Abstract-Anonymizer is a proprietary anonymous commu nication system. We discovered its architecture and found that the size of web packets through Anonymizer are very dynamic at the client. Motivated by this finding, we investigated a novel packet size based covert channel attack, against the anonymity service. In the attack, one attacker manipulates the web packet size between the web server and Anonymizer and embed signal symbols into the target traffic. An accomplice at the user side can sniff the traffic and recognize the secret signal. We developed intelligent and robust algorithms to cope with the packet size distortion incurred by Anonymizer and Internet. We developed several techniques to make the attack harder to detect: (i) We pi...
Anonymous systems are usually used to protect users\u27 privacy in network communication. However, e...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Abstract—In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial a...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
In this paper we present a slotted packet counting attack against anonymity protocols. Common packet...
The research is financed by Asian Development Bank. No. 2006-A171(Sponsoring information) Covert cha...
Before sharing or publishing network traffic data, anonymisation is regarded as a necessary step to ...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity ...
Various systems offering anonymity for near real-time Internet traffic have been operational. Howeve...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Anonymous systems are usually used to protect users\u27 privacy in network communication. However, e...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Abstract—In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial a...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
In this paper we present a slotted packet counting attack against anonymity protocols. Common packet...
The research is financed by Asian Development Bank. No. 2006-A171(Sponsoring information) Covert cha...
Before sharing or publishing network traffic data, anonymisation is regarded as a necessary step to ...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity ...
Various systems offering anonymity for near real-time Internet traffic have been operational. Howeve...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Anonymous systems are usually used to protect users\u27 privacy in network communication. However, e...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...