-
1
-
-
19544369316
-
An empirical evaluation of wide-area Internet bottlenecks
-
Crovella, M. (ed.), ACM, New York
-
Akella, A., Seshan, S., Shaikh, A.: An empirical evaluation of wide-area Internet bottlenecks. In: Crovella, M. (ed.) 3rd ACM SIGCOMM Conference on Internet Measurement, pp. 101-114. ACM, New York (2003), http://dl.acm.org/ citation.cfm?id=948205.948219
-
(2003)
3rd ACM SIGCOMM Conference on Internet Measurement
, pp. 101-114
-
-
Akella, A.1
Seshan, S.2
Shaikh, A.3
-
2
-
-
33746053876
-
Privacy vulnerabilities in encrypted http streams
-
Danezis, G., Martin, D. (eds.), LNCS, Springer, Heidelberg
-
Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy Vulnerabilities in Encrypted HTTP Streams. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 1-11. Springer, Heidelberg (2006)
-
(2006)
PET 2005
, vol.3856
, pp. 1-11
-
-
Bissias, G.D.1
Liberatore, M.2
Jensen, D.3
Levine, B.N.4
-
3
-
-
60349122307
-
Identifying proxy nodes in a Tor anonymization circuit
-
Dipanda, A., Chbeir, R., Yetongnon, K. (eds.), IEEE Computer Society, Los Alamitos
-
Chakravarty, S., Stavrou, A., Keromytis, A.D.: Identifying proxy nodes in a Tor anonymization circuit. In: Dipanda, A., Chbeir, R., Yetongnon, K. (eds.) IEEE International Conference on Signal Image Technology and Internet Based Systems, pp. 633-639. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
IEEE International Conference on Signal Image Technology and Internet Based Systems
, pp. 633-639
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.D.3
-
4
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
Evans, D., Vigna, G. (eds.), IEEE Computer Society, May
-
Chen, S., Wang, R., Wang, X., Zhang, K.: Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. In: Evans, D., Vigna, G. (eds.) IEEE Symposium on Security and Privacy, pp. 191-206. IEEE Computer Society (May 2010), http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm? arnumber=5504714
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
6
-
-
84937846451
-
On web browsing privacy in anonymized netflows
-
Provos, N. (ed.)
-
Coull, S.E., Collins,M.P.,Wright, C.V.,Monrose, F., Reiter,M.K.: On web browsing privacy in anonymized netflows. In: Provos, N. (ed.) 16th USENIX Security Symposium. USENIX Association, Berkeley (2007), http://www.usenix.org/ events/sec07/tech/coull.html
-
(2007)
16th USENIX Security Symposium. USENIX Association, Berkeley
-
-
Coull, S.E.1
Collins, M.P.2
Wright, C.V.3
Monrose, F.4
Reiter, M.K.5
-
7
-
-
35048895319
-
Statistical disclosure or intersection attacks on anonymity systems
-
Fridrich, J. (ed.), LNCS, Springer, Heidelberg
-
Danezis, G., Serjantov, A.: Statistical Disclosure or Intersection Attacks on Anonymity Systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 293-308. Springer, Heidelberg (2004), http://www.springerlink.com/index/ TQLJB3HYBK4RUBLA.pdf
-
(2004)
IH 2004
, vol.3200
, pp. 293-308
-
-
Danezis, G.1
Serjantov, A.2
-
8
-
-
85084161366
-
Tor: The second-generation onion router
-
Blaze, M. (ed.), USENIX Association, San Diego
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Blaze, M. (ed.) USENIX Security Symposium, pp. 303-320. USENIX Association, San Diego (2004), http://portal.acm.org/citation.cfm?id=1251396
-
(2004)
USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
9
-
-
85076290610
-
A practical congestion attack on Tor using long paths
-
Monrose, F. (ed.), USENIX Association, August
-
Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on Tor using long paths. In: Monrose, F. (ed.) 18th USENIX Security Symposium, pp. 33-50. USENIX Association (August 2009), http://www.usenix.org/events/sec09/ tech/full-papers/evans.pdf
-
(2009)
18th USENIX Security Symposium
, pp. 33-50
-
-
Evans, N.S.1
Dingledine, R.2
Grothoff, C.3
-
10
