Selected Publications

Here I list some selected peer-reviewed publications of mine.
For the full list of my publications you can visit my Google Scholar page.

2023

– H. Jmal, F. Ben Hmida, N. Basta, M. Ikram, M. A. Kaafar, A. Walker, “SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation”, Published in IEEE Transactions on Information Forensics and Security (IEEE T-IFS), November 2023.

– M Kepkowski, M Machulak, I Wood, M.A. Kaafar, “Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study”, in IEEE Secure Development Conference 2023 (IEEE SecDev), Atlanta, GA, October 2023.

– W. Yeoh, M. Kepkowski, G. Heide, M.A. Kaafar, L. Hanzlik, “Fast IDentity Online with Anonymous Credentials (FIDO-AC)”, in the 32nd USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, August 2023.

– H. Asghar, B. Zhao, M. Ikram, G. Nguyen, M.A. Kaafar, S. Lamont, D. Coscia, “Use of cryptography in malware obfuscation”, in the Journal of Computer Virology and Hacking Techniques, Publication date 25 September 2023

– C. Atkins, B. Zhao, H. Asghar, I. Wood, M.A. Kaafar, “Those Aren’t Your Memories, They’re Somebody Else’s: Seeding Misinformation in Chat Bot Memories”, in proceedings of the International Conference on Applied Cryptography and Network Security (ACNS 2023), Kyoto, Japan, 2023.

– R.S. Ali, B. Zhao, H. Asghar, T. Nguyen, I. Wood, M.A. Kaafar, “Unintended Memorization and Timing Attacks in Named Entity Recognition Models”, in Proceedings on Privacy Enhancing Technologies (PETS 2023), Lausanne, Switzerland, July 2023.

– N. Wu, D.Vatsalan, M.A. Kaafar, S. Ramesh, “Privacy-Preserving Record Linkage for Cardinality Counting”, in the 18th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2023), Melbourne, July 2023.

– H. Qayyum, B. Zhao, I. Wood, M. Ikram, M. A. Kaafar, N. Kourtellis, “A longitudinal study of the top 1% toxic Twitter profiles”, InProceedings of the 15th ACM Web Science Conference 2023, Austin, Texas, May 2023.

– B Tag, N. Berkel, S. Verma, B. Zhao, S. Berkovsky, M.A. Kaafar, V. Kostakos, O. Ohrimenko, “DDoD: Dual Denial of Decision Attacks on Human-AI Teams”, in IEEE Pervasive Computing, IEEE Special Issue on Human-Centered AI, Volume: 22, Issue: 1, 01 Jan.-March 2023.

2022

– H. Xiong, S. Berkovsky, M.A. Kaafar, A. Jaffe, E. Coiera, R.V. Sharan, “Reliability of crowdsourced data and patient-reported outcome measures in cough-based COVID-19 screening”, in Scientific Reports, Nature Publishing Group UK 12 (1), 21990.

– N. Wu, D. Vatsalan, S. Verma, M. A. Kaafar, “Fairness and Cost Constrained Privacy-Aware Record Linkage”, Published in IEEE Transactions on Information Forensics and Security (IEEE T-IFS) , July 2022, [DOI: 10.1109/TIFS.2022.3191492]

– M. Kepkowski, L. Hanzlik, I. Wood, M. A. Kaafar, “How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy”, In Privacy Preserving Technologies Symposium (PETS 2022), Sydney, 2022.

– Z. Lu, H. J. Asghar, M. A. Kaafar, D. Webb, P. Dickinson, “A Differentially Private Framework for Deep Learning with Convexified Loss Functions”, in IEEE Transactions on Information Forensics and Security (IEEE T-IFS), April 2022, Page(s): 2151 - 2165, DOI: 10.1109/TIFS.2022.3169911.

– N. Basta, M. Ikram, M.A. Kaafar, A. Walker, “Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework”, in IEEE/IFIP Network Operations and Management Symposium (NOMS 2022), Budapest, 2022.

– R. Masood, S. Berkovsky, M.A. Kaafar, Book Chapter “Tracking and Personalization”, Modern Socio-Technical Perspectives on Privacy, Pages 171-202

2021

– M. Dehez-Clementi; J. Lacan; J-C. Deneuville, H. Asghar, M.A. Kaafar, “A Blockchain-enabled Anonymous-yet-Traceable Distributed Key Generation”, in IEEE International Conference on Blockchain (Blockchain), 2021.

– R. Masood, S. Berkovsky, M.A. Kaafar, “Tracking and Personalization”, Book Chapter in “Modern Socio-Technical Perspectives on Privacy”, pages 171-202, Springer International Publishing.

– G. Tangari, M. Ikram, B, Sentana,K. Ijaz, M. A. Kaafar, S. Berkovsky, “Analyzing security issues of android mobile health and medical applications” Published in the Journal of the American Medical Informatics Association (JAMIA), Published August 3, 2021.

– N. U. Sheikh, H. Asghar, F. Farokhi, M.A. Kaafar, “Do Auto-regressive Models Protect Privacy?> Inferring Fine-grained Energy Consumption from Aggregated Model Parameters”, Published in the IEEE Transactions on Services Computing (2021) (IEEE TSC), July 2021.

