The increase of encrypted traffic on the Internet may become a problem for network-security applications such as intrusion-detection systems or interfere with forensic investigations. This fact has increased the awareness for traffic analysis, i.e., inferring information from communication patterns instead of its content. Deciding correctly that a known network flow is either the same or part of an observed one can be extremely useful for several network-security applications such as intrusion detection and tracing anonymous connections. In many cases, the flows of interest are relayed through many nodes that reencrypt the flow, making traffic analysis the only possible solution. There exist two well-known techniques to solve this proble...
This research applies statistical methods in pattern recognition to test the privacy capabilities of...
Tor is the second generation Onion Router, supporting the anonymous transport of TCP streams over th...
In this work, we examine why a popular anonymity network, Tor, is vulnerable to timing side-channel ...
The increase of encrypted traffic on the Internet may become a problem for network-security applicat...
Low-latency anonymity preserving networks, such as Tor, are geared towards preserving anonymity of u...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
The growing use of encryption in network communications is an undoubted boon for user privacy. Howev...
The recent public disclosure of mass surveillance of electronic communication, involving powerful go...
Abstract—Low-latency anonymous communication networks, such as Tor, are geared towards web browsing,...
Security and privacy have gained more and more attention with the rapid growth and public acceptance...
University of Minnesota Ph.D. dissertation. February 2021. Major: Computer Science. Advisor: Nichola...
Linking network flows is an important problem in several security-related applications including int...
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though ...
We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous cl...
The frequent and large-scale network attacks have led to an increased need for developing techniques...
This research applies statistical methods in pattern recognition to test the privacy capabilities of...
Tor is the second generation Onion Router, supporting the anonymous transport of TCP streams over th...
In this work, we examine why a popular anonymity network, Tor, is vulnerable to timing side-channel ...
The increase of encrypted traffic on the Internet may become a problem for network-security applicat...
Low-latency anonymity preserving networks, such as Tor, are geared towards preserving anonymity of u...
In this dissertation, we address issues related to traffic analysis attacks and the engineering in a...
The growing use of encryption in network communications is an undoubted boon for user privacy. Howev...
The recent public disclosure of mass surveillance of electronic communication, involving powerful go...
Abstract—Low-latency anonymous communication networks, such as Tor, are geared towards web browsing,...
Security and privacy have gained more and more attention with the rapid growth and public acceptance...
University of Minnesota Ph.D. dissertation. February 2021. Major: Computer Science. Advisor: Nichola...
Linking network flows is an important problem in several security-related applications including int...
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though ...
We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous cl...
The frequent and large-scale network attacks have led to an increased need for developing techniques...
This research applies statistical methods in pattern recognition to test the privacy capabilities of...
Tor is the second generation Onion Router, supporting the anonymous transport of TCP streams over th...
In this work, we examine why a popular anonymity network, Tor, is vulnerable to timing side-channel ...