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of Internet miscreants
-
De Capitani di Vemarcati, S., Syverson, P. (eds.), ACM, New York
-
Franklin, J., Paxson, V., Perrig, A., Savage, S.: An inquiry into the nature and causes of the wealth of Internet miscreants. In: De Capitani di Vemarcati, S., Syverson, P. (eds.) 14th ACM Conference on Computer and Communications Security, pp. 375-388. ACM, New York (2007), http://dl.acm.org/ citation.cfm?id=1315245.1315292
-
(2007)
14th ACM Conference on Computer and Communications Security
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
11
-
-
74049147408
-
Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naïve-Bayes classifier
-
ACM, Chicago
-
Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-Bayes classifier. In: ACM Workshop on Cloud Computing Security, pp. 31-42. ACM, Chicago (2009), http://portal.acm.org/citation.cfm?id=1655013
-
(2009)
ACM Workshop on Cloud Computing Security
, pp. 31-42
-
-
Herrmann, D.1
Wendolsky, R.2
Federrath, H.3
-
12
-
-
84957796461
-
Fingerprinting websites using traffic analysis
-
Dingledine, R., Syverson, P.F. (eds.), LNCS, Springer, Heidelberg
-
Hintz, A.: Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 171-178. Springer, Heidelberg (2003), http://www.springerlink.com/index/C4QWE6D608P2CJYV. pdf
-
(2003)
PET 2002
, vol.2482
, pp. 171-178
-
-
Hintz, A.1
-
13
-
-
70349692738
-
How much anonymity does network latency leak?
-
De Capitani di Vimercati, S., Syverson, P. (eds.), ACM, New York
-
Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? In: De Capitani di Vimercati, S., Syverson, P. (eds.) 14th ACM Conference on Computer and Communications Security, pp. 82-91. ACM, New York (2007), http://dl.acm.org/citation.cfm?id=1315245.1315257
-
(2007)
14th ACM Conference on Computer and Communications Security
, pp. 82-91
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
14
-
-
77949464624
-
How much anonymity does network latency leak?
-
Hopper, N., Vasserman, E., Chan-Tin, E.: How much anonymity does network latency leak? ACM Transactions on Information and System Security 13(2) (2010), http://portal.acm.org/citation.cfm?id=1698753
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.2
-
-
Hopper, N.1
Vasserman, E.2
Chan-Tin, E.3
-
15
-
-
77955359942
-
Low-cost side channel remote traffic analysis attack in packet networks
-
Xiao, C., Olivier, J.C. (eds.), IEEE, May
-
Kadloor, S., Gong, X., Kiyavash, N., Tezcan, T., Borisov, N.: Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks. In: Xiao, C., Olivier, J.C. (eds.) 2010 IEEE International Conference on Communications. IEEE (May 2010), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5501972
-
(2010)
2010 IEEE International Conference on Communications
-
-
Kadloor, S.1
Gong, X.2
Kiyavash, N.3
Tezcan, T.4
Borisov, N.5
-
16
-
-
15944427186
-
Some findings on the network performance of broadband hosts
-
Crovella, M. (ed.), ACM Press, New York
-
Lakshminarayanan, K., Padmanabhan, V.N.: Some findings on the network performance of broadband hosts. In: Crovella, M. (ed.) Proceedings of the 2003 ACM SIGCOMM Conference on Internet Measurement, IMC 2003, pp. 101-114. ACM Press, New York (2003), http://portal.acm.org/citation.cfm?doid=948205.948212
-
(2003)
Proceedings of the 2003 ACM SIGCOMM Conference on Internet Measurement, IMC 2003
, pp. 101-114
-
-
Lakshminarayanan, K.1
Padmanabhan, V.N.2
-
17
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
Wright, R., De Capitani di Vemarcati, S. (eds.), ACM, New York
-
Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: Wright, R., De Capitani di Vemarcati, S. (eds.) 13th ACM Conference on Computer and Communications Security, pp. 255-263. ACM, New York (2006), http://portal.acm.org/citation.cfm?id=1180437
-
(2006)
13th ACM Conference on Computer and Communications Security