– G. Tangari, M. Ikram, K. Ijaz, M.A. Kaafar, S. Berkovsky, “Mobile health and privacy: cross sectional study”, In the British Medical Journal (theBMJ), Published 17 June 2021.

– B. Zhao, A. Agrawal, C. Coburn, H. Asghar, R. Bhaskar, M.A. Kaafar, D. Webb, P. Dickinson “On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models”, In IEEE European Symposium on Security and Privacy (EuroS&P) 2021. Authors Version.

– Y. Chen, H. Wang, KKR. Choo, P. He, Z. Salcic, M.A. Kaafar, X. Zhang, “DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain”, in IEEE Transactions on Dependable and Secure Computing, 2021.

– F. Farokhi, N. Wu, D. Smith, M.A. Kaafar, “The Cost of Privacy in Asynchronous Differentially-Private Machine Learning”, In IEEE Transactions on Information Forensics and Security (IEEE T-IFS). Pages, 1-12, ISSN: 1556-6013, Online ISSN: 1556-6021, Digital Object Identifier: 10.1109/TIFS.2021.3050603 2021. Authors Draft version.

– Y. Miao, M. Xue, C. Chen, L. Pan, J. Zhang, B. Zhao, M.A. Kaafar and Y. Xiang “The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services”, in Privacy Preserving Technologies Symposium (PETS 2021). Authors version.

2020

– B. Zhao, M.A. Kaafar, N. Kourtellis, “Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning”, in ACM CCSW 2020: The ACM CCS Cloud Computing Security Workshop 2020. pdf

– B. Zhao, H. Asghar, M.A. Kaafar, F. Trevisan, H. Yuan, “Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes”, ACM Transactions of Privacy and Security (TOPS), 2020. pdf

– Q. Yang, Y. Shen, D. Vatsalan, J. Zhang, M.A. Kaafar, W. Hu, “P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets”, In IEEE Transactions on Vehicular Technology, Publication Date: JULY 2020, Volume: 69, Issue: 7, DOI: 10.1109/TVT.2020.2994157

-H. Asghar, M. Ding, T. Rakotoarivelo, S. Mrabet, M.A. Kaafar. “Differentially Private Release of Datasets using Gaussian Copula.” Journal of Privacy and Confidentiality 10, no. 2 (2020). pdf

– M. Ikram, R. Masood, G. Tyson, M. A. Kaafar, N. Loizon, R. Ensafi, “Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading”, In ACM Transactions on Privacy and Security (TOPS), March 2020. pdf

– B. Z. Zhao, H. J. Asghar and M. A. Kaafar, “On the Resilience of Biometric Authentication Systems against Random Inputs”, in The Network and Distributed System Security Symposium (NDSS 2020), San Diego, February 2020. pdf

– H. Asghar, M.A. Kaafar, “Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms”, In Privacy Preserving Technologies Symposium (PETS 2020), Montreal, July 2020. pdf

– P. Kamalaruban, V. Perrier, H. Asghar, M. A. Kaafar, “Not All Attributes are Created Equal: dx-Private Mechanisms for Linear Queries”, In Privacy Preserving Technologies Symposium (PETS 2020), Montreal, July 2020. pdf

– N. Wu, F. Farokhi, D. Smith and M.A. Kaafar, “The Value of Collaboration in Convex Machine Learning with Differential Privacy”, In the 41st IEEE Symposium on Security and Privacy (IEEE S&P), San Francisco, May 2020. pdf

– M. Yousefi-Azar, M.A. Kaafar, A. Walker. “Unsupervised Learning for security of Enterprise networks by micro-segmentation.” arXiv preprint arXiv:2003.11231(2020).

– M. Monteiro , K. Kumara, H. Asghar, K. Thilakarathna, T. Rakotoarivelo, M.A. Kaafar, S. Li, R. Steinfeld, J. Pieprzyk. “Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.” IACR Cryptol. ePrint Arch. 2020 (2020): 261. pdf

– S. Tonni, F. Farokhi, D. Vatsalan, M.A. Kaafar, Z. Lu, G. Tangari. “Data and Model Dependencies of Membership Inference Attack.” arXiv preprint arXiv:2002.06856 (2020).

– Farokhi, Farhad, and Mohamed Ali Kaafar. “Modelling and Quantifying Membership Information Leakage in Machine Learning.” arXiv preprint arXiv:2001.10648 (2020).

– A. Shaghaghi, M.A. kaafar, R. Buyya, S. Jha. “Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions.” In Handbook of Computer Networks and Cyber Security, pp. 341-387. Springer, Cham, 2020.

