Abdelberi Chaabane
Chaabane Abdelberi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j2]Tobias Lauinger, Abdelberi Chaabane, Christo Wilson:
Thou shalt not depend on me. Commun. ACM 61(6): 41-47 (2018) - [c14]Tobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda:
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. IMC 2018: 322-328 - [i7]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William K. Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. CoRR abs/1811.00918 (2018) - 2017
- [c13]William Koch, Abdelberi Chaabane, Manuel Egele, William K. Robertson, Engin Kirda:
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications. ISSTA 2017: 147-157 - [c12]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. NDSS 2017 - [c11]Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson:
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers. USENIX Security Symposium 2017: 865-880 - 2016
- [c10]Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda:
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. Internet Measurement Conference 2016: 247-253 - 2015
- [c9]Markus Dürmuth, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Chaabane Abdelberi:
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. ESSoS 2015: 119-132 - 2014
- [b1]Abdelberi Chaabane:
Online Social Networks : Is it the end of Privacy ? (Etude des menaces contre la vie privée sur les réseaux sociaux : quantification et possibles solutions). Grenoble Alpes University, France 2014 - [c8]Chaabane Abdelberi, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kâafar:
Censorship in the Wild: Analyzing Internet Filtering in Syria. Internet Measurement Conference 2014: 285-298 - [c7]Chaabane Abdelberi, Yuan Ding, Ratan Dey, Mohamed Ali Kâafar, Keith W. Ross:
A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? PAM 2014: 235-246 - [i6]Chaabane Abdelberi, Mathieu Cunche, Terence Chen, Arik Friedman, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Censorship in the Wild: Analyzing Web Filtering in Syria. CoRR abs/1402.3401 (2014) - 2013
- [j1]Chaabane Abdelberi, Emiliano De Cristofaro, Mohamed Ali Kâafar, Ersin Uzun:
Privacy in content-oriented networking: threats and countermeasures. Computer Communication Review 43(3): 25-33 (2013) - [c6]Terence Chen, Chaabane Abdelberi, Pierre-Ugo Tournoux, Mohamed Ali Kâafar, Roksana Boreli:
How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness. Privacy Enhancing Technologies 2013: 225-244 - [c5]Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. RAID 2013: 369-389 - [i5]Claude Castelluccia, Chaabane Abdelberi, Markus Dürmuth, Daniele Perito:
When Privacy meets Security: Leveraging personal information for password cracking. CoRR abs/1304.6584 (2013) - 2012
- [c4]Chaabane Abdelberi, Gergely Ács, Mohamed Ali Kâafar:
You are what you like! Information leakage through users' Interests. NDSS 2012 - [c3]Chaabane Abdelberi, Mohamed Ali Kâafar, Roksana Boreli:
Big friend is watching you: analyzing online social networks tracking capabilities. WOSN 2012: 7-12 - [i4]Chaabane Abdelberi, Emiliano De Cristofaro, Mohamed Ali Kâafar, Ersin Uzun:
Privacy in Content-Oriented Networking: Threats and Countermeasures. CoRR abs/1211.5183 (2012) - 2011
- [c2]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. LEET 2011 - [i3]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. CoRR abs/1103.1518 (2011) - 2010
- [c1]Chaabane Abdelberi, Pere Manils, Mohamed Ali Kâafar:
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. NSS 2010: 167-174 - [i2]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Arnaud Legout, Claude Castelluccia, Walid Dabbous:
De-anonymizing BitTorrent Users on Tor. CoRR abs/1004.1267 (2010) - [i1]Pere Manils, Chaabane Abdelberi, Stevens Le Blond, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
Compromising Tor Anonymity Exploiting P2P Information Leakage. CoRR abs/1004.1461 (2010)
Coauthor Index
last updated on 2018-11-27 23:46 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint