메뉴 건너뛰기




Volumn 30, Issue 5, 2013, Pages 76-85

Preventing timing analysis in networks: A statistical inference perspective

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; SCHEDULING; SECURITY OF DATA; TIMING CIRCUITS;

EID: 85032751278     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2013.2261131     Document Type: Article
Times cited : (5)

References (29)
  • 1
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • Designing Privacy Enhancing Technologies
    • J.-F. Raymond, "Traffic analysis: Protocols, attacks, design issues and open problems," in Designing Privacy Enhancing Technologies: Proc. Int. Workshop Design Issues Anonymity and Unobservability, 2001, pp. 10-29. (Pubitemid 33241785)
    • (2001) Lecture notes in computer science , Issue.2009 , pp. 10-29
    • Raymond, J.-F.1
  • 7
    • 0030107358 scopus 로고    scopus 로고
    • Network security under siege: The timing attack
    • Mar.
    • E. English and S. Hamilton, "Network security under siege: The timing attack," Computer, vol. 29, pp. 95-97, Mar. 1996.
    • (1996) Computer , vol.29 , pp. 95-97
    • English, E.1    Hamilton, S.2
  • 8
    • 2442604821 scopus 로고    scopus 로고
    • Randomness and the Netscape browser
    • I. Goldberg and D. Wagner, "Randomness and the Netscape browser," Dr. Dobb's, vol. 21, no. 1, pp. 66-71, 1996.
    • (1996) Dr. Dobb's , vol.21 , Issue.1 , pp. 66-71
    • Goldberg, I.1    Wagner, D.2
  • 11
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Commun. ACM, vol. 24, pp. 84-88, Feb. 1981. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 15
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • New York: Springer-Verlag
    • A. Back, U. Möller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems," in Information Hiding (Lecture Notes in Computer Science, vol. 2137). New York: Springer-Verlag, 2001, pp. 245-247.
    • (2001) Information Hiding (Lecture Notes in Computer Science, 2137 , pp. 245-247
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 18
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • DOI 10.1109/TIT.2002.801405, PII 1011092002801405
    • J. Giles and B. Hajek, "An information-theoretic and game-theoretic study of timing channels," IEEE Trans. Inform. Theory, vol. 48, pp. 2455-2477, Sept. 2002. (Pubitemid 35032673)
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 19
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Crypto, New York: Plenum
    • D. Chaum, "Blind signatures for untraceable payments," in Advances in Cryp-tology: Proc. Crypto, New York: Plenum, 1983, vol. 82, pp. 199-203.
    • (1983) Advances in Cryp-tology: Proc , vol.82 , pp. 199-203
    • Chaum, D.1
  • 20
    • 33747336635 scopus 로고
    • The channel capacity of a certain noisy timing channel
    • July
    • I. S. Moskowitz and A. R. Miller, "The channel capacity of a certain noisy timing channel," IEEE Trans. Inform. Theory, vol. 38, pp. 1339-1344, July 1992.
    • (1992) IEEE Trans. Inform. Theory , vol.38 , pp. 1339-1344
    • Moskowitz, I.S.1    Miller, A.R.2
  • 22
    • 80051753305 scopus 로고    scopus 로고
    • BIT-TRAPS: Building information-theoretic traffic privacy into packet streams
    • S. Mathur and W. Trappe, "BIT-TRAPS: Building information-theoretic traffic privacy into packet streams," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 3, pp. 752-762, 2011.
    • (2011) IEEE Trans. Inform. Forensics Sec. , vol.6 , Issue.3 , pp. 752-762
    • Mathur, S.1    Trappe, W.2
  • 28
    • 85032777244 scopus 로고    scopus 로고
    • Admissible length study in anonymous networking: A detection theoretic perspective
    • to be published
    • A. Mishra and P. Venkitasubramaniam, "Admissible length study in anonymous networking: A detection theoretic perspective," IEEE J. Select. Areas Commun., to be published.
    • IEEE J. Select. Areas Commun
    • Mishra, A.1    Venkitasubramaniam, P.2
  • 29
    • 85032778133 scopus 로고    scopus 로고
    • Mitigating timing based information leakage in shared schedulers
    • submitted for publication. Available
    • S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam. Mitigating timing based information leakage in shared schedulers. IEEE Trans. Networking [Online]. submitted for publication. Available: http://www.ifp.illinois. edu/~kadloor1/kadloor2013ton.pdf [SP]
    • IEEE Trans. Networking [Online]
    • Kadloor, S.1    Kiyavash, N.2    Venkitasubramaniam, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.