메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 18-33

Timing analysis in low-latency mix networks: Attacks and defenses

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CORRELATION METHODS; INTERACTIVE COMPUTER SYSTEMS; INTERNET; MATHEMATICAL MODELS; TELECOMMUNICATION TRAFFIC;

EID: 33750276494     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_2     Document Type: Conference Paper
Times cited : (147)

References (33)
  • 2
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Proc. 4th International Workshop on Information Hiding
    • A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proc. 4th International Workshop on Information Hiding, volume 2137 of LNCS, pages 245-257, 2001.
    • (2001) LNCS , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 3
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A system for anonymous and unobservable Internet access
    • Proc. Workshop on Design Issues in Anonymity and Unobservability
    • O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: a system for anonymous and unobservable Internet access. In Proc. Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 115-129, 2000.
    • (2000) LNCS , vol.2009 , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 4
    • 84957805506 scopus 로고    scopus 로고
    • Dummy traffic against long-term intersection attacks
    • Proc. 2nd International Workshop on Privacy-Enhancing Technologies
    • O. Berthold and H. Langos. Dummy traffic against long-term intersection attacks. In Proc. 2nd International Workshop on Privacy-Enhancing Technologies, volume 2482 of LNCS, pages 110-128, 2002.
    • (2002) LNCS , vol.2482 , pp. 110-128
    • Berthold, O.1    Langos, H.2
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 7
    • 84904332394 scopus 로고    scopus 로고
    • Statistical disclosure attacks
    • Proc. Security and Privacy in the Age of Uncertainty
    • G. Danezis. Statistical disclosure attacks. In Proc. Security and Privacy in the Age of Uncertainty, volume 250 of IFIP Conference Proceedings, pages 421-426, 2003.
    • (2003) IFIP Conference Proceedings , vol.250 , pp. 421-426
    • Danezis, G.1
  • 8
    • 24344460554 scopus 로고    scopus 로고
    • The traffic analysis of continuous-time mixes
    • Proc. 4th International Workshop on Privacy-Enhancing Technologies
    • G. Danezis. The traffic analysis of continuous-time mixes. In Proc. 4th International Workshop on Privacy-Enhancing Technologies, volume 3424 of LNCS, pages 35-50, 2004.
    • (2004) LNCS , vol.3424 , pp. 35-50
    • Danezis, G.1
  • 10
    • 35048895319 scopus 로고    scopus 로고
    • Statistical disclosure or intersection attacks on anonymity systems
    • Proc. 6th International Workshop on Information Hiding
    • G. Danezis and A. Serjantov. Statistical disclosure or intersection attacks on anonymity systems. In Proc. 6th International Workshop on Information Hiding, volume 3200 of LNCS, pages 293-308, 2004.
    • (2004) LNCS , vol.3200 , pp. 293-308
    • Danezis, G.1    Serjantov, A.2
  • 16
    • 84941155400 scopus 로고
    • January
    • Internet Traffic Archive. Two hours of wide-area TCP traffic. http://ita.ee.lbl.gov/html/contrib/LBL-TCP-3.html, January 1994.
    • (1994) Two Hours of Wide-area TCP Traffic
  • 17
    • 33846288517 scopus 로고    scopus 로고
    • Timing attacks in low-latency mix systems
    • Proc. 8th International Conference on Financial Cryptography
    • B. Levine, M. Reiter, C. Wang, and M. Wright. Timing attacks in low-latency mix systems. In Proc. 8th International Conference on Financial Cryptography, volume 3110 of LNCS, pages 251-265, 2004.
    • (2004) LNCS , vol.3110 , pp. 251-265
    • Levine, B.1    Reiter, M.2    Wang, C.3    Wright, M.4
  • 20
    • 33750271074 scopus 로고    scopus 로고
    • December
    • National Laboratory for Applied Network Research. Auckland-VIII data set. http://pma.nlanr.net/Special/auck8.html, December 2003.
    • (2003) Auckland-VIII Data Set
  • 21
    • 84941157635 scopus 로고    scopus 로고
    • National Laboratory for Applied Network Research. PMA special traces archive. http://pma.nlanr.net/Special/, 2005.
    • (2005) PMA Special Traces Archive
  • 25
    • 0142250280 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • Proc. 8th European Symposium on Research in Computer Security
    • A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Proc. 8th European Symposium on Research in Computer Security, volume 2808 of LNCS, pages 116-131, 2003.
    • (2003) LNCS , vol.2808 , pp. 116-131
    • Serjantov, A.1    Sewell, P.2
  • 26
    • 3042662497 scopus 로고    scopus 로고
    • Probabilistic analysis of an anonymity system
    • V. Shmatikov. Probabilistic analysis of an anonymity system. J. Computer Security, 12(3-4):355-377, 2004.
    • (2004) J. Computer Security , vol.12 , Issue.3-4 , pp. 355-377
    • Shmatikov, V.1
  • 28
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Proc. Workshop on Design Issues in Anonymity and Unobservability
    • P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In Proc. Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 96-114, 2000.
    • (2000) LNCS , vol.2009 , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4
  • 29
    • 84944785768 scopus 로고    scopus 로고
    • A security model for dynamic adaptable traffic masking
    • B. Timmerman. A security model for dynamic adaptable traffic masking. In Proc. New Security Paradigms Workshop, pages 107-116, 1997.
    • (1997) Proc. New Security Paradigms Workshop , pp. 107-116
    • Timmerman, B.1
  • 31
    • 0028713303 scopus 로고
    • Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
    • B. Venkatraman and R. Newman-Wolfe. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. In Proc. IEEE/ACM 10th Annual Computer Security Applications Conference, pages 288-297, 1994.
    • (1994) Proc. IEEE/ACM 10th Annual Computer Security Applications Conference , pp. 288-297
    • Venkatraman, B.1    Newman-Wolfe, R.2
  • 33
    • 24344450770 scopus 로고    scopus 로고
    • On flow correlation attacks and countermeasures in mix networks
    • Proc. 4th International Workshop on Privacy-Enhancing Technologies
    • Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proc. 4th International Workshop on Privacy-Enhancing Technologies, volume 3424 of LNCS, pages 207-225, 2004.
    • (2004) LNCS , vol.3424 , pp. 207-225
    • Zhu, Y.1    Fu, X.2    Graham, B.3    Bettati, R.4    Zhao, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.