Traffic analysis is the best known approach to uncover relationships amongst users of anonymous communication systems, such as mix networks. Surprisingly, all previously published techniques require very specific user behavior to break the anonymity provided by mixes. At the same time, it is also well known that none of the considered user models reflects realistic behavior which casts some doubt on previous work with respect to real-life scenarios. We first present a user behavior model that, to the best of our knowledge, is the least restrictive scheme considered so far. Second, we develop the Perfect Matching Disclosure Attack, an efficient attack based on graph theory that operates without any assumption on user behavior. The attack is ...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract — Mix networks are designed to provide anonymity for users in a variety of applications, in...
Abstract. A user is only anonymous within a set of other users. Hence, the core functionality of an ...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries ...
Abstract. We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, t...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
Abstract. Statistical disclosure is a well-studied technique that an at-tacker can use to uncover re...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
In network communications, mixes provide protection against observers hiding the appearance of messa...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
Abstract. The Minimal-Hitting-Set attack (HS-attack) [10] is a well-known pas-sive intersection atta...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract — Mix networks are designed to provide anonymity for users in a variety of applications, in...
Abstract. A user is only anonymous within a set of other users. Hence, the core functionality of an ...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
The goal of anonymity providing techniques is to preserve the privacy of users, who has communicated...
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries ...
Abstract. We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, t...
The MIX technique forms the basis of many popular services that offer anonymity of communication in ...
Abstract. Statistical disclosure is a well-studied technique that an at-tacker can use to uncover re...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
In network communications, mixes provide protection against observers hiding the appearance of messa...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
Abstract. The Minimal-Hitting-Set attack (HS-attack) [10] is a well-known pas-sive intersection atta...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract. The literature contains a variety of different mixes, some of which have been used in depl...
Abstract — Mix networks are designed to provide anonymity for users in a variety of applications, in...
Abstract. A user is only anonymous within a set of other users. Hence, the core functionality of an ...