2019

– B.Z. Zhao, H. Asghar, R. Bhaskar and M. A. Kaafar, “On Inferring Training Data Attributes in Machine Learning Models”, In the ACM Conference on Computer and Communications Security CCS workshop on Privacy Preserving Machine Learning (PPML), London, November 2019. pdf

– Y. Miao, B. Z. Zhao, M. Xue, C. Chen, L. Pan, J. Zhang, M.A. Kaafar, Y. Xiang, “The Audio Auditor: Participant-Level Membership Inference in Internet of Things Voice Services”, In the ACM Conference on Computer and Communications Security CCS workshop on Privacy Preserving Machine Learning (PPML), London, November 2019. pdf

– Q. Chen, C. Xiang, M. Xue, B. Li, N. Borisov, M.A. Kaafar and H. Zhu, “Differentially Private Data Sharing: Sharing Models versus Sharing Data”, In the ACM Conference on Computer and Communications Security (CCS) Workshop on Privacy Preserving Machine Learning (PPML), London, November 2019. pdf

– H. J. Asghar, E. De Cristofaro, G. Jourjon, M.A. Kaafar, L. Mathy, L. Melis, C. Russell, and M. Yu, “Fast Privacy-Preserving Network Function Outsourcing”, Computer Networks, Vol. 163, 2019. pdf

– M. Ikram, P. Beaume, and M. A. Kaafar, “DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Behavior Modeling of Weighted Directed Call Graph”, Security and Cryptography (Secrypt), 2019. pdf

-S. S. Hashmi, M. Ikram, M.A. Kaafar, “A Longitudinal Analysis of Online Ad-Blocking Blacklists”, In IEEE The 44th IEEE Conference on Local Computer Networks (LCN 2019), Osnabrück, Germany, October 2019. pdf

– B. Zhao, M. Ikram, H. Asghar, M. A. Kaafar, “A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists”, Asia Computer Communication and Security (ASIA-CCS), 2019. Best Paper Award pdf

– M. Ikram, R. Masood, G. Tyson, M. A. Kaafar, N. Loizon and R. Ensafi, “The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading”, to be published in the Web Conference ACM WWW 2019, San Francisco May 2019. pdf

– V. Perrier, H. Asghar and M.A. Kaafar, “Private Continual Release of Real-Valued Data Streams”, in NDSS 2019, San Diego, CA, February 2019. pdf

2018

– A. Shaghaghi, S. Kanhere, M.A. Kaafar, E. Bertino, S. Jha, “Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations”, in IEEE LCN 2018. pdf

– F. Jiang, K. Thilakarathna, S. Mrabet, M.A. Kaafar, A. Seneviratne, uStash: a Novel Mobile Content Delivery System for Improving User QoE in Public Transport” in IEEE Transactions of Mobile Computing 2018. pdf

-R. Masood, M. Ikram, D. Vatsalan, M.A. Kaafar, “Incognito: A Method for Obfuscating Web Data”, In Proceedings of WWW 2018 (Research Track), Lyon, April 2018. pdf

– A. Shaghaghi, M.A. Kaafar, R. Buyya, S. Jha, “Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions”, Accepted in Cluster Computing 2018. pdf

-R. Masood, B. Zhao, H. Asghar, M.A. Kaafar, “Touch and You’re Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking”, in Privacy-Enhancing Technologies Symposium (PETS 2018), Barcelona, Spain July 24–27, 2018. TouchTrack_PETS-2018-Final_Kaafar. pdf

– H. Asghar, M.A. Kaafar, ”When are Identication Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack”, in the Journal of Mathematical Cryptology, 2018. pdf

M. Ding, D. Lopez-Perez, H. Claussen, M. A. Kaafar, “On the Fundamental Characteristics of Ultra-Dense Small Cell Networks”, In IEEE Network Magazine, 2018. pdf

2017

– M. Ikram, M.A. Kaafar, “A First Look at Mobile Ad-Blocking Apps”, In Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA 2017).pdf

-Z. Abaid, M.A. Kaafar, S. Jha, “Quantifying the Impact of Adversarial Evasion Attacks on Machine Learning Based Android Malware Classifiers”, In Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA 2017). pdf

– W. Wu, R. P. Liu, W. Ni, M.A. Kaafar, X. Huang, “AC-PROT: An Access Control Model to Improve Software-Defined Networking Security”, in Proceedings of the 2017 IEEE 85th Vehicular Technology Conference (VTC), June 2017. pdf

– M. Ikram, H. Asghar, M.A. Kaafar, A. Mahanti, B. Krishnamurthy, “Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning”, in Privacy-Enhancing Technologies Symposium (PETS) 2017. Authors version. pdf

-Z. Abaid, M.A. Kaafar, S, Jha, “Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study”, In IFIP Networking, Stockholm June 2017. Authors version pdf

-M. Ikram, L. Onwuzurike, S. Farooqi, E. DeCristofaro, A. Friedman, G. Jourjon, M.A. Kaafar, Z, Shaq, “Measuring, Characterizing, and Detecting Facebook Like Farms”, In ACM Transactions on Privacy and Security (TOPS) 2017. pdf

-J. Chauhan, B. Zhao, H. Asghar, J. Chan and M.A. Kaafar, “BehavioCog: An Observation Resistant Authentication Scheme”, In Financial Cryptography (FC’17) 2017. pdf

-A. Shaghagh, M.A. Kaafar, S. Jha, “WedgeTail : An Intrusion Prevention System for the Data Plane of Software Dened Networks”, In Proceedings of the ACM Asia Conference on Computer and Com- munications Security (ASIACCS) 2017, Hong Kong, April 2017. pdf

– J. Fangzhou, K. Thilakarathna, M.A. Kaafar, A. Seneviratne, “Crowd-Cache: Leveraging on Spatio-Temporal Correlation in Content Popularity for Mobile Networking in Proximity” Accepted in Computer Communications, 2017. pdf

