메뉴 건너뛰기




Volumn , Issue , 2003, Pages 72-78

New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets

Author keywords

Anonymity; Covert channel; HTTP; Mix network

Indexed keywords

COMMUNICATION; CRYPTOGRAPHY; DATA TRANSFER; HTTP; MATHEMATICAL MODELS; PROBLEM SOLVING; SECURITY OF DATA; WEB BROWSERS;

EID: 1642343952     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (46)

References (42)
  • 2
    • 1642287876 scopus 로고    scopus 로고
    • http://www.anonymizer.com/.
  • 3
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • I. S. Moskowitz, Ed., Springer-Verlag, LNCS 2137
    • Back, A., Möller, U., and Stiglic, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Information Hiding (IH 2001) (2001), I. S. Moskowitz, Ed., Springer-Verlag, LNCS 2137, pp. 245-257. http://www.cypherspace.org/adam/pubs/traffic.pdf.
    • (2001) Information Hiding (IH 2001) , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 5
    • 0009435080 scopus 로고
    • Uniform resource locators (URL)
    • RFC, Internet Engineering Task Force, December
    • Berners-Lee, T., Masinter, L., and MCCahill, M. Uniform resource locators (URL). RFC, Internet Engineering Task Force, December 1994. RFC 1738.
    • (1994) RFC , vol.1738
    • Berners-Lee, T.1    Masinter, L.2    McCahill, M.3
  • 7
    • 0037974470 scopus 로고    scopus 로고
    • Dummy traffic against long term intersection attacks
    • R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS 2482
    • Berthold, O., and Langos, H. Dummy traffic against long term intersection attacks. In Privacy Enhancing Technologies (PET 2002) (2002), R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS 2482.
    • (2002) Privacy Enhancing Technologies (PET 2002)
    • Berthold, O.1    Langos, H.2
  • 12
    • 1642393548 scopus 로고    scopus 로고
    • Convention on cybercrime
    • European Union
    • Council of Europe. Convention on cybercrime. Tech. rep., European Union, 2001. available from http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
    • (2001) Tech. Rep.
  • 14
    • 1642294383 scopus 로고    scopus 로고
    • DART
    • Doubleclick, I. DART. http://www.doubleclick.com/us/corporate/privacy/privacy/internet-ads/dart.asp, 2003.
    • (2003)
    • Doubleclick, I.1
  • 15
    • 1642356149 scopus 로고    scopus 로고
    • KaZaA BV
    • KaZaA BV. http://www.fasttrack.nu/.
  • 17
    • 35248897534 scopus 로고    scopus 로고
    • Eliminating Steganography in Internet Traffic with Active Wardens
    • Springer
    • Fisk, G., Fisk, M., Papadopoulos, C., and Neil, J. Eliminating Steganography in Internet Traffic with Active Wardens. In Information Hiding 2002 (2002), Springer, pp. 18-35.
    • (2002) Information Hiding 2002 , pp. 18-35
    • Fisk, G.1    Fisk, M.2    Papadopoulos, C.3    Neil, J.4
  • 18
    • 0003365506 scopus 로고    scopus 로고
    • HTTP Authentication: Basic and Digest Access Authentication
    • RFC, Internet Engeneering Task Force, June
    • Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., and Stewart, L. HTTP Authentication: Basic and Digest Access Authentication. RFC, Internet Engeneering Task Force, June 1999. RFC 2617.
    • (1999) RFC , vol.2617
    • Franks, J.1    Hallam-Baker, P.2    Hostetler, J.3    Lawrence, S.4    Leach, P.5    Luotonen, A.6    Stewart, L.7
  • 20
    • 0003317098 scopus 로고    scopus 로고
    • How to make personalized web browsing simple, secure, and anonymous
    • February, Springer. LNCS 1318
    • Gabber, E., Gibbons, P., Matias, Y., , and Mayer, A. How to make personalized web browsing simple, secure, and anonymous. In Proceedings of Financial Cryptography 97 (February 1997), Springer. LNCS 1318.
    • (1997) Proceedings of Financial Cryptography 97
    • Gabber, E.1    Gibbons, P.2    Matias, Y.3    Mayer, A.4
  • 21
    • 54649083230 scopus 로고    scopus 로고
    • TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web
    • August
    • Goldberg, I., and Wagner, D. TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web. First Monday 3, 4 (August 1998).
    • (1998) First Monday , vol.3 , pp. 4
    • Goldberg, I.1    Wagner, D.2
  • 22
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • February
    • Goldschlag, D. M., Reed, M. G., and Syverson, P. F. Onion routing for anonymous and private internet connections. Communications of the ACM 42, 2 (February 1999).
    • (1999) Communications of the ACM , vol.42 , pp. 2
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 26
    • 0006913907 scopus 로고    scopus 로고
    • Stop-and-go MIXes providing probabilistic anonymity in an open system
    • Springer-Verlag, LNCS 1525
