet Measurement Conference, 247-253, 2016
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
When privacy meets security: Leveraging personal information for password cracking
M Dürmuth, A Chaabane, D Perito, C Castelluccia
CoRR abs/1304.6584, 2013
Holiday pictures or blockbuster movies? Insights into copyright infringement in user uploads to one-click file hosters
T Lauinger, K Onarlioglu, A Chaabane, E Kirda, W Robertson, MA Kaafar
International Workshop on Recent Advances in Intrusion Detection, 369-389, 2013
Semi-automated discovery of server-based information oversharing vulnerabilities in android applications
W Koch, A Chaabane, M Egele, W Robertson, E Kirda
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
From deletion to re-registration in zero seconds: Domain registrar behaviour during the drop
T Lauinger, AS Buyukkayhan, A Chaabane, W Robertson, E Kirda
Proceedings of the Internet Measurement Conference 2018, 322-328, 2018
You are what you like
A Chaabane, G Acs, MA Kaafar
Information Leakage Through Users’ Interests. Netw Distrib Syst Secur Symp, 2012
Eraser: Your data won't be back
K Onarlioglu, W Robertson, E Kirda
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 153-166, 2018
The system can't perform the operation now. Try again later.
Articles 1–20