-Z. Li, G. Xie, M.A. Kaafar, W. Qinghua, “Access Types Effect on Internet Video Services and Its Implications on CDN Caching” In IEEE Transactions on Circuits and Systems for Video Technology 2017. pdf

– S. Seneviratne, A. Seneviratne, M. A. Kaafar, A. Mahanti, P. Mohapatra. “Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis”, To appear in ACM Transactions on the Web (TWEB), 2017. pdf

-S. Farooqi, M. Ikram, E. Decristofaro, A. Friedman, G. Jourjon, M.A. Kaafar, Z. Shaq, F. Zaffar, “Characterizing Key Stakeholders in an Online Black-Hat Marketplace”, In Proceedings of The Symposium on Electronic Crime Research (eCrime) 2017. pdf

2016

-Z. Li, X. Wang, N. Huang, M.A. Kaafar, Z. Li, J. Zhou, G. Xie, P. Steenkiste, “Mobile Cloud Storage: A File Hosting or a Backup Service?”, in ACM IMC 2016. pdf

-M. Ikram, N. V. Rodriguez, S. Seneviratne, M.A. Kaafar, V. Paxon, “An analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps”, in ACM IMC 2016. pdf

– Zhenyu Li ; Mohamed Ali Kaafar ; Kave Salamatian ; Gaogang Xie, “Characterizing and Modeling User Behavior in a Large-scale Mobile Live Streaming System”, Published in IEEE Transactions on Circuits and Systems for Video Technology ( Volume: PP, Issue: 99 ), July 2016, DOI: 10.1109/TCSVT.2016.2595325. pdf

– Kanchana Thilakarathna, Suranga Seneviratne, Kamal Gupta, Mohamed Ali Kaafar, Aruna Seneviratne, A Deep Dive into Location-based Communities in Social Discovery Networks, Elsevier Computer Communications, Available online 21 November 2016, ISSN 0140-3664,pdf

-A. Friedman, S. Berkovsky, M. Kaafar, “A Differential Privacy Framework for Matrix Factorization Recommender Systems”, Published in User Modeling and User-Adapted Interaction: The Journal of Personalization Research (UMUAI) 2016. pdf

-Z. Abaid, D. Sarkar, M.A. Kaafar, S. Jha, “The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks”, in LCN 2016. pdf

-H. Asghar, L. Melis, C. Soldani, E. De Cristofaro, M.A. Kaafar, L. Mathy, “SplitBox: Toward Efficient Private Network Function Virtualization”, in ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, HotMiddleBox 2016. pdf

-J. Chauhan, H. J. Asghar, M. A. Kaafar, A. Mahanti, “Gesture-based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case”, in Applied Cryptography and Network Security (ACNS) 2016. pdf

-J. Chauhan, S. Seneviratne, M. A. Kaafar, A. Mahanti, A. Seneviratne, “Characterization of Early Smartwatch Apps”, in WristSense (PERCOM workshop), 2016. pdf

-J. Chauhan, M. A. Kaafar, A. Mahanti, “The Web for Under-Powered Mobile Devices: Lessons learned from Google Glass”, in IEEE Internet Computing 2016. pdf

-Q. Wu, Z. Li, G. Tyson, S. Uhlig, M.A. Kaafar, G. Xie, “Privacy-aware Multipath Video Caching for Content-Centric Networks”, in IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Video Distribution over Future Internet, 2016. pdf

-L. Melis, H. Asghar, E. De Cristofaro, M.A. Kaafar, “Private Processing of Outsourced Network Functions: Feasibility and Constructions” , in ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security 2016), New Orleans, March 2016. pdf

-I. Anggono, H. Haddadi, M.A. Kaafar, “Preserving Privacy in Geo-Targeted Advertising”, in ACM WSDM TargetAd Workshop, San Francisco, February 2016. pdf

-D. Wang, Z. Li, M.A. Kaafar, K. Salamatian, G. Xie, “From Social trends to Profit: An optimisation model for Search Engine Adwords management”, In IEEE INFOCOM 2016, San Francisco, April 2016. pdf

-R. Holz, J. Amann, O. Mehani, M. Wachs, M. A. Kaafar, ” TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication’ accepted in the Network and Distributed System Security Symposium (NDSS 2016), San Diego, February 2016. pdf

2015

-D. Vallet, S. Berkovsky, M.A. Kaafar, S. Ardon, A. Mahanti, “Characterizing and Predicting Viral-and-Popular Video Content”, in The 24th ACM International Conference on Information and Knowledge Management (ACM CIKM 2015), Melbourne, October 2015. pdf

– A. Berlioz, A. Friedman; S. Berkovsky, M. A. Kaafar, R. Boreli, “Applying Differential Privacy to Matrix Factorization”, in ACM Recommender Systems (ACM RecSys 2015), Vienna, September 2015. pdf

– F. Jiang, K. Thilakarathna, M. A. Kaafar, F. Rosenbaum and A. Seneviratne, “A Spatio-temporal analysis of Mobile Internet Traffic in Public Transportation Systems – A view of Web Browsing from the Bus”, Accepted in the Tenth ACM MobiCom Workshop on Challenged Networks (ACM CHANTS 2015), Paris, September 2015. pdf

