Skip to main content

Showing 1–6 of 6 results for author: Chaabane, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1904.10629  [pdf, other

    cs.CR

    A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

    Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna

    Abstract: This paper focuses on reporting of Internet malicious activity (or mal-activity in short) by public blacklists with the objective of providing a systematic characterization of what has been reported over the years, and more importantly, the evolution of reported activities. Using an initial seed of 22 blacklists, covering the period from January 2007 to June 2017, we collect more than 51 million m… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

    Comments: ACM Asia Conference on Computer and Communications Security (AsiaCCS), 13 pages

  2. Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web

    Authors: Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda

    Abstract: Web developers routinely rely on third-party Java-Script libraries such as jQuery to enhance the functionality of their sites. However, if not properly maintained, such dependencies can create attack vectors allowing a site to be compromised. In this paper, we conduct the first comprehensive study of client-side JavaScript library usage and the resulting security implications across the Web. Usi… ▽ More

    Submitted 13 February, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Comments: Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2017

  3. arXiv:1402.3401  [pdf, other

    cs.CY cs.CR cs.NI

    Censorship in the Wild: Analyzing Internet Filtering in Syria

    Authors: Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar

    Abstract: Internet censorship is enforced by numerous governments worldwide, however, due to the lack of publicly available information, as well as the inherent risks of performing active measurements, it is often hard for the research community to investigate censorship practices in the wild. Thus, the leak of 600GB worth of logs from 7 Blue Coat SG-9000 proxies, deployed in Syria to filter Internet traffi… ▽ More

    Submitted 5 November, 2014; v1 submitted 14 February, 2014; originally announced February 2014.

    Comments: A preliminary version of this paper appears in IMC 2014. This is the full version

  4. arXiv:1304.6584  [pdf, ps, other

    cs.CR

    When Privacy meets Security: Leveraging personal information for password cracking

    Authors: Claude Castelluccia, Abdelberi Chaabane, Markus Dürmuth, Daniele Perito

    Abstract: Passwords are widely used for user authentication and, despite their weaknesses, will likely remain in use in the foreseeable future. Human-generated passwords typically have a rich structure, which makes them susceptible to guessing attacks. In this paper, we study the effectiveness of guessing attacks based on Markov models. Our contributions are two-fold. First, we propose a novel password crac… ▽ More

    Submitted 24 April, 2013; originally announced April 2013.

  5. arXiv:1211.5183  [pdf, other

    cs.CR cs.NI

    Privacy in Content-Oriented Networking: Threats and Countermeasures

    Authors: Abdelberi Chaabane, Emiliano De Cristofaro, Mohammed-Ali Kaafar, Ersin Uzun

    Abstract: As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modern systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the network layer, by naming data rather than… ▽ More

    Submitted 30 July, 2013; v1 submitted 21 November, 2012; originally announced November 2012.

  6. arXiv:1004.1267  [pdf, ps, other

    cs.NI cs.CR

    De-anonymizing BitTorrent Users on Tor

    Authors: Stevens Le Blond, Pere Manils, Abdelberi Chaabane, Mohamed Ali Kaafar, Arnaud Legout, Claude Castellucia, Walid Dabbous

    Abstract: Some BitTorrent users are running BitTorrent on top of Tor to preserve their privacy. In this extended abstract, we discuss three different attacks to reveal the IP address of BitTorrent users on top of Tor. In addition, we exploit the multiplexing of streams from different applications into the same circuit to link non-BitTorrent applications to revealed IP addresses.

    Submitted 8 April, 2010; originally announced April 2010.

    Comments: Poster accepted at the 7th USENIX Symposium on Network Design and Implementation (NSDI '10), San Jose, CA : United States (2010)