The scientific community has been consistently working on the pervasive problem of information leakage, uncovering numerous attack vectors, and proposing various countermeasures. Despite these efforts, leakage incidents remain prevalent, as the complexity of systems and protocols increases, and sophisticated modeling methods become more accessible to adversaries. This work studies how information leakages manifest in and impact interconnected systems and their users. We first focus on online communications and investigate leakages in the Transport Layer Security protocol (TLS). Using modern machine learning models, we show that an eavesdropping adversary can efficiently exploit meta-information (e.g., packet size) not protected by the TLS’ ...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Privacy enhancing technologies like OpenSSL, OpenVPN or Tor establish an encrypted tunnel that enabl...
Side channels are channels of implicit information flow that can be used to find out information tha...
This paper sheds light on crucial weaknesses in the design of hidden services that allow us to break...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Keeping users sensitive information secure and private in todays network is challenging. Networks ar...
peer reviewedTor is one of the most widely used tools for providing anonymity on the Internet. We ha...
peer reviewedTor is a widely used anonymity network providing low-latency communication capabilities...
Abstract. This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests w...
The cybernetics revolution of the last years improved a lot our lives, having an immediate access to...
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is ...
PhDThe usual methods of getting anonymity, such as using a VPN or the Tor network, requires some amo...
In order to be useful in the real world, efficient cryptographic constructions often reveal, or ``le...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...
Recent research has shown that many popular web applications are vulnerable to side-channel attacks ...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Privacy enhancing technologies like OpenSSL, OpenVPN or Tor establish an encrypted tunnel that enabl...
Side channels are channels of implicit information flow that can be used to find out information tha...
This paper sheds light on crucial weaknesses in the design of hidden services that allow us to break...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Keeping users sensitive information secure and private in todays network is challenging. Networks ar...
peer reviewedTor is one of the most widely used tools for providing anonymity on the Internet. We ha...
peer reviewedTor is a widely used anonymity network providing low-latency communication capabilities...
Abstract. This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests w...
The cybernetics revolution of the last years improved a lot our lives, having an immediate access to...
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is ...
PhDThe usual methods of getting anonymity, such as using a VPN or the Tor network, requires some amo...
In order to be useful in the real world, efficient cryptographic constructions often reveal, or ``le...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...
Recent research has shown that many popular web applications are vulnerable to side-channel attacks ...
Side channel attacks exploit physical information that leaks from a cryptographic device in order to...
Privacy enhancing technologies like OpenSSL, OpenVPN or Tor establish an encrypted tunnel that enabl...
Side channels are channels of implicit information flow that can be used to find out information tha...