On anonymity in an electronic society: A survey of anonymous communication systems

M Edman, B Yener - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
The past two decades have seen a growing interest in methods for anonymous
communication on the Internet, both from the academic community and the general public …

A survey on routing in anonymous communication protocols

F Shirazi, M Simeonovski, MR Asghar… - ACM Computing …, 2018 - dl.acm.org
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …

Deepcorr: Strong flow correlation attacks on tor using deep learning

M Nasr, A Bahramali, A Houmansadr - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …

Low-cost traffic analysis of Tor

SJ Murdoch, G Danezis - … on Security and Privacy (S&P'05), 2005 - ieeexplore.ieee.org
Tor is the second generation onion router supporting the anonymous transport of TCP
streams over the Internet. Its low latency makes it very suitable for common tasks, such as …

Unobservable communication over fully untrusted infrastructure

S Angel, S Setty - 12th USENIX Symposium on Operating Systems …, 2016 - usenix.org
Kee** communication private has become increasingly important in an era of mass
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …

[PDF][PDF] Compromising electromagnetic emanations of wired and wireless keyboards.

M Vuagnoux, S Pasini - USENIX security symposium, 2009 - usenix.org
Computer keyboards are often used to transmit confidential data