메뉴 건너뛰기




Volumn , Issue , 2008, Pages 65-74

Protecting privacy with protocol stack virtualization

Author keywords

Privacy; Protocol stack virtualization; Pseudonymity

Indexed keywords

HOST-BASED; LEGACY APPLICATIONS; PRIVACY; PRIVACY PROTECTION; PROTOCOL STACK; PROTOCOL STACK VIRTUALIZATION; PSEUDO RANDOM; PSEUDONYMITY; SIMPLE APPROACH; TYPICAL APPLICATION; VIRTUALIZATIONS;

EID: 69949171811     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456403.1456416     Document Type: Conference Paper
Times cited : (7)

References (43)
  • 1
    • 4043116941 scopus 로고    scopus 로고
    • Private authentication
    • Sept
    • M. Abadi and C. Fournet. Private authentication. Theor. Comput. Sci., 322(3):427-476, Sept. 2004.
    • (2004) Theor. Comput. Sci , vol.322 , Issue.3 , pp. 427-476
    • Abadi, M.1    Fournet, C.2
  • 8
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb
    • D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90, Feb. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 13
    • 4444318660 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • Oct
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In SOSP, Oct. 2003.
    • (2003) SOSP
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 15
    • 85084160565 scopus 로고    scopus 로고
    • Transient addressing for related processes: Improved firewalling by using IPV6 and multiple addresses per host
    • Aug
    • P. M. Gleitz and S. M. Bellovin. Transient addressing for related processes: improved firewalling by using IPV6 and multiple addresses per host. In 10th USENIX Security Symposium, Aug. 2001.
    • (2001) 10th USENIX Security Symposium
    • Gleitz, P.M.1    Bellovin, S.M.2
  • 18
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mob. Netw. Appl., 10(3):315-325, 2005.
    • (2005) Mob. Netw. Appl , vol.10 , Issue.3 , pp. 315-325
    • Gruteser, M.1    Grunwald, D.2
  • 20
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Aug
    • M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In 10th USENIX Security Symposium, Aug. 2001.
    • (2001) 10th USENIX Security Symposium
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 22
    • 70350229705 scopus 로고    scopus 로고
    • Location privacy in wireless networks
    • June
    • T. Jiang, H. J. Wang, and Y.-C. Hu. Location privacy in wireless networks. In MobiSys, June 2007.
    • (2007) MobiSys
    • Jiang, T.1    Wang, H.J.2    Hu, Y.-C.3
  • 23
    • 85094322146 scopus 로고    scopus 로고
    • Information Slicing: Anonymity Using Unreliable Overlays
    • Apr
    • S. Katti, J. Cohen, and D. Katabi. Information Slicing: Anonymity Using Unreliable Overlays. In NSDI, Apr. 2007.
    • (2007) NSDI
    • Katti, S.1    Cohen, J.2    Katabi, D.3
  • 27
    • 34547339276 scopus 로고    scopus 로고
    • S. J. Murdoch. Hot or Not: Revealing Hidden Services by their Clock Skew. In CCS, October/November 2006.
    • S. J. Murdoch. Hot or Not: Revealing Hidden Services by their Clock Skew. In CCS, October/November 2006.
  • 28
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9(4):410-442, 2000.
    • (2000) ACM Trans. Softw. Eng. Methodol , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 29
    • 70349245820 scopus 로고    scopus 로고
    • RFC 4941: Privacy Extensions for Stateless Address Autoconfiguration in IPv6
    • Sept
    • T. Narten, R. Draves, and S. Krishnan. RFC 4941: Privacy Extensions for Stateless Address Autoconfiguration in IPv6, Sept. 2007. Status: Draft Standard.
    • (2007) Status: Draft Standard
    • Narten, T.1    Draves, R.2    Krishnan, S.3
  • 30
    • 70349230269 scopus 로고    scopus 로고
    • Nmap. http://www.insecure.org/nmap/.
    • Nmap
  • 33
    • 34250818849 scopus 로고    scopus 로고
    • Planetlab. https://www.planet-lab.org/.
    • Planetlab
  • 36
    • 34547367533 scopus 로고    scopus 로고
    • U. Shankar and C. Karlof. Doppelganger: Better browser privacy without the bother. In CCS, October/November 2006.
    • U. Shankar and C. Karlof. Doppelganger: Better browser privacy without the bother. In CCS, October/November 2006.
  • 37
    • 70349253450 scopus 로고    scopus 로고
    • P. Srisuresh and K. Egevang. RFC 3022: Traditional IP Network Address Translator (Traditional NAT), Jan. 2001. Status: Informational.
    • P. Srisuresh and K. Egevang. RFC 3022: Traditional IP Network Address Translator (Traditional NAT), Jan. 2001. Status: Informational.
  • 40
    • 70349253454 scopus 로고    scopus 로고
    • VMware. http://www.vmware.com.
    • VMware
  • 42
    • 84991934426 scopus 로고    scopus 로고
    • TightLip: Keeping Applications from Spilling the Beans
    • Apr
    • A. R. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping Applications from Spilling the Beans. In NSDI, Apr. 2007.
    • (2007) NSDI
    • Yumerefendi, A.R.1    Mickle, B.2    Cox, L.P.3
  • 43
    • 70349253457 scopus 로고    scopus 로고
    • Rogue nodes turn tor anonymizer into eavesdropper's paradise
    • Sept
    • K. Zetter. Rogue nodes turn tor anonymizer into eavesdropper's paradise. Wired, Sept. 2007.
    • (2007) Wired
    • Zetter, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.