-
1
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
I. S. Moskowitz, editor, pages Springer, Apr
-
A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Information Hiding, volume 2137 of Lecture Notes in Computer Science, pages 245–247. Springer, Apr. 2001.
-
(2001)
Information Hiding, volume 2137 of Lecture Notes in Computer Science
, pp. 245-247
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
2
-
-
85031236652
-
Operating systems support for planetary-scale network services
-
R. Morris and S. Savage, editors, pages USENIX, Mar
-
A. Bavier, M. Bowman, B. Chun, D. Culler, S. Karlin, S. Muir, L. Peterson, T. Roscoe, T. Spalink, and M. Wawrzoniak. Operating systems support for planetary-scale network services. In R. Morris and S. Savage, editors, Symposium on Networked Systems Design and Implementation, pages 253–266. USENIX, Mar. 2004.
-
(2004)
Symposium on Networked Systems Design and Implementation
, pp. 253-266
-
-
Bavier, A.1
Bowman, M.2
Chun, B.3
Culler, D.4
Karlin, S.5
Muir, S.6
Peterson, L.7
Roscoe, T.8
Spalink, T.9
Wawrzoniak, M.10
-
3
-
-
35048846490
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
E. Jonsson, A. Valdes, and M. Almgren, editors, pages Springer, Sept
-
A. Blum, D. X. Song, and S. Venkataraman. Detection of interactive stepping stones: Algorithms and confidence bounds. In E. Jonsson, A. Valdes, and M. Almgren, editors, International Symposium on Recent Advances in Intrusion Detection, volume 3224 of Lecture Notes in Computer Science, pages 258–277. Springer, Sept. 2004.
-
(2004)
International Symposium on Recent Advances in Intrusion Detection, volume 3224 of Lecture Notes in Computer Science
, pp. 258-277
-
-
Blum, A.1
Song, D. X.2
Venkataraman, S.3
-
4
-
-
24344460554
-
The traffic analysis of continuous-time mixes
-
D. Martin and A. Serjantov, editors, pages Springer, May
-
G. Danezis. The traffic analysis of continuous-time mixes. In D. Martin and A. Serjantov, editors, Workshop on Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, pages 35–50. Springer, May 2004.
-
(2004)
Workshop on Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science
, pp. 35-50
-
-
Danezis, G.1
-
5
-
-
85084161366
-
Tor: The second-generation onion router
-
M. Blaze, editor, pages Aug
-
R. Dingledine, N. Mathewson, and P. F. Syverson. Tor: The second-generation onion router. In M. Blaze, editor, USENIX Security Symposium, pages 303–320, Aug. 2004.
-
(2004)
USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P. F.3
-
6
-
-
84958977733
-
Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
A. Wespi, G. Vigna, and L. Deri, editors, pages Springer, Oct
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford. Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In A. Wespi, G. Vigna, and L. Deri, editors, International Symposium on Recent Advances in Intrusion Detection, volume 2516 of Lecture Notes in Computer Science, pages 17–35. Springer, Oct. 2002.
-
(2002)
International Symposium on Recent Advances in Intrusion Detection, volume 2516 of Lecture Notes in Computer Science
, pp. 17-35
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
7
-
-
85076290610
-
A practical congestion attack on Tor using long paths
-
F. Monrose, editor, pages USENIX, Aug
-
N. Evans, R. Dingledine, and C. Grothoff. A practical congestion attack on Tor using long paths. In F. Monrose, editor, USENIX Security Symposium, pages 33–50. USENIX, Aug. 2009.
