메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Pisces: Anonymous Communication Using Social Networks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; NETWORK TOPOLOGY; RANDOM PROCESSES;

EID: 85026514688     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (30)

References (69)
  • 1
    • 85180406236 scopus 로고    scopus 로고
    • Tor blog. https://blog.torproject.org/blog/tor-project-infrastructure-updates.
  • 5
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to us: automated identity theft attacks on social networks
    • L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In WWW, 2009.
    • (2009) WWW
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4
  • 7
    • 84855692796 scopus 로고    scopus 로고
    • The socialbot network: when bots socialize for fame and money
    • Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In ACSAC, 2011.
    • (2011) ACSAC
    • Boshmaf, Y.1    Muslukhov, I.2    Beznosov, K.3    Ripeanu, M.4
  • 9
    • 33645586953 scopus 로고    scopus 로고
    • The anonymizer: Protecting user privacy on the web
    • J. Boyan. The anonymizer: Protecting user privacy on the web. Computer-Mediated Communication Magazine, 4(9), 1997.
    • (1997) Computer-Mediated Communication Magazine , vol.4 , Issue.9
    • Boyan, J.1
  • 10
    • 84887074866 scopus 로고    scopus 로고
    • Drac: an architecture for anonymous low-volume communications
    • G. Danezis, C. Diaz, C. Troncoso, and B. Laurie. Drac: an architecture for anonymous low-volume communications. In PETS, 2010.
    • (2010) PETS
    • Danezis, G.1    Diaz, C.2    Troncoso, C.3    Laurie, B.4
  • 12
    • 85180633166 scopus 로고    scopus 로고
    • Sybilinfer: Detecting Sybil nodes using social networks
    • G. Danezis and P. Mittal. Sybilinfer: Detecting Sybil nodes using social networks. In NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 15
    • 4544304744 scopus 로고    scopus 로고
    • The Sybil Attack
    • J. Douceur. The Sybil Attack. In IPTPS, 2002.
    • (2002) IPTPS
    • Douceur, J.1
  • 17
    • 0038349207 scopus 로고    scopus 로고
    • Tarzan: A peer-to-peer anonymizing network layer
    • M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. ACM CCS, 2002.
    • (2002) ACM CCS
    • Freedman, M. J.1    Morris, R.2
  • 18
    • 84892455410 scopus 로고    scopus 로고
    • Predicting tie strength with social media
    • E. Gilbert and K. Karahalios. Predicting tie strength with social media. In CHI, 2009.
    • (2009) CHI
    • Gilbert, E.1    Karahalios, K.2
  • 19
    • 70349298073 scopus 로고    scopus 로고
    • Tor at heart of embassy passwords leak
    • September 10
    • D. Goodin. Tor at heart of embassy passwords leak. The Register, September 10 2007.
    • (2007) The Register
    • Goodin, D.1
  • 20
    • 77956890234 scopus 로고
    • Monte carlo sampling methods using markov chains and their applications
    • W. K. Hastings. Monte carlo sampling methods using markov chains and their applications. Biometrika, 57(1), 1970.
    • (1970) Biometrika , vol.57 , Issue.1
    • Hastings, W. K.1
  • 21
    • 85180402448 scopus 로고    scopus 로고
    • Clockscalpel: Understanding root causes of Internet clock synchronization inaccuracy
    • C.-Y. Hong, C.-C. Lin, and M. Caesar. Clockscalpel: Understanding root causes of Internet clock synchronization inaccuracy. In PAM, 2011.
    • (2011) PAM
    • Hong, C.-Y.1    Lin, C.-C.2    Caesar, M.3
  • 22
    • 85177693003 scopus 로고    scopus 로고
    • Rainbow: A robust and invisible non-blind watermark for network flows
    • A. Houmansadr, N. Kiyavash, and N. Borisov. Rainbow: A robust and invisible non-blind watermark for network flows. In NDSS, 2009.
    • (2009) NDSS
    • Houmansadr, A.1    Kiyavash, N.2    Borisov, N.3
  • 23
    • 80755145229 scopus 로고    scopus 로고
    • I2P
    • I2P. I2P anonymous network. http://www.i2p2.de/index.html, 2003.