– H. J. Asghar, S. Ron, S. Li, M.A. Kaafar, J. Pieprzyk, “On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices”, in IEEE Transactions on Information Forensics & Security (TIFS), April 2015. pdf

-Z. Li, M.A. Kaafar, K. Salamatian. G. Xie, “User Behavior Characterization of a Large-scale Mobile Live Streaming System”, in the International World Wide Web Conference (WWW 2015) web science track, Florence, Italy, May 2015. pdf

-S. Seneviratne, A. Seneviratne, M.A. Kaafar, A. Mahanti and P. Mohapatra, “Early Detection of Spam Mobile Apps”, in the International World Wide Web Conference (WWW 2015), Research Track, Florence, Italy, May 2015. pdf

-J. Zhou, Q. Wu, Z. Li, M.A. Kaafar, G. Xie, “A proactive transport mechanism with explicit congestion notification for NDN”, in IEEE ICC 2015 – Next Generation Networking Symposium, London, June 2015. pdf

2014

-M. Almishari, G. Tsudik, M. A. Kaafar and E. Oguz, “Stylometric Linkability of Tweets”, In the International Workshop on Privacy in the Electronic Society (WPES 2014), Scottsdale, Arizona, USA – November 2014. pdf

-Y. Sun, F. Seyed Kaveh, G. Yang, S. Vyas, J. Yun, M.A. Kaafar and S. Uhlig, “Trace-Driven Analysis of ICN Caching Algorithms on Video-on-Demand Workloads”, In ACM CoNEXT 2014, Sydney, December 2014. pdf

-E. De Cristofaro, A. Friedman, G. Jourjon , M.A. Kaafar and Z. Shafiq, ”Paying for Likes? Understanding Facebook Like Fraud Using Honeypots”, In ACM IMC 2014, November 2014, Vancouver. pdf

-A. Chaabane, T. Chen, A. Friedman , M. Cunche, E. De Cristofaro and M.A. Kaafar “Censorship in the Wild: Analyzing Internet Filtering in Syria”, in ACM IMC 2014, November 2014, Vancouver. pdf

-W. Wang, Y. Sun, K. Zheng, M. A. Kaafar, D. Li, Z. Li, “Freeway: Adaptively Isolating the Elephant and Mice Flows on Different Transmission Paths”, in IEEE ICNP 2014, October 2014, Raleigh. pdf

-T. Chen, R. Borelli, M. A. Kaafar, A. Friedman, “On the Effectiveness of Obfuscation Techniques in Online Social Networks”, in the Proceedings of Privacy Enhancing Technologies Symposium (PETS 2014, July 2014, Amsterdam. pdf

-M. Ikram, H. Asghar, M.A. Kaafar, A. Mahanti, ”On the Intrusiveness of JavaScript on the Web”, inCoNEXT Student Workshop Sydney, 2014. pdf

-J. Chauhan, A. Mahanti, M. A. Kaafar, ”Towards the Era of Wearable Computing?”, in CoNEXT Student Workshop Sydney, 2014. pdf

-J. Chauhan, H. J. Asghar, M. A. Kaafar, A. Mahanti, ”Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case”, December 2014. pdf

– K. Thilakarathna, F. Jiang, S. Mrabet, M.A. Kaafar, A. Seneviratne, P. Mohapatra, ”Crowd-Cache: Popular Content for Free”, Demo in ACM SIGMOBILE International Conference on Mobile Systems, Applications and Services (Mobisys), Bretton Woods, NH, USA, June, 2014. pdf

-A. Tiroshi, S. Berkovsky, M. A. Kaafar, D. Vallet, T. Kuflik, “Graph-Based Recommendations: Make the Most Out of Social Data”, in User Modeling, Adaptation and Personalization (UMAP 2014), July 2014, Aalborg, Denmark. pdf

-A, Chaabane, T. Chen, M. Cunche, A. Friedman, E. De Cristofaro, M.A. Kaafar, “Censorship in the Wild: Analyzing Web Filtering in Syria”,IMC’14, November 5–7, 2014, Vancouver, BC, Canada. pdf

-Z. Li, G. Xie, J. Lin, Y. Jin, M. A. Kaafar, K. Salamatian, “On the Geographical Patterns of a large-scale Mobile Video on-demand System”, In IEEE INFOCOM 2014, April 2014, Toronto Canada. pdf

-I. Ullah, R. Borelli, M. A. Kaafar, S. Kanhere “Characterising User Targeting For In-App Mobile Ads” inIEEE Infocom Workshop BigSecurity 2014, Toronto Canada. pdf

– W. Wang, S. Yi, Y. Guo, M. A. Kaafar, Z. Li. “CRCache: exploiting the Correlation between Content Popularity and Network Topology for ICN Caching”, in IEEE ICC 2014, Sydney. pdf

– A. Tiroshi, S. Berkovsky, M.A. Kaafar, D. Vallet, T. Chen, T. Kuflik ”Improving Business Rating Predictions Using Graph Based Features”, In Proc. of International conference on intelligent user interfaces (IUI 2014), Haifa, 2014. pdf

