Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hamza Harkous is active.

Publication


Featured researches published by Hamza Harkous.


internet measurement conference | 2015

Dissecting UbuntuOne: Autopsy of a Global-scale Personal Cloud Back-end

Raúl Gracia-Tinedo; Yongchao Tian; Josep Sampé; Hamza Harkous; John Lenton; Pedro García-López; Marc Sánchez-Artigas; Marko Vukolić

Personal Cloud services, such as Dropbox or Box, have been widely adopted by users. Unfortunately, very little is known about the internal operation and general characteristics of Personal Clouds since they are proprietary services. In this paper, we focus on understanding the nature of Personal Clouds by presenting the internal structure and a measurement study of UbuntuOne (U1). We first detail the U


privacy enhancing technologies | 2016

The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps

Hamza Harkous; Rameez Rahman; Bojan Karlas; Karl Aberer

1


Software Quality Journal | 2015

PBCOV: a property-based coverage criterion

Kassem Fawaz; Fadi A. Zaraket; Wes Masri; Hamza Harkous

architecture, core components involved in the U1 metadata service hosted in the datacenter of Canonical, as well as the interactions of U


privacy enhancing technologies | 2014

C3P: Context-Aware Crowdsourced Cloud Privacy

Hamza Harkous; Rameez Rahman; Karl Aberer

1


international conference on computational linguistics | 2012

Arabic entity graph extraction using morphology, finite state machines, and graph transformations

Jad Makhlouta; Fadi A. Zaraket; Hamza Harkous

with Amazon S3 to outsource data storage. To our knowledge, this is the first research work to describe the internals of a large-scale Personal Cloud. Second, by means of tracing the U


conference on information and knowledge management | 2017

Taxonomy Induction Using Hypernym Subsequences

Amit Gupta; Rémi Lebret; Hamza Harkous; Karl Aberer

1


international conference on smart homes and health telematics | 2011

Adaptive Fuzzy Spray and Wait: Efficient routing for Opportunistic Networks

Jad Makhlouta; Hamza Harkous; Farah Hutayt; Hassan Artail

servers, we provide an extensive analysis of its back-end activity for one month. Our analysis includes the study of the storage workload, the user behavior and the performance of the U1 metadata store. Moreover, based on our analysis, we suggest improvements to U1 that can also benefit similar Personal Cloud systems. Finally, we contribute our dataset to the community, which is the first to contain the back-end activity of a large-scale Personal Cloud. We believe that our dataset provides unique opportunities for extending research in the field.


symposium on usable privacy and security | 2016

PriBots: Conversational Privacy with Chatbots

Hamza Harkous; Kassem Fawaz; Kang G. Shin; Karl Aberer

Abstract Third party apps that work on top of personal cloud services, such as Google Drive and Drop-box, require access to the user’s data in order to provide some functionality. Through detailed analysis of a hundred popular Google Drive apps from Google’s Chrome store, we discover that the existing permission model is quite often misused: around two-thirds of analyzed apps are over-privileged, i.e., they access more data than is needed for them to function. In this work, we analyze three different permission models that aim to discourage users from installing over-privileged apps. In experiments with 210 real users, we discover that the most successful permission model is our novel ensemble method that we call Far-reaching Insights. Far-reaching Insights inform the users about the data-driven insights that apps can make about them (e.g., their topics of interest, collaboration and activity patterns etc.) Thus, they seek to bridge the gap between what third parties can actually know about users and users’ perception of their privacy leakage. The efficacy of Far-reaching Insights in bridging this gap is demonstrated by our results, as Far-reaching Insights prove to be, on average, twice as effective as the current model in discouraging users from installing over-privileged apps. In an effort to promote general privacy awareness, we deployed PrivySeal, a publicly available privacy-focused app store that uses Far-reaching Insights. Based on the knowledge extracted from data of the store’s users (over 115 gigabytes of Google Drive data from 1440 users with 662 installed apps), we also delineate the ecosystem for 3rd party cloud apps from the standpoint of developers and cloud providers. Finally, we present several general recommendations that can guide other future works in the area of privacy for the cloud. To the best of our knowledge, ours is the first work that tackles the privacy risk posed by 3rd party apps on cloud platforms in such depth.


