Circuit fingerprinting attacks: Passive deanonymization of tor hidden services A Kwon, M AlSabah, D Lazar, M Dacier, S Devadas 24th USENIX Security Symposium (USENIX Security 15), 287-302, 2015 | 206 | 2015 |
Performance and security improvements for tor: A survey M AlSabah, I Goldberg ACM Computing Surveys (CSUR) 49 (2), 1-36, 2016 | 123 | 2016 |
Changing of the guards: A framework for understanding and improving entry guard selection in Tor T Elahi, K Bauer, M AlSabah, R Dingledine, I Goldberg Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 43-54, 2012 | 118 | 2012 |
Enhancing Tor's performance using real-time traffic classification M AlSabah, K Bauer, I Goldberg Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 112 | 2012 |
DefenestraTor: Throwing out windows in Tor M AlSabah, K Bauer, I Goldberg, D Grunwald, D McCoy, S Savage, ... Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011 | 98 | 2011 |
Deanonymizing Tor hidden service users through Bitcoin transactions analysis H Al Jawaheri, M Al Sabah, Y Boshmaf, A Erbad Computers & Security 89, 101684, 2020 | 94* | 2020 |
The path less travelled: Overcoming Tor’s bottlenecks with traffic splitting M AlSabah, K Bauer, T Elahi, I Goldberg Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013 | 91* | 2013 |
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset M Alsabah, G Oligeri, R Riley Computers and Security (COSE1320), 2018 | 54 | 2018 |
PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks M AlSabah, I Goldberg Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 49 | 2013 |
Investigating MMM Ponzi scheme on bitcoin Y Boshmaf, C Elvitigala, H Al Jawaheri, P Wijesekera, M Al Sabah Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 22 | 2020 |
BlockTag: Design and applications of a tagging system for blockchain analysis Y Boshmaf, H Al Jawaheri, M Al Sabah ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 19 | 2019 |
QuicTor: Enhancing tor for real-time communication using QUIC transport protocol L Basyoni, A Erbad, M Alsabah, N Fetais, A Mohamed, M Guizani IEEE Access 9, 28769-28784, 2021 | 16 | 2021 |
Exposing the rat in the tunnel: Using traffic analysis for tor-based malware detection P Dodia, M AlSabah, O Alrawi, T Wang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 15 | 2022 |
Empirical performance evaluation of QUIC protocol for Tor anonymity network L Basyoni, A Erbad, M Alsabah, N Fetais, M Guizani 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 12 | 2019 |
PriviPK: Certificate-less and secure email communication M AlSabah, A Tomescu, I Lebedev, D Serpanos, S Devadas Computers & Security 70, 1-15, 2017 | 7 | 2017 |
Phishing domain detection systems and methods Y Boshmaf, M Al Sabah, M Nabeel US Patent 11,546,377, 2023 | 5 | 2023 |
Content-agnostic detection of phishing domains using certificate transparency and passive dns M AlSabah, M Nabeel, Y Boshmaf, E Choo Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 5 | 2022 |
Context-aware RAON middleware for opportunistic network G Lau, M Al-Sabah, M Jaseemuddin, H Razavi, M Bhuiyan Pervasive and Mobile Computing 41, 28-45, 2017 | 5 | 2017 |
DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference E Choo, M Nabeel, M Alsabah, I Khalil, T Yu, W Wang ACM Transactions on Privacy and Security 26 (1), 1-32, 2022 | 4* | 2022 |
Characterizing Bitcoin donations to open source software on GitHub Y Zhauniarovich, Y Boshmaf, HA Jawaheri, MA Sabah arXiv preprint arXiv:1907.04002, 2019 | 4 | 2019 |