Intersection attacks, which are popular traffic analysis attacks, have been extensively studied in anonymous point-to-point communication scenarios. These attacks are also known to be challenging threats to anonymous group communication, e.g., microblogging. However, it remains unclear how powerful these attacks can be, especially when considering realistic user communication behavior. In this paper, we study the effectiveness of intersection attacks on anonymous microblogging systems utilizing Twitter and Reddit datasets. Our findings show that the attacks are effective regardless of whether users post their messages under pseudonyms or publish them to topics without attaching identifiers. Additionally, we observed that attacks are feasibl...
Microblogging is a popular form of Online Social Networking (OSN) activity. It allows users to send ...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
: Fine-grained records of people's interactions, both offline and online, are collected at large sca...
Anonymous microblogging systems are known to be vulnerable to intersection attacks due to network ch...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Some anonymity schemes might in principle protect users from pervasive network surveillance—but only...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
Some anonymity schemes, such as DC-nets and MIX cas-cades, can guarantee anonymity even against traf...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
Microblogging is a popular form of online social networking activity. It allows users to send messag...
Anonymous communication systems are vulnerable to long term passive "intersection attacks". Not all ...
Traffic analysis is the best known approach to uncover relationships amongst users of anonymous comm...
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries ...
Abstract. We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, t...
In the past, different intersection attacks on Chaum Mixes have been proposed and shown to work well...
Microblogging is a popular form of Online Social Networking (OSN) activity. It allows users to send ...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
: Fine-grained records of people's interactions, both offline and online, are collected at large sca...
Anonymous microblogging systems are known to be vulnerable to intersection attacks due to network ch...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Some anonymity schemes might in principle protect users from pervasive network surveillance—but only...
We extend earlier research on mounting and resisting passive long-term end-to-end traffic analysis a...
Some anonymity schemes, such as DC-nets and MIX cas-cades, can guarantee anonymity even against traf...
Systems that allow users to communicate anonymously with a destination have received increasingly m...
Microblogging is a popular form of online social networking activity. It allows users to send messag...
Anonymous communication systems are vulnerable to long term passive "intersection attacks". Not all ...
Traffic analysis is the best known approach to uncover relationships amongst users of anonymous comm...
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries ...
Abstract. We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, t...
In the past, different intersection attacks on Chaum Mixes have been proposed and shown to work well...
Microblogging is a popular form of Online Social Networking (OSN) activity. It allows users to send ...
Mix networks and anonymity networks provide anonymous communication via relaying, which introduces o...
: Fine-grained records of people's interactions, both offline and online, are collected at large sca...