Anonymous microblogging systems are known to be vulnerable to intersection attacks due to network churn. An adversary that monitors all communications can leverage the churn to learn who is publishing what with increasing confidence over time. In this paper, we propose a protocol for mitigating intersection attacks in anonymous microblogging systems by grouping users into anonymity sets based on similarities in their publishing behavior. The protocol provides a configurable communication schedule for users in each set to manage the inevitable trade-off between latency and bandwidth overhead. In our evaluation, we use real-world datasets from two popular microblogging platforms, Twitter and Reddit, to simulate user publishing behavior. The r...
Some anonymity schemes, such as DC-nets and MIX cas-cades, can guarantee anonymity even against traf...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
Intersection attacks, which are popular traffic analysis attacks, have been extensively studied in a...
Anonymous communication systems are vulnerable to long term passive "intersection attacks". Not all ...
Some anonymity schemes might in principle protect users from pervasive network surveillance—but only...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
Microblogging is a popular form of Online Social Networking (OSN) activity. It allows users to send ...
Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especi...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Microblogging is a popular form of online social networking activity. It allows users to send messag...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
Some anonymity schemes, such as DC-nets and MIX cas-cades, can guarantee anonymity even against traf...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...
Intersection attacks, which are popular traffic analysis attacks, have been extensively studied in a...
Anonymous communication systems are vulnerable to long term passive "intersection attacks". Not all ...
Some anonymity schemes might in principle protect users from pervasive network surveillance—but only...
Anonymity can protect from political repression in Online Social Networks (OSNs) as well as from und...
Microblogging is a popular form of Online Social Networking (OSN) activity. It allows users to send ...
Privacy, in particular anonymity, is desirable in Online Social Networks (OSNs) like Twitter, especi...
Abstract. In this paper we look at the information an attacker can extract using a statistical discl...
Microblogging is a popular form of online social networking activity. It allows users to send messag...
Freedom of speech is a core value of our society. While it can be exercised anonymously towards unde...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
Denial-of-service attacks are a significant threat to mission critical communication infrastructures...
Anonymous communication has become a hot research topic in order to meet the increasing demand for w...
Some anonymity schemes, such as DC-nets and MIX cas-cades, can guarantee anonymity even against traf...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
In this dissertation, we study low-latency anonymity protocols and systems. Such systems enable anon...