– T. Chen, M. A. Kaafar, R. Boreli, “Information Leakage Through Mobile Analytics Services”, in the 15th ACM International Workshop on Mobile Computing and Applications (HotMobile’14), February 2014, Santa Barbara, US. pdf

– A. Chaabane, Y. Ding, R. Dey, M. A. Kaafar, K. Ross, “A Closer look at Third-Party OSN Applications: Are they Leaking your Personal Information?”, in Passive Active Measurement conference (PAM 2014), Los Angeles, 2014. pdf

2013

– G.Smith, R. Boreli, M. A. Kaafar, “A Layered Secret Sharing scheme for Automated Profile Sharing in OSN Groups”, in the Tenth Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2013), Tokyo Japan, December 2013. pdf

– A. Tiroshi, S. Berkovsky, M.A. Kaafar, T. Chen, T. Kuflik, “Cross Social Networks Interests Predictions Based on Graph Features”, in ACM Recommender Systems Conference (RecSys 2013), Hong Kong, September 2013. pdf

– T. Launiger, K. Onarlioglu, A. Chaabane, E. Kirda, W. Robertson, M. A. Kaafar, “Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters”, in the Research in Attacks, intrusions and Defenses Symposium (RAID 2013). pdf

– M. A. Kaafar, S. Berkovsky, B. Donnet “On the Potential of Recommendation Technologies for Efficient Content Delivery Networks” Editorial notes In SIGCOMM Computer Communication Review CCR 2013. pdf

– A. Chaabane, E. De Cristofaro, M. A. Kaafar, E. Uzun “Privacy in Content-Oriented Networking: Threats and Countermeasures” In SIGCOMM Computer Communication Review CCR, presented at ACM SIGCOMM 2013. pdf

– G. Sarwar, O. Mehani, R. Boreli, M. A. Kaafar “On the effectiveness of Dynamic Taint Analysis for Monitoring Private Information on Android-based Mobile Devices”, In SECRYPT 2013.

– T.Chen, A. Chaabane, P-U. tournoux, M.A. Kaafar, R. Boreli “How much is too much: Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness”, In PETS 2013. pdf

– T. Chen, M. A. Kaafar, R. Boreli “The where and when of finding new friends: analysis of a location-based social discovery network”, in ICWSM 2013.

– D. Wang, H. Park, G. Xie, S.Moon, M.A. Kaafar, K.Salamatian, “A Genealogy of Information Spreading on Microblogs: a Galton-Watson-based Explicative Model”, In IEEE INFOCOM 2013.

– M. Cunche, M A Kaafar, R. Boreli, “Linking Wireless Devices Using Information Contained in Wi-Fi Probe Requests”, In The Pervasive and Mobile Computing journal PMC 2013.

– Yonggong Wang, Gaogang Xie, Mohamed Ali Kaafar, Steve Uhlig, “LMD: a local minimum driven and self-organized method to obtain locators”, In the 18th IEEE Symposium on Computers and Communications (ISCC 2013), 2013. pdf

– A. Seneviratne, K. Thilakarathna, S. Seneviratne, M. A. Kaafar, P. Mohapatra, “Reconciling Bitter Rivals: Towards Privacy-Aware and Bandwidth Efficient Mobile Ads Delivery Networks”, Invited paper in the International Conference on Communication Systems and Networks (COMSNETS 2013), January, 2013. pdf

2012

– Z. Li, J. Lin, M. Akodjenou, G. Xie, M. A. Kaafar, Y. Jin, G. Peng, “Watching Videos from Everywhere: a Study of the PPTV Mobile VoD System”, In ACM/Usenix Internet Measurement Conference (ACM IMC 2012). pdf

– L. Jacquin, V. Roca, M. A. Kaafar, F. Schuler, J. L. Roch, “IBTrack: An ICMP Black holes Tracker”, In IEEE Globecom 2012. pdf

– T. Chen, M. A. Kaafar, A. Friedman, R. Boreli, “Is More Always Merrier? A Deep Dive Into Online Social Footprints”, In ACM SIGCOMM WOSN 2012. pdf

– A. Chaabane, M. A. Kaafar, R. Boreli, “Big Friend is Watching You: Analyzing the tracking capabilities of online social networks”, In ACM SIGCOMM WOSN 2012.pdf

– C. Castelluccia, M. A. Kaafar, M. D. Tran, “Betrayed by Your Ads! Reconstructing User Profiles From Targeted Ads”, In PETS 2012, July 2012 Vigo, Spain. pdf

– Y. Wang, G. Xie, M. A. Kaafar, “FPC: A self-organized greedy routing in scale-free networks”, In the 17th IEEE Symposium on Computers and Communications (ISCC 2012), 2012. pdf

– M. Cunche, M. A. Kaafar, R. Boreli, “I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests” In the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2012) San Francisco, 2012. (Best Paper Runner-Up). pdf

– A. Chaabane, G. Acs, M. A. Kaafar, “You Are What You Like! Information leakage through users’ Interests” In The Network & Distributed System Security Symposium (NDSS 2012), San Diego, 2012.pdf

– B. Donnet, B. Gueye, and M. A. Kaafar. Path similarity evaluation using bloom filters. In The International Journal of Computer and Telecommunications Networking (Computer Networks) 2012. pdf