    • (2003) I2P anonymous network
  • 24
    • 84896777836 scopus 로고    scopus 로고
    • Reverse social engineering attacks in online social networks
    • D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. In DIMVA, 2011.
    • (2011) DIMVA
    • Irani, D.1    Balduzzi, M.2    Balzarotti, D.3    Kirda, E.4    Pu, C.5
  • 25
    • 85168422949 scopus 로고    scopus 로고
    • More anonymous onion routing through trust
    • A. Johnson and P. Syverson. More anonymous onion routing through trust. In IEEE CSF, 2009.
    • (2009) IEEE CSF
    • Johnson, A.1    Syverson, P.2
  • 26
    • 80755168359 scopus 로고    scopus 로고
    • Trust-based anonymous communication: adversary models and routing algorithms
    • A. Johnson, P. F. Syverson, R. Dingledine, and N. Mathewson. Trust-based anonymous communication: adversary models and routing algorithms. In ACM CCS, 2011.
    • (2011) ACM CCS
    • Johnson, A.1    Syverson, P. F.2    Dingledine, R.3    Mathewson, N.4
  • 27
    • 4243128193 scopus 로고    scopus 로고
    • On clusterings: Good, bad and spectral
    • R. Kannan, S. Vempala, and A. Vetta. On clusterings: Good, bad and spectral. J. ACM, 51(3), 2004.
    • (2004) J. ACM , vol.51 , Issue.3
    • Kannan, R.1    Vempala, S.2    Vetta, A.3
  • 29
    • 84863903676 scopus 로고    scopus 로고
    • Whanaungatanga: A Sybil-proof distributed hash table
    • C. Lesniewski-Laas and M. F. Kaashoek. Whanaungatanga: A Sybil-proof distributed hash table. In NSDI, 2010.
    • (2010) NSDI
    • Lesniewski-Laas, C.1    Kaashoek, M. F.2
  • 30
    • 85084162792 scopus 로고    scopus 로고
    • Attack-resistant trust metrics for public key certification
    • R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In USENIX Security, 1998.
    • (1998) USENIX Security
    • Levien, R.1    Aiken, A.2
  • 31
  • 32
    • 85180404584 scopus 로고
    • Guessing and entropy
    • J. L. Massey. Guessing and entropy. In IEEE ISIT, 1994.
    • (1994) IEEE ISIT
    • Massey, J. L.1
  • 37
    • 70349273917 scopus 로고    scopus 로고
    • Infomation leaks in structured peer-to-peer anonymous communication systems
    • P. Mittal and N. Borisov. Infomation leaks in structured peer-to-peer anonymous communication systems. ACM CCS, 2008.
    • (2008) ACM CCS
    • Mittal, P.1    Borisov, N.2
  • 38
    • 74049096681 scopus 로고    scopus 로고
    • Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies
    • P. Mittal and N. Borisov. Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies. ACM CCS, 2009.
    • (2009) ACM CCS
    • Mittal, P.1    Borisov, N.2
  • 40
    • 84869484713 scopus 로고    scopus 로고
    • X-vine: Secure and pseudonymous routing using social networks
    • P. Mittal, M. Caesar, and N. Borisov. X-vine: Secure and pseudonymous routing using social networks. In NDSS, 2012.
    • (2012) NDSS
    • Mittal, P.1    Caesar, M.2    Borisov, N.3
  • 42
    • 85180405994 scopus 로고    scopus 로고
    • Preserving link privacy in social network based systems
    • P. Mittal, C. Papamanthou, and D. Song. Preserving link privacy in social network based systems. In NDSS, 2013.
    • (2013) NDSS
    • Mittal, P.1    Papamanthou, C.2    Song, D.3
  • 43
    • 78650907130 scopus 로고    scopus 로고
    • Measuring the mixing time of social graphs
    • A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In IMC, 2010.
    • (2010) IMC
    • Mohaisen, A.1    Yun, A.2    Kim, Y.3
  • 44
    • 84877951088 scopus 로고    scopus 로고
    • Anonymity in the wild: mixes on unstructured networks
    • S. Nagaraja. Anonymity in the wild: mixes on unstructured networks. In PETS, 2007.
