Abstract—In this paper, we present a study on the anonymity of Anonymizer, a well-known commercial anonymous communication system. We discovered the architecture of Anonymizer and found that the size of web packets in the Anonymizer network can be very dynamic at the client. Motivated by this finding, we investigated a class of novel packet size-based covert channel attacks against Anonymizer. The attacker between a website and the Anonymizer server can manipulate the web packet size and embed secret signal symbols into the target traffic. An accomplice at the user side can sniff the traffic and recognize the secret signal. In this way, the anonymity provided by Anonymizer is compromised. We developed intelligent and robust algorithms to co...
A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity ...
Various systems offering anonymity for near real-time Internet traffic have been operational. Howeve...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Abstract-Anonymizer is a proprietary anonymous commu nication system. We discovered its architecture...
In this paper we present a slotted packet counting attack against anonymity protocols. Common packet...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
Before sharing or publishing network traffic data, anonymisation is regarded as a necessary step to ...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Anonymous systems are usually used to protect users\u27 privacy in network communication. However, e...
A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity ...
Various systems offering anonymity for near real-time Internet traffic have been operational. Howeve...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Abstract-Anonymizer is a proprietary anonymous commu nication system. We discovered its architecture...
In this paper we present a slotted packet counting attack against anonymity protocols. Common packet...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
Before sharing or publishing network traffic data, anonymisation is regarded as a necessary step to ...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Privacy on the Internet is becoming a concern as an already significant and ever growing part of our...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
There have been a number of protocols proposed for anonymous network communication. In this paper we...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Covert channels leaks information where information travels unnoticed i.e. the communication itself ...
Anonymous systems are usually used to protect users\u27 privacy in network communication. However, e...
A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity ...
Various systems offering anonymity for near real-time Internet traffic have been operational. Howeve...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...