Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda arXiv preprint arXiv:1811.00918, 2018 | 211 | 2018 |
You are what you like! information leakage through users’ interests A Chaabane, G Acs, MA Kaafar Proceedings of the 19th annual network & distributed system security …, 2012 | 206 | 2012 |
Digging into anonymous traffic: A deep analysis of the tor anonymizing network A Chaabane, P Manils, MA Kaafar 2010 fourth international conference on network and system security, 167-174, 2010 | 173 | 2010 |
Privacy in content-oriented networking: Threats and countermeasures A Chaabane, E De Cristofaro, MA Kaafar, E Uzun ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013 | 153 | 2013 |
OMEN: Faster password guessing using an ordered markov enumerator M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015 | 137 | 2015 |
Censorship in the wild: Analyzing Internet filtering in Syria A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014 | 118 | 2014 |
One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users S Le Blond, P Manils, A Chaabane, MA Kaafar, C Castelluccia, A Legout, ... 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011 | 94 | 2011 |
When privacy meets security: Leveraging personal information for password cracking C Castelluccia, A Chaabane, M Dürmuth, D Perito arXiv preprint arXiv:1304.6584, 2013 | 69 | 2013 |
Big friend is watching you: Analyzing online social networks tracking capabilities A Chaabane, MA Kaafar, R Boreli Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012 | 65 | 2012 |
A closer look at third-party OSN applications: are they leaking your personal information? A Chaabane, Y Ding, R Dey, MA Kaafar, KW Ross Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014 | 53 | 2014 |
Game of Registrars: An Empirical Analysis of {Post-Expiration} Domain Name Takeovers T Lauinger, A Chaabane, AS Buyukkayhan, K Onarlioglu, W Robertson 26th USENIX Security Symposium (USENIX Security 17), 865-880, 2017 | 39 | 2017 |
WHOIS Lost in Translation: (Mis) Understanding Domain Name Expiration and Re-Registration T Lauinger, K Onarlioglu, A Chaabane, W Robertson, E Kirda Proceedings of the 2016 Internet Measurement Conference, 247-253, 2016 | 39 | 2016 |
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 35 | 2019 |
How much is too much? Leveraging ads audience estimation to evaluate public profile uniqueness T Chen, A Chaabane, PU Tournoux, MA Kaafar, R Boreli International symposium on privacy enhancing technologies symposium, 225-244, 2013 | 35 | 2013 |
Semi-automated discovery of server-based information oversharing vulnerabilities in android applications W Koch, A Chaabane, M Egele, W Robertson, E Kirda Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017 | 21 | 2017 |
When privacy meets security: Leveraging personal information for password cracking M Dürmuth, A Chaabane, D Perito, C Castelluccia CoRR abs/1304.6584, 2013 | 19 | 2013 |
Holiday pictures or blockbuster movies? Insights into copyright infringement in user uploads to one-click file hosters T Lauinger, K Onarlioglu, A Chaabane, E Kirda, W Robertson, MA Kaafar Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013 | 15 | 2013 |
Thou shalt not depend on me T Lauinger, A Chaabane, CB Wilson Communications of the ACM 61 (6), 41-47, 2018 | 11 | 2018 |
From deletion to re-registration in zero seconds: Domain registrar behaviour during the drop T Lauinger, AS Buyukkayhan, A Chaabane, W Robertson, E Kirda Proceedings of the Internet Measurement Conference 2018, 322-328, 2018 | 10 | 2018 |
Eraser: Your data won't be back K Onarlioglu, W Robertson, E Kirda 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 153-166, 2018 | 8 | 2018 |