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
19
-
-
27544454707
-
Low-cost traffic analysis of Tor
-
Paxson, V., Waidner, M. (eds.), IEEE Computer Society, Berkeley
-
Murdoch, S., Danezis, G.: Low-Cost Traffic Analysis of Tor. In: Paxson, V., Waidner, M. (eds.) 2005 IEEE Symposium on Security and Privacy, pp. 183-195. IEEE Computer Society, Berkeley (2005), http://ieeexplore.ieee.org/lpdocs/ epic03/wrapper.htm?arnumber=1425067
-
(2005)
2005 IEEE Symposium on Security and Privacy
, pp. 183-195
-
-
Murdoch, S.1
Danezis, G.2
-
20
-
-
0344152271
-
Bandwidth estimation: Metrics, measurement techniques, and tools
-
Prasad, R., Davrolis, C., Murray, M., Claffy, K.: Bandwidth estimation: metrics, measurement techniques, and tools. IEEE Network 17(6), 27-35 (2003), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1248658
-
(2003)
IEEE Network
, vol.17
, Issue.6
, pp. 27-35
-
-
Prasad, R.1
Davrolis, C.2
Murray, M.3
Claffy, K.4
-
21
-
-
0038041177
-
Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection
-
Samarati, P. (ed.), ACM Press, New York
-
Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. In: Samarati, P. (ed.) ACMWorkshop on Privacy in Electronic Society, pp. 91-102. ACM Press, New York (2002), http://portal.acm.org/citation.cfm?id=644537
-
(2002)
ACMWorkshop on Privacy in Electronic Society
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
22
-
-
8344283627
-
Pathchirp: Efficient available bandwidth estimation for network paths
-
Citeseer, March
-
Ribeiro, V., Riedi, R., Baraniuk, R., Navratil, J., Cottrell, L.: pathchirp: Efficient available bandwidth estimation for network paths. In: Passive and Active Measurement Workshop, vol. 4. Citeseer (March 2003)
-
(2003)
Passive and Active Measurement Workshop
, vol.4
-
-
Ribeiro, V.1
Riedi, R.2
Baraniuk, R.3
Navratil, J.4
Cottrell, L.5
-
23
-
-
0030832833
-
Dummynet: A simple approach to the evaluation of network protocols
-
Rizzo, L.: Dummynet: a simple approach to the evaluation of network protocols. ACM SIGCOMM Computer Communication Review 27(1), 31-41 (1997), http://portal.acm.org/citation.cfm?doid=251007.251012
-
(1997)
ACM SIGCOMM Computer Communication Review
, vol.27
, Issue.1
, pp. 31-41
-
-
Rizzo, L.1
-
24
-
-
0017930815
-
Dynamic programming algorithm optimization for spoken word recognition
-
Sakoe, H., Chiba, S.: Dynamic programming algorithm optimization for spoken word recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing 26(1), 43-49 (1978), http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber=1163055
-
(1978)
IEEE Transactions on Acoustics, Speech, and Signal Processing
, vol.26
, Issue.1
, pp. 43-49
-
-
Sakoe, H.1
Chiba, S.2
-
25
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
Provos, N. (ed.), USENIX Association
-
Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: Privacy trends in consumer ubiquitous computing. In: Provos, N. (ed.) 16th USENIX Security Symposium, pp. 55-70. USENIX Association (2007), http://portal.acm.org/citation.cfm?id=1362908
-
(2007)
16th USENIX Security Symposium
, pp. 55-70
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
26
-
-
0030171894
-
Efficient fair queuing using deficit round-robin
-
Shreedhar, M., Varghese, G.: Efficient fair queuing using deficit round-robin. IEEE/ACM Transactions on Networking 4(3), 375-385 (1996), http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=502236
-
(1996)
IEEE/ACM Transactions on Networking
, vol.4
, Issue.3
, pp. 375-385
-
-
Shreedhar, M.1
Varghese, G.2
-
27
-
-
85084161110
-
Timing analysis of keystrokes and SSH timing attacks
-
Wallach, D.S. (ed.), USENIX Association, August
-
Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and SSH timing attacks. In: Wallach, D.S. (ed.) 10th USENIX Security Symposium. USENIX Association (August 2001), http://www.usenix.org/events/sec01/song.html