-
(2009)
USENIX Security Symposium
, pp. 33-50
-
-
Evans, N.1
Dingledine, R.2
Grothoff, C.3
-
8
-
-
77952331178
-
Detecting covert timing channels: an entropy-based approach
-
P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, pages ACM, Oct
-
S. Gianvecchio and H. Wang. Detecting covert timing channels: an entropy-based approach. In P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, ACM Conference on Computer and Communications Security, pages 307–316. ACM, Oct. 2007.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 307-316
-
-
Gianvecchio, S.1
Wang, H.2
-
9
-
-
85177693003
-
RAINBOW: A robust and invisible non-blind watermark for network flows
-
G. Vigna, editor, Internet Society, Feb
-
A. Houmansadr, N. Kiyavash, and N. Borisov. RAINBOW: A robust and invisible non-blind watermark for network flows. In G. Vigna, editor, Network and Distributed System Security Symposium. Internet Society, Feb. 2009.
-
(2009)
Network and Distributed System Security Symposium
-
-
Houmansadr, A.1
Kiyavash, N.2
Borisov, N.3
-
10
-
-
80052167664
-
Multiflow attacks against network flow watermarking schemes
-
P. van Oorschot, editor, USENIX, July
-
N. Kiyavash, A. Houmansadr, and N. Borisov. Multiflow attacks against network flow watermarking schemes. In P. van Oorschot, editor, USENIX Security Symposium. USENIX, July 2008.
-
(2008)
USENIX Security Symposium
-
-
Kiyavash, N.1
Houmansadr, A.2
Borisov, N.3
-
11
-
-
27544454707
-
Low-cost traffic analysis of tor
-
Paxson and M. Waidner, editors, IEEE Computer Society, May
-
S. Murdoch and G. Danezis. Low-cost traffic analysis of tor. In V. Paxson and M. Waidner, editors, IEEE Symposium on Security and Privacy. IEEE Computer Society, May 2005.
-
(2005)
IEEE Symposium on Security and Privacy
-
-
Murdoch, S.1
Danezis, G.2
-
12
-
-
50249161218
-
Metrics for security and performance in low-latency anonymity systems
-
N. Borisov and I. Goldberg, editors, pages Springer, July
-
S. Murdoch and R. Watson. Metrics for security and performance in low-latency anonymity systems. In N. Borisov and I. Goldberg, editors, Privacy Enhancing Technologies Symposium, volume 5134 of Lecture Notes in Computer Science, pages 115–132. Springer, July 2008.
-
(2008)
Privacy Enhancing Technologies Symposium, volume 5134 of Lecture Notes in Computer Science
, pp. 115-132
-
-
Murdoch, S.1
Watson, R.2
-
13
-
-
33751040560
-
On the secrecy of timing-based active watermarking trace-back techniques
-
Paxson and B. Pfitzmann, editors, pages IEEE Computer Society Press, May
-
P. Peng, P. Ning, and D. S. Reeves. On the secrecy of timing-based active watermarking trace-back techniques. In V. Paxson and B. Pfitzmann, editors, IEEE Symposium on Security and Privacy, pages 334–349. IEEE Computer Society Press, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 334-349
-
-
Peng, P.1
Ning, P.2
Reeves, D. S.3
-
15
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
G. Kesidis, E. Modiano, and R. Srikant, editors, pages IEEE Communications Society, May
-
Y. Pyun, Y. Park, X. Wang, D. S. Reeves, and P. Ning. Tracing traffic through intermediate hosts that repacketize flows. In G. Kesidis, E. Modiano, and R. Srikant, editors, IEEE Conference on Computer Communications (INFOCOM), pages 634–642. IEEE Communications Society, May 2007.
-
(2007)
IEEE Conference on Computer Communications (INFOCOM)
, pp. 634-642
-
-
Pyun, Y.1
Park, Y.2
Wang, X.3
Reeves, D. S.4
Ning, P.5
-
16
-
-
84937555407
-
Traffic analysis: protocols, attacks, design issues, and open problems
-
H. Federrath, editor, pages Springer, July
-
J.-F. Raymond. Traffic analysis: protocols, attacks, design issues, and open problems. In H. Federrath, editor, International Workshop on Designing Privacy Enhancing Technologies, volume 2009 of Lecture Notes on Computer Science, pages 10–29. Springer, July 2000.
