A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
De-anonymisation attacks on tor: A survey
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …
Hijacking bitcoin: Routing attacks on cryptocurrencies
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for
attackers. While many attack vectors have already been uncovered, one important vector …
attackers. While many attack vectors have already been uncovered, one important vector …
Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning
Website Fingerprinting (WF) attacks pose a serious threat to users' online privacy, including
for users of the Tor anonymity system. By exploiting recent advances in deep learning, WF …
for users of the Tor anonymity system. By exploiting recent advances in deep learning, WF …
Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations
Deep neural networks (DNNs) are commonly used for various traffic analysis problems, such
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …
Deepcorr: Strong flow correlation attacks on tor using deep learning
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …
Deco: Liberating web data using decentralized oracles for tls
Thanks to the widespread deployment of TLS, users can access private data over channels
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …
Continuous in-network round-trip time monitoring
Round-trip time (RTT) is a central metric that influences end-user QoE and can expose traffic-
interception attacks. Many popular RTT monitoring techniques either send active probes …
interception attacks. Many popular RTT monitoring techniques either send active probes …
Sok: A critical evaluation of efficient website fingerprinting defenses
Recent website fingerprinting attacks have been shown to achieve very high performance
against traffic through Tor. These attacks allow an adversary to deduce the website a Tor …
against traffic through Tor. These attacks allow an adversary to deduce the website a Tor …
Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication
D Lu, T Yurek, S Kulshreshtha, R Govind… - Proceedings of the …, 2019 - dl.acm.org
Multiparty computation as a service (MPSaaS) is a promising approach for building privacy-
preserving communication systems. However, in this paper, we argue that existing MPC …
preserving communication systems. However, in this paper, we argue that existing MPC …