-
(2001)
10th USENIX Security Symposium
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
28
-
-
19544387793
-
A measurement study of available bandwidth estimation tools
-
Crovella, M. (ed.), ACM, New York
-
Strauss, J., Katabi, D., Kaashoek, F.: A measurement study of available bandwidth estimation tools. In: Crovella, M. (ed.) 3rd ACM SIGCOMM Conference on Internet Measurement, pp. 39-44. ACM, New York (2003), http://portal.acm.org/ citation.cfm?id=948211
-
(2003)
3rd ACM SIGCOMM Conference on Internet Measurement
, pp. 39-44
-
-
Strauss, J.1
Katabi, D.2
Kaashoek, F.3
-
29
-
-
0036086129
-
Statistical identification of encrypted Web browsing traffic
-
Abadi, M., Bellovin, S.M. (eds.), IEEE Computer Society, May
-
Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted Web browsing traffic. In: Abadi, M., Bellovin, S.M. (eds.) IEEE Symposium on Security and Privacy, pp. 19-30. IEEE Computer Society (May 2002), http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=1004359
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 19-30
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
30
-
-
84946432389
-
Analysis of the SSL 3.0 protocol
-
Tygar, D. (ed.), USENIX Association, November
-
Wagner, D., Schneier, B.: Analysis of the SSL 3.0 Protocol. In: Tygar, D. (ed.) USENIX Workshop on Electronic Commerce. USENIX Association (November 1996), http://www.usenix.org/publications/library/proceedings/ec96/wagner.html
-
(1996)
USENIX Workshop on Electronic Commerce
-
-
Wagner, D.1
Schneier, B.2
-
31
-
-
80051967189
-
Phonotactic reconstruction of encrypted VoIP conversations: Hookt on Foniks
-
Vigna, G., Jha, S. (eds.)
-
White, A.M., Matthews, A.R., Snow, K.Z., Monrose, F.: Phonotactic reconstruction of encrypted VoIP conversations: Hookt on Foniks. In: Vigna, G., Jha, S. (eds.) IEEE Symposium on Security and Privacy, pp. 3-18. IEEE Computer Society (May 2011), http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber= 5958018
-
(2011)
IEEE Symposium on Security and Privacy, IEEE Computer Society, May
, pp. 3-18
-
-
White, A.M.1
Matthews, A.R.2
Snow, K.Z.3
Monrose, F.4
-
32
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
-
IEEE Computer Society, Washington, DC
-
Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In: IEEE Symposium on Security and Privacy, pp. 35-49. IEEE Computer Society, Washington, DC (2008), http://ieeexplore.ieee.org/xpl/articleDetails.jsp? arnumber=4531143
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
33
-
-
78651398360
-
Uncovering spoken phrases in encrypted voice over IP conversations
-
Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Uncovering Spoken Phrases in Encrypted Voice over IP Conversations. ACM Transactions on Information and System Security 13(4), 1-30 (2010), http://doi.acm.org/10.1145/1880022.1880029
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.4
, pp. 1-30
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
34
-
-
79959957319
-
Peeping Tom in the neighborhood: Keystroke eavesdropping on multi-user systems
-
Monrose, F. (ed.), USENIX Association, August
-
Zhang, K., Wang, X.: Peeping Tom in the neighborhood: Keystroke eavesdropping on multi-user systems. In: Monrose, F. (ed.) 18th USENIX Security Symposium USENIX Security. USENIX Association (August 2009), http://www.usenix.org/events/sec09/tech/full-papers/zhang.pdf
-
(2009)
18th USENIX Security Symposium USENIX Security
-
-
Zhang, K.1
Wang, X.2
-
35
-
-
33746081314
-
Unmixing mix traffic
-
Danezis, G., Martin, D. (eds.), LNCS, Springer, Heidelberg
-
Zhu, Y., Bettati, R.: Unmixing Mix Traffic. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 110-127. Springer, Heidelberg (2006)
-
(2006)
PET 2005
, vol.3856
, pp. 110-127
-
-
Zhu, Y.1
Bettati, R.2
|