-
(2000)
International Workshop on Designing Privacy Enhancing Technologies, volume 2009 of Lecture Notes on Computer Science
, pp. 10-29
-
-
Raymond, J.-F.1
-
17
-
-
0029232080
-
Holding intruders accountable on the Internet
-
C. Meadows and J. McHugh, editors, pages IEEE Computer Society Press, May
-
S. Staniford-Chen and L. T. Heberlein. Holding intruders accountable on the Internet. In C. Meadows and J. McHugh, editors, IEEE Symposium on Security and Privacy, pages 39–49. IEEE Computer Society Press, May 1995.
-
(1995)
IEEE Symposium on Security and Privacy
, pp. 39-49
-
-
Staniford-Chen, S.1
Heberlein, L. T.2
-
19
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
X. Wang, S. Chen, and S. Jajodia. Network flow watermarking attack on low-latency anonymous communication systems. In Pfitzmann and McDaniel [14], pages 116–130.
-
Pfitzmann and McDaniel [14]
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
20
-
-
84957003012
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
-
D. Gollmann, G. Karjoth, and M. Waidner, editors, pages Springer, Oct
-
X. Wang, D. Reeves, and S. F. Wu. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In D. Gollmann, G. Karjoth, and M. Waidner, editors, European Symposium on Research in Computer Security, volume 2502 of Lecture Notes in Computer Science, pages 244–263. Springer, Oct. 2002.
-
(2002)
European Symposium on Research in Computer Security, volume 2502 of Lecture Notes in Computer Science
, pp. 244-263
-
-
Wang, X.1
Reeves, D.2
Wu, S. F.3
-
21
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
Atluri, editor, pages ACM
-
X. Wang and D. S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In V. Atluri, editor, ACM Conference on Computer and Communications Security, pages 20–29. ACM, 2003.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D. S.2
-
22
-
-
38149008828
-
Performance comparison of low-latency anonymisation services from a user perspective
-
N. Borisov and P. Golle, editors, pages Springer, June
-
R. Wendolsky, D. Herrmann, and H. Federrath. Performance comparison of low-latency anonymisation services from a user perspective. In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies Symposium, volume 4776 of Lecture Notes in Computer Science, pages 233–253. Springer, June 2007.
-
(2007)
Privacy Enhancing Technologies Symposium, volume 4776 of Lecture Notes in Computer Science
, pp. 233-253
-
-
Wendolsky, R.1
Herrmann, D.2
Federrath, H.3
-
23
-
-
84944043513
-
Finding a connection chain for tracing intruders
-
F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, pages Springer, Oct
-
K. Yoda and H. Etoh. Finding a connection chain for tracing intruders. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, European Symposium on Research in Computer Security, volume 1895 of Lecture Notes in Computer Science, pages 191–205. Springer, Oct. 2000.
-
(2000)
European Symposium on Research in Computer Security, volume 1895 of Lecture Notes in Computer Science
, pp. 191-205
-
-
Yoda, K.1
Etoh, H.2
-
24
-
-
34548755641
-
DSSSbased flow marking technique for invisible traceback
-
W. Yu, X. Fu, S. Graham, D.Xuan, and W. Zhao. DSSSbased flow marking technique for invisible traceback. In Pfitzmann and McDaniel [14], pages 18–32.
-
Pfitzmann and McDaniel
, vol.14
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
25
-
-
85084161090
-
Detecting stepping stones
-
S. Bellovin and G. Rose, editors, pages USENIX, Aug
-
Y. Zhang and V. Paxson. Detecting stepping stones. In S. Bellovin and G. Rose, editors, USENIX Security Symposium, pages 171–184. USENIX, Aug. 2000.
-
(2000)
USENIX Security Symposium
, pp. 171-184
-
-
Zhang, Y.1
Paxson, V.2
|