A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Hijacking bitcoin: Routing attacks on cryptocurrencies

M Apostolaki, A Zohar… - 2017 IEEE symposium on …, 2017 - ieeexplore.ieee.org
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for
attackers. While many attack vectors have already been uncovered, one important vector …

Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning

P Sirinam, N Mathews, MS Rahman… - Proceedings of the 2019 …, 2019 - dl.acm.org
Website Fingerprinting (WF) attacks pose a serious threat to users' online privacy, including
for users of the Tor anonymity system. By exploiting recent advances in deep learning, WF …

Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations

M Nasr, A Bahramali, A Houmansadr - 30th USENIX Security …, 2021 - usenix.org
Deep neural networks (DNNs) are commonly used for various traffic analysis problems, such
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …

Deepcorr: Strong flow correlation attacks on tor using deep learning

M Nasr, A Bahramali, A Houmansadr - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …

Deco: Liberating web data using decentralized oracles for tls

F Zhang, D Maram, H Malvai, S Goldfeder… - Proceedings of the 2020 …, 2020 - dl.acm.org
Thanks to the widespread deployment of TLS, users can access private data over channels
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …

Continuous in-network round-trip time monitoring

S Sengupta, H Kim, J Rexford - Proceedings of the ACM SIGCOMM 2022 …, 2022 - dl.acm.org
Round-trip time (RTT) is a central metric that influences end-user QoE and can expose traffic-
interception attacks. Many popular RTT monitoring techniques either send active probes …

Sok: A critical evaluation of efficient website fingerprinting defenses

N Mathews, JK Holland, SE Oh… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Recent website fingerprinting attacks have been shown to achieve very high performance
against traffic through Tor. These attacks allow an adversary to deduce the website a Tor …

Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication

D Lu, T Yurek, S Kulshreshtha, R Govind… - Proceedings of the …, 2019 - dl.acm.org
Multiparty computation as a service (MPSaaS) is a promising approach for building privacy-
preserving communication systems. However, in this paper, we argue that existing MPC …