2011

– C. Castelluccia, E. De Cristofaro, A. Francillon, M. A. Kaafar ”EphPub: Toward Robust Ephemeral Publishing” In Proceedings of the 19th IEEE International Conference on Network Protocols (ICNP 2011), 2011. pdf

– Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils. “How Unique and Traceable are Usernames” In the 11th Privacy Enhancing Technologies Symposium(PETS 2011), Waterloo CA 2011. (Best Student Paper Award) pdf

– Ingmar Poese, Steve Uhlig, Mohamed Ali Kaafar, Benoit Donnet and Bamba Gueye, “IP Geolocation Databases: Unreliable?” in ACM SIGCOMM Computer Communication Review CCR,41(2), April 2011. pdf

– S. Leblond, A. Chaabane, P. Manils, M.A. Kaafar, C. Castelluccia, A. Legut, W. Dabbous, “One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users”, in USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET’11), Boston, April 2011. pdf

2010

– A. Chaabane, P. Manils, M.A. Kaafar, “Digging into Anonymous Traffic: a deep analysis of the Tor anonymizing network”, in Proceeding of the IEEE Conference on Network and System Security (NSS), Melbourne, September 2010. pdf

– C. Boucetta, M. A. Kaafar, M. Minier. How secure are secure localization protocols in WSNs. In the International ICST Conference on Wireless Sensor Network (WSN) Systems and Software, S-Cube,Miami, December 2010. pdf

– M.A. Kaafar, P. Manils. “Why Spammers should thank Google”, In Proceedings of the ACM workshop on Social Network Systems (SNS 2010), Paris, April 2010. pdf

– S. Le Blond, A. Legout, F. Lefessant, W. Dabbous, M.A. Kaafar, “Spying the World from your Laptop− Identifying and Profiling Content Providers and Big Downloaders in BitTorrent”, USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET’10), San Jose, CA, April 2010. pdf

– P.Manils, A. Chaabane, S. Le Blond,M. A. Kaafar, C. Castelluccia, A.Legout, W.Dabbous, “Compromising Tor Anonymity Exploiting P2P Information Leakage”, Presented in ACM Hot Topics in Privacy Enhancing Technologies (HotPETS), Berlin, July 2010. ACM. pdf

– B. Donnet, B. Gueye, M. A. Kaafar, “A survey on Network Coordinates Systems, Design and Security”, In the IEEE Communications Surveys and Tutorials, 2010. pdf

– M.A. Kaafar, L. Mathy, K. Salamatian, C. Barakat, T. Turletti and W. Dabbous. Tracking Relative Errors in Internet Coordinate Systems by a Kalman Filter. 26 pages, in Kalman Filter, Intech Edition. Edited by Vedran Kordic, ISBN 978-953-307-094-0, Publishing date : May 2010.pdf

– S. Leblond, P.Manils, A.Chaabane, M. A. Kaafar, A. Legout, C.Castelluccia, “De-anonymizing BitTorrent users on Tor”, Poster in the USENIX symposium on Networked Systems Design and Implementation (NSDI’10), San Jose, CA, April 2010.pdf

2009 Backwards

– C. Castelluccia, M. A. Kaafar, P. Manils, D. Perito, “Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers”, In Proceedings of the ACM/Usenix Internet Measurement Conference (ACM IMC 2009), Chicago, November 2009.

– M. A. Kaafar, L. Mathy, C. Barakat. K. Salamatian, T. Turletti, and W. Dabbous. “Certified Internet Coordinates” In Proceedings of the 18th International Conference on Computer Communications and Networks, Track on Peer to Peer Networking, San Francisco, ICCCN, August 2009.

– C.Castelluccia, M.A. Kaafar, “Owner-Centric Networking (OCN): Toward A Data Pollution-Free Internet.”, Applications and the Internet, IEEE/IPSJ International Symposium on (SAINT 2009), FIST’09, Seattle, August, 2009.

– C.Castelluccia, M. A. Kaafar,”Owner-Centric Networking: A New Architecture for a Pollution-Free Internet”, In ERCIM News No.77, Special Theme on Future Internet Technology, April 2009.

– A. Chaabane and M. A. Kaafar. Revisiting unstructured overlay network security. In Foundations & Practice Of Security workshop, Grenoble, June 2009.

– Y. Liao, M. A. Kaafar, B. Gueye, F. Cantin, P. Geurts and G. Leduc, ” Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning”, In Proc. of Networking 2009, May 2009, Aachen, Germany, LNCS, Springer.

– M.A. Kaafar, F. Cantin, B. Gueye and G. Leduc, “Detecting triangle inequality violations for Internet coordinate systems, In Proceedings of Future Networks, Dresden, Germany, June 2009.

– F. Cantin, B. Gueye, M.A.Kaafar and G.Leduc. “Overlay routing using coordinate systems”, In Proceedings of ACM CoNext student workshop, 9 Dec 2008, Madrid, Spain.

– B. Gueye, F. Cantin, M. A. Kaafar, G. Leduc. “A Self-Organized clustering scheme for overlay networks” in Proceedings of the International Workshop on Self-Organized Systems (IWSoS), 10-12 Dec 2008, Vienna, Austria, LNCS, Springer.

