Follow
Mashael AlSabah
Mashael AlSabah
Qatar Computing Research Institute
Verified email at hbku.edu.qa
Title
Cited by
Cited by
Year
Circuit fingerprinting attacks: Passive deanonymization of tor hidden services
A Kwon, M AlSabah, D Lazar, M Dacier, S Devadas
24th USENIX Security Symposium (USENIX Security 15), 287-302, 2015
2062015
Performance and security improvements for tor: A survey
M AlSabah, I Goldberg
ACM Computing Surveys (CSUR) 49 (2), 1-36, 2016
1232016
Changing of the guards: A framework for understanding and improving entry guard selection in Tor
T Elahi, K Bauer, M AlSabah, R Dingledine, I Goldberg
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 43-54, 2012
1182012
Enhancing Tor's performance using real-time traffic classification
M AlSabah, K Bauer, I Goldberg
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1122012
DefenestraTor: Throwing out windows in Tor
M AlSabah, K Bauer, I Goldberg, D Grunwald, D McCoy, S Savage, ...
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
982011
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
H Al Jawaheri, M Al Sabah, Y Boshmaf, A Erbad
Computers & Security 89, 101684, 2020
94*2020
The path less travelled: Overcoming Tor’s bottlenecks with traffic splitting
M AlSabah, K Bauer, T Elahi, I Goldberg
Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013
92*2013
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
M Alsabah, G Oligeri, R Riley
Computers and Security (COSE1320), 2018
542018
PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks
M AlSabah, I Goldberg
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
492013
Investigating MMM Ponzi scheme on bitcoin
Y Boshmaf, C Elvitigala, H Al Jawaheri, P Wijesekera, M Al Sabah
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
232020
BlockTag: Design and applications of a tagging system for blockchain analysis
Y Boshmaf, H Al Jawaheri, M Al Sabah
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
192019
QuicTor: Enhancing tor for real-time communication using QUIC transport protocol
L Basyoni, A Erbad, M Alsabah, N Fetais, A Mohamed, M Guizani
IEEE Access 9, 28769-28784, 2021
162021
Exposing the rat in the tunnel: Using traffic analysis for tor-based malware detection
P Dodia, M AlSabah, O Alrawi, T Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
152022
Empirical performance evaluation of QUIC protocol for Tor anonymity network
L Basyoni, A Erbad, M Alsabah, N Fetais, M Guizani
2019 15th International Wireless Communications & Mobile Computing …, 2019
122019
PriviPK: Certificate-less and secure email communication
M AlSabah, A Tomescu, I Lebedev, D Serpanos, S Devadas
Computers & Security 70, 1-15, 2017
72017
Phishing domain detection systems and methods
Y Boshmaf, M Al Sabah, M Nabeel
US Patent 11,546,377, 2023
52023
Content-agnostic detection of phishing domains using certificate transparency and passive dns
M AlSabah, M Nabeel, Y Boshmaf, E Choo
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
52022
Context-aware RAON middleware for opportunistic network
G Lau, M Al-Sabah, M Jaseemuddin, H Razavi, M Bhuiyan
Pervasive and Mobile Computing 41, 28-45, 2017
52017
DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference
E Choo, M Nabeel, M Alsabah, I Khalil, T Yu, W Wang
ACM Transactions on Privacy and Security 26 (1), 1-32, 2022
4*2022
Characterizing Bitcoin donations to open source software on GitHub
Y Zhauniarovich, Y Boshmaf, HA Jawaheri, MA Sabah
arXiv preprint arXiv:1907.04002, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20