symposium on usable privacy and security | 2016

Data-Driven Privacy Indicators

Hamza Harkous; Rameez Rahman; Karl Aberer

Coverage criteria aim at satisfying test requirements and compute metrics values that quantify the adequacy of test suites at revealing defects in programs. Typically, a test requirement is a structural program element, and the coverage metric value represents the percentage of elements covered by a test suite. Empirical studies show that existing criteria might characterize a test suite as highly adequate, while it does not actually reveal some of the existing defects. In other words, existing structural coverage criteria are not always sensitive to the presence of defects. This paper presents PBCOV, a Property-Based COVerage criterion, and empirically demonstrates its effectiveness. Given a program with properties therein, static analysis techniques, such as model checking, leverage formal properties to find defects. PBCOV is a dynamic analysis technique that also leverages properties and is characterized by the following: (a) It considers the state space of first-order logic properties as the test requirements to be covered; (b) it uses logic synthesis to compute the state space; and (c) it is practical, i.e., computable, because it considers an over-approximation of the reachable state space using a cut-based abstraction.We evaluated PBCOV using programs with test suites comprising passing and failing test cases. First, we computed metrics values for PBCOV and structural coverage using the full test suites. Second, in order to quantify the sensitivity of the metrics to the absence of failing test cases, we computed the values for all considered metrics using only the passing test cases. In most cases, the structural metrics exhibited little or no decrease in their values, while PBCOV showed a considerable decrease. This suggests that PBCOV is more sensitive to the absence of failing test cases, i.e., it is more effective at characterizing test suite adequacy to detect defects, and at revealing deficiencies in test suites.


usenix security symposium | 2018

Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning.

Hamza Harkous; Kassem Fawaz; Rémi Lebret; Florian Schaub; Kang G. Shin; Karl Aberer

Due to the abundance of attractive services available on the cloud, people are placing an increasing amount of their data online on different cloud platforms. However, given the recent large-scale attacks on users data, privacy has become an important issue. Ordinary users cannot be expected to manually specify which of their data is sensitive, or to take appropriate measures to protect such data. Furthermore, usually most people are not aware of the privacy risk that different shared data items can pose. In this paper, we present a novel conceptual framework in which privacy risk is automatically calculated using the sharing context of data items. To overcome ignorance of privacy risk on the part of most users, we use a crowdsourcing based approach. We use Item Response Theory (IRT) on top of this crowdsourced data to determine the sensitivity of items and diverse attitudes of users towards privacy. First, we determine the feasibility of IRT for the cloud scenario by asking workers feedback on Amazon mTurk on various sharing scenarios. We obtain a good fit of the responses with the theory, and thus show that IRT, a well-known psychometric model for educational purposes, can be applied to the cloud scenario. Then, we present a lightweight mechanism such that users can crowdsource their sharing contexts with the server and determine the risk of sharing particular data item(s) privately. Finally, we use the Enron dataset to simulate our conceptual framework and also provide experimental results using synthetic data. We show that our scheme converges quickly and provides accurate privacy risk scores under varying conditions.

Collaboration


Dive into the Hamza Harkous's collaboration.

Top Co-Authors

Avatar

Karl Aberer

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rémi Lebret

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Jad Makhlouta

American University of Beirut

View shared research outputs
Top Co-Authors

Avatar

Rameez Rahman

Delft University of Technology

View shared research outputs
Top Co-Authors

Avatar

Amit Gupta

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fadi A. Zaraket

American University of Beirut

View shared research outputs
Top Co-Authors

Avatar

Farah Hutayt

American University of Beirut

View shared research outputs
Top Co-Authors

Avatar

Hassan Artail

American University of Beirut

View shared research outputs
Researchain Logo
Decentralizing Knowledge