    • Kesdogan, D., Egner, M., and Büschkes, T. Stop-and-go MIXes providing probabilistic anonymity in an open system. In Information Hiding (IH 1998) (1998), Springer-Verlag, LNCS 1525. http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf.
    • (1998) Information Hiding (IH 1998)
    • Kesdogan, D.1    Egner, M.2    Büschkes, T.3
  • 27
    • 0008144259 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity - A proposal for terminology
    • July, Springer
    • Köhntopp, M., and Pfitzmann, A. Anonymity, unobservability, and pseudonymity - a proposal for terminology. In Designing Privacy Enhancing Technologies (July 2000), Springer.
    • (2000) Designing Privacy Enhancing Technologies
    • Köhntopp, M.1    Pfitzmann, A.2
  • 28
    • 0012209329 scopus 로고    scopus 로고
    • HTTP state management mechanism
    • February
    • Kristol, D., and Montulli, L. HTTP state management mechanism. http://www.ietf.org/rfc/rfc2109.txt, February 1997. RFC 2109.
    • (1997) RFC , vol.2109
    • Kristol, D.1    Montulli, L.2
  • 29
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October
    • Lampson, B. W. A note on the confinement problem. Communications of the ACM 16, 10 (October 1973), 613-615.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 31
    • 1642370897 scopus 로고    scopus 로고
    • Distributions of traffic stratified by application
    • Cooperative Association for Internet Data Analysis (CAIDA), September
    • Modeling, N., and Project, S. Distributions of traffic stratified by application. Tech. rep., Cooperative Association for Internet Data Analysis (CAIDA), September 2002.
    • (2002) Tech. Rep.
    • Modeling, N.1    Project, S.2
  • 32
    • 20444447364 scopus 로고    scopus 로고
    • Unfinished draft, January 2000
    • Möller, U., and Cottrell, L. Mixmaster Protocol - Version 2. Unfinished draft, January 2000., 2000. http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-mixmaster2-protocol-00. txt.
    • (2000) Mixmaster Protocol - Version 2
    • Möller, U.1    Cottrell, L.2
  • 33
    • 1642404793 scopus 로고    scopus 로고
    • On the use of HTTP as a substrate
    • Tech. rep., Internet Engineering Task Force, February
    • Moore, K. On the use of HTTP as a substrate. Tech. rep., Internet Engineering Task Force, February 2002. RFC 3205.
    • (2002) RFC , vol.3205
    • Moore, K.1
  • 34
    • 53349102286 scopus 로고    scopus 로고
    • Prospects for remailers
    • August
    • Parekh, S. Prospects for remailers. First Monday 1, 2 (August 1996). http://www.firstmonday.dk/issues/issue2/remailers/.
    • (1996) First Monday , vol.1 , pp. 2
    • Parekh, S.1
  • 36
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for Web transactions
    • Nov.
    • Reiter, M. K., and Rubin, A. D. Crowds: anonymity for Web transactions. TISSEC 1, 1 (Nov. 1998), 66-92.
    • (1998) TISSEC , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.K.1    Rubin, A.D.2
  • 37
    • 20444437836 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
    • Washington, DC, USA, November
    • Rennhard, M., and Plattner, B. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In Proceedings of the Workshop on Privacy in the Electronic Society (Washington, DC, USA, November 2002).
    • (2002) Proceedings of the Workshop on Privacy in the Electronic Society
    • Rennhard, M.1    Plattner, B.2
  • 38
    • 0012054514 scopus 로고    scopus 로고
    • Covert channels in the TCP/IP protocol suite
    • May
    • Rowland, C. H. Covert channels in the TCP/IP protocol suite. First Monday 2, 5 (May 1997).
    • (1997) First Monday , vol.2 , pp. 5
    • Rowland, C.H.1
  • 39
    • 1642387170 scopus 로고    scopus 로고
    • From a trickle to a flood: Active attacks on several mix types
    • October, F. Petitcolas, Ed., Springer-Verlag, LNCS 2578
    • Serjantov, A., Dingledine, R., and Syverson, P. From a trickle to a flood: Active attacks on several mix types. In Proceedings of Information Hiding Workshop (IH 2002) (October 2002), F. Petitcolas, Ed., Springer-Verlag, LNCS 2578.
    • (2002) Proceedings of Information Hiding Workshop (IH 2002)
    • Serjantov, A.1    Dingledine, R.2    Syverson, P.3
  • 40
    • 0003213193 scopus 로고    scopus 로고
    • IP Network Address Translator (NAT) Terminology and Considerations
    • RFC, Internet Engineering Task Force, August
    • Srisuresh, P., and Holdrege, M. IP Network Address Translator (NAT) Terminology and Considerations. RFC, Internet Engineering Task Force, August 1999. RFC 2663.
    • (1999) RFC , vol.2663
    • Srisuresh, P.1    Holdrege, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.