– M. A. Kaafar, B. Gueye, F. Cantin, G. Leduc, and L. Mathy. “Towards a Two-tier Internet coordinate system to mitigate the impact of triangle inequality violations” In Proceedings of IFIP-TC6 Networking, Singapore, 2008. Lectures Notes in Computer Science, May 2008.

– M.A. Kaafar, L. Mathy, C. Barakat. K. Salamatian, T. Turletti, and W. Dabbous. “Securing Internet Coordinate Embedding Systems” In Proceedings of ACM SIGCOMM 2007, Kyoto, Japan, August 2007.

also in SIGCOMM Computer Communication Review CCR online.

– F. Cantin, M. A. Kaafar, B. Gueye, G. Leduc, L. Mathy. “Explication et réduction de l’impact des violations d’inégalités triangulaires dans Vivaldi”, in CFIP 2008, Les arcs, 2008.

– M. A. Kaafar, L. Mathy, C. Barakat, K. Salamatian, T. Turletti, W. Dabbous, “Securing Internet Coordinate Systems, Invited paper at AINTEC 2007, Phuket, November 2007.

– M.A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous. “Virtual Networks under Attack: Disrupting Internet Coordinate Systems”, In Proceedings of the ACM/e-NEXT International Conference on Future Networking Technologies, CoNext 2006, Lisboa, Portugal, December, 2006. ACM Press.

– C. Mrabet, M.A. Kaafar, F. Kamoun, “Wireless Alternative Best Effort service: A case study of ALM, In Proc. Of CoNext 2006 St. Workshop, Lisboa, December 2006.

– M.A. Kaafar, C. Mrabet, and T. Turletti. “A Topolopgy-aware overlay multicast approach for mobile ad-hoc networks”, In Proceedings of the Asian Internet Engineering Conference (AINTEC), LNCS 4311, pp. 31–47, Bangkok, Thailand, November, 2006.

– M.A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous. “Real Attacks on Virtual Networks: Vivaldi out of tune”, In Proceedings of the ACM SIGCOMM workshop Large Scale Attack Defense (LSAD), Pisa, Italy, September 2006. ACM SIGCOMM, ACM Press.

– M.A. Kaafar, T. Turletti, and W. Dabbous. “Un réseau de recouvrement multipoint passant à léchelle”, In Proceedings of CFIP 2006, Tozeur, Tunisia, November 2006.

– C. Mrabet, M.A. Kaafar, and F. Kamoun. “Transmission applicative multipoint pour les réseaux ad-hoc”, In Proceedings of CFIP 2006, Tozeur, Tunisia, November 2006.

– M.A. Kaafar, T. Turletti, and W. Dabbous. “A Locating-First Approach for Scalable Overlay multicast”, in Proceedings of IEEE IWQoS, New Haven,CT, USA, June 2006.

Finalist for the best paper award.

– M.A. Kaafar, T. Turletti, and W. Dabbous. “A Locating-First Approach for Scalable Overlay multicast”, in Proceedings of IEEE INFOCOM st. Workshop, Barcelona, April 2006.

– M.A. Kaafar, T. Turletti, and W. Dabbous. “LCC: Scalablity in Topology-aware Overlays”, Tech. Report RT-0314, Sophia Antipolis, November 2005.

– M.A. Kaafar, T. Turletti, and W. Dabbous. “Locate, Cluster and Conquer: A Scalable Topology-aware Overlay Multicast”, In proceedings of the WG3 PhD workshop, Sophia Antipolis, September 2005.

– M.A.Kaafar, L. Benazzouz and F.Kamoun. “Test beds and experiments of a Kerberos-based authentication architecture for Wi-Fi networks”. In proceedings of the IFIP-TC6 conference “Netcon 2004″, palma de Mallorca, November 2004.

– M.A. Kaafar, L. Benazzouz, D. Males and F. Kamoun. “A Kerberos-based Authentication Architecture for Wireless LANs”, In proceedings of the third IFIP-TC6 international conference on networking (Networking 2004), Athens, May 2004.

Technical Reports

– P. Manils, A. Chaabane, S. Leblond, M. A. Kaafar, A. Legout, C. Castelluccia, and W. Dabbous. Compromizing tor anonymity exploiting p2p information leakage. Technical report, INRIA,http://hal.inria.fr/inria-00471556/fr/

– M. A. Kaafar, L. Mathy, C. Barakat, K. Salamatian, T. Turletti, W. Dabbous, Securing the distance Estimation phase of Internet Coordinate systems, Technical Report INRIA,http://hal.inria.fr/inria-00197605/en/

– M. A. Kaafar, L. Mathy, C. Barakat, K. Salamatian, T. Turletti, W. Dabbous, Securing Internet Coordinate System : Embedding Phase, Technical Report INRIA,http://hal.inria.fr/inria-00151257/fr/

– M. A. Kaafar, L. Mathy, T. Tureltti, W. Dabbous, Virtual Networks under Attack : Disrupting Internet Coordinate Systems, Technical Report INRIA,http://hal.inria.fr/inria-00085296/fr/

– M. A. Kaafar, T. Tureltti, W. Dabbous, Locate, Cluster and Conquer : A Scalable Topologyaware Overlay Multicast, Technical Report INRIA, http://hal.inria.fr/inria-00069866/fr/