Privacy-preserving forensic attribution is a new ar-chitectural primitive we propose that allows individual network packets to be attributed, post-hoc, to the physical machines from which they were sent. Importantly, while our architecture allows any network element to verify that a packet has a valid forensic signature, only a trusted authority is able to reveal the sender’s identity. In this way, the privacy of individual senders is protected from serendipitous use, while criminal actors cannot presume anonymity. We have developed a prototype implemen-tation, called Clue, that demonstrates the fundamental feasibility of this approach while also illustrating the design challenges and opportunities in integrating this functionality with the...
Communicating parties inside computer networks use different kind of identifiers. Some of these iden...
Network security research can benefit greatly from testing environments that are capable of generati...
In recent years, network accountability and forensic analysis have become increasingly important, as...
The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is...
Abstract. Although privacy is often seen as an essential right for internet users, the provision of ...
This is the author accepted manuscript. The final version is available from Elsevier via the DOI in ...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to n...
Packet-switched computer networks of all sizes are widely used for personal, professional, and gover...
Internet addresses are routinely being used to infer the identity of persons who send offending traf...
IP source addresses are often the only initial lead when investigating cybercrime in the Internet. U...
Abstract. The trusted computing group (TCG) specified two protocols that allow a trusted hardware de...
With the development of online communications in the past decades, new privacy concerns have emerged...
Capturing digital evidence is crucial for counteracting against computer and cyber crimes. The techn...
Packet filtering allows a network gateway to control the network traffic flows and protect the compu...
Communicating parties inside computer networks use different kind of identifiers. Some of these iden...
Network security research can benefit greatly from testing environments that are capable of generati...
In recent years, network accountability and forensic analysis have become increasingly important, as...
The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is...
Abstract. Although privacy is often seen as an essential right for internet users, the provision of ...
This is the author accepted manuscript. The final version is available from Elsevier via the DOI in ...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to n...
Packet-switched computer networks of all sizes are widely used for personal, professional, and gover...
Internet addresses are routinely being used to infer the identity of persons who send offending traf...
IP source addresses are often the only initial lead when investigating cybercrime in the Internet. U...
Abstract. The trusted computing group (TCG) specified two protocols that allow a trusted hardware de...
With the development of online communications in the past decades, new privacy concerns have emerged...
Capturing digital evidence is crucial for counteracting against computer and cyber crimes. The techn...
Packet filtering allows a network gateway to control the network traffic flows and protect the compu...
Communicating parties inside computer networks use different kind of identifiers. Some of these iden...
Network security research can benefit greatly from testing environments that are capable of generati...
In recent years, network accountability and forensic analysis have become increasingly important, as...