Stevens Le Blond
Stevens Le Blond
Unknown affiliation
No verified email
Cited by
Cited by
Pushing bittorrent locality to the limit
S Le Blond, A Legout, W Dabbous
Computer Networks 55 (3), 541-557, 2011
Towards efficient traffic-analysis resistant anonymity networks
S Le Blond, D Choffnes, W Zhou, P Druschel, H Ballani, P Francis
ACM SIGCOMM Computer Communication Review 43 (4), 303-314, 2013
A look at targeted attacks through the lense of an {NGO}
S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda
23rd {USENIX} Security Symposium ({USENIX} Security 14), 543-558, 2014
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ...
Proceedings of the 4th USENIX workshop on Large-scale exploits and emergent …, 2011
Herd: A scalable, traffic analysis resistant anonymity network for VoIP systems
S Le Blond, D Choffnes, W Caldwell, P Druschel, N Merritt
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
Spying the World from your Laptop--Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
SL Blond, A Legout, FL Fessant, W Dabbous, MA Kaafar
Proceedings of the 3rd USENIX workshop on Large-scale exploits and emergent …, 2010
I know where you are and what you are sharing: exploiting p2p communications to invade users' privacy
S Le Blond, C Zhang, A Legout, K Ross, W Dabbous
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
Clustering in p2p exchanges and consequences on performances
S Le-Blond, JL Guillaume, M Latapy
Proceedings of the 4-th international workshop on Peer-to-Peer Systems (IPTPS), 2005
To catch a ratter: Monitoring the behavior of amateur darkcomet rat operators in the wild
B Farinholt, M Rezaeirad, P Pearce, H Dharmdasani, H Yin, S Le Blond, ...
2017 IEEE symposium on security and privacy (SP), 770-787, 2017
Statistical analysis of a P2P query graph based on degrees and their time-evolution
JL Guillaume, M Latapy, S Le-Blond
Distributed Computing-IWDC 2004: 6th International Workshop, Kolkata, India …, 2005
Finding good partners in availability-aware p2p networks
S Le Blond, F Le Fessant, E Le Merrer
Stabilization, Safety, and Security of Distributed Systems: 11th …, 2009
Compromising Tor anonymity exploiting P2P information leakage
P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ...
arXiv preprint arXiv:1004.1461, 2010
A Broad View of the Ecosystem of Socially Engineered Exploit Documents.
S Le Blond, C Gilbert, U Upadhyay, M Gomez-Rodriguez, DR Choffnes
NDSS, 2017
On enforcing the digital immunity of a large humanitarian organization
S Le Blond, A Cuevas, JR Troncoso-Pastoriza, P Jovanovic, B Ford, ...
2018 IEEE Symposium on Security and Privacy (SP), 424-440, 2018
Clustering in p2p exchanges and consequences on performances
JL Guillaume, S Le-Blond, M Latapy
Lecture Notes in Computer Sciences (LNCS), proceedings of the 4-th …, 2005
Choosing partners based on availability in P2P networks
SL Blond, FL Fessant, EL Merrer
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-14, 2012
Early application experience with the grid application toolkit (gat)
S Le Blond, AM Oprescu, C Zhang
Workshop on Grid Applications held in conjunction with the Fourteenth Global …, 2005
Moby: A blackout-resistant anonymity network for mobile devices
A Pradeep, H Javaid, R Williams, A Rault, D Choffnes, S Le Blond, B Ford
Proceedings on Privacy Enhancing Technologies 3, 247-267, 2022
Attacking Large-Scale, Real-World Systems
S Le Blond, P Manils, A Chaabane, MA Kaafar
Clustering in P2P Exchanges and Consequences
S Le Blond, JL Guillaume, M Latapy
Peer-to-peer Systems:... International Workshop, IPTPS...: Revised Papers, 193, 2005
The system can't perform the operation now. Try again later.
Articles 1–20