We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis attacks against anonymous message systems, by describing how an eavesdropper can learn sender-receiver connections even when the substrate is a network of pool mixes, the attacker is non-global, and senders have complex behavior or generate padding messages. Additionally, we describe how an attacker can use information about message distinguishability to speed the attack. We simulate our attacks for a variety of scenarios, focusing on the amount of information needed to link senders to their recipients. In each scenario, we show that the intersection attack is slowed but still succeeds against a steady-state mix network. We find that the attac...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
Abstract—A mix is a communication proxy that hides the relationship between incoming and outgoing me...
Abstract. The Minimal-Hitting-Set attack (HS-attack) [10] is a well-known pas-sive intersection atta...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
Traffic analysis is the best known approach to uncover relationships amongst users of anonymous comm...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
Abstract. We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, t...
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries ...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
Anonymous communications protocols have been designed to resist attacks that work in a short period ...
This paper studies countermeasures to traffic analysis attacks. A common strategy for such counterme...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
Abstract—A mix is a communication proxy that hides the relationship between incoming and outgoing me...
Abstract. The Minimal-Hitting-Set attack (HS-attack) [10] is a well-known pas-sive intersection atta...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
Traffic analysis is the best known approach to uncover relationships amongst users of anonymous comm...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
Abstract. We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, t...
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries ...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
Anonymous communications protocols have been designed to resist attacks that work in a short period ...
This paper studies countermeasures to traffic analysis attacks. A common strategy for such counterme...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
Abstract—A mix is a communication proxy that hides the relationship between incoming and outgoing me...
Abstract. The Minimal-Hitting-Set attack (HS-attack) [10] is a well-known pas-sive intersection atta...