    • (2007) PETS
    • Nagaraja, S.1
  • 45
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • A. Nambiar and M. Wright. Salsa: A structured approach to large-scale anonymity. ACM CCS, 2006.
    • (2006) ACM CCS
    • Nambiar, A.1    Wright, M.2
  • 46
    • 74049122426 scopus 로고    scopus 로고
    • NISAN: Network information service for anonymization networks
    • A. Panchenko, S. Richter, and A. Rache. NISAN: Network information service for anonymization networks. ACM CCS, 2009.
    • (2009) ACM CCS
    • Panchenko, A.1    Richter, S.2    Rache, A.3
  • 48
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • June
    • M. Reiter and A. Rubin. Crowds: Anonymity for web transactions. ACM TISSEC, 1(1), June 1998.
    • (1998) ACM TISSEC , vol.1 , Issue.1
    • Reiter, M.1    Rubin, A.2
  • 49
    • 20444437836 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
    • M. Rennhard and B. Plattner. Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection. WPES, 2002.
    • (2002) WPES
    • Rennhard, M.1    Plattner, B.2
  • 50
    • 0003007594 scopus 로고    scopus 로고
    • Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems
    • A. Rowstron and P. Druschel. Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In MIDDLEWARE, 2001.
    • (2001) MIDDLEWARE
    • Rowstron, A.1    Druschel, P.2
  • 52
    • 2642543760 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In PETS, 2002.
    • (2002) PETS
    • Serjantov, A.1    Danezis, G.2
  • 53
    • 84945266114 scopus 로고    scopus 로고
    • Measuring relationship anonymity in mix networks
    • V. Shmatikov and M.-H. Wang. Measuring relationship anonymity in mix networks. In ACM WPES, 2006.
    • (2006) ACM WPES
    • Shmatikov, V.1    Wang, M.-H.2
  • 57
    • 85056528164 scopus 로고    scopus 로고
    • Breaking the collusion detection mechanism of MorphMix
    • P. Tabriz and N. Borisov. Breaking the collusion detection mechanism of MorphMix. In PETS, 2006.
    • (2006) PETS
    • Tabriz, P.1    Borisov, N.2
  • 58
    • 84870633783 scopus 로고    scopus 로고
    • The Tor Project. Tor metrics portal. http://metrics.torproject.org/.
    • Tor metrics portal
  • 59
  • 60
    • 84994593259 scopus 로고    scopus 로고
    • The Tor Project
    • The Tor Project. Who uses Tor. http://www.torproject.org/about/torusers.html. en.
    • Who uses Tor
  • 64
    • 85091916526 scopus 로고    scopus 로고
    • In search of an anonymous and secure lookup
    • Q. Wang, P. Mittal, and N. Borisov. In search of an anonymous and secure lookup. In ACM CCS, 2010.
    • (2010) ACM CCS
    • Wang, Q.1    Mittal, P.2    Borisov, N.3
  • 65
    • 33745773302 scopus 로고    scopus 로고
    • Tracking anonymous peer-to-peer VoIP calls on the Internet
    • X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer VoIP calls on the Internet. In ACM CCS, 2005.
    • (2005) ACM CCS
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 67
    • 70449694823 scopus 로고    scopus 로고
    • Sybillimit: A near-optimal social network defense against Sybil attacks
    • H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against Sybil attacks. In IEEE S&P, 2008.
    • (2008) IEEE S&P
    • Yu, H.1    Gibbons, P. B.2    Kaminsky, M.3    Xiao, F.4
  • 68
    • 35548992569 scopus 로고    scopus 로고
    • SybilGuard: Defending against Sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman. SybilGuard: Defending against Sybil attacks via social networks. In SIGCOMM, 2006.
    • (2006) SIGCOMM
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.3    Flaxman, A.4
  • 69
    • 84893628934 scopus 로고    scopus 로고
    • DSSS-based flow marking technique for invisible traceback
    • W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao. DSSS-based flow marking technique for invisible traceback. In IEEE S&P, 2007.
    • (2007) IEEE S&P
    • Yu, W.1    Fu, X.2    Graham, S.3    Xuan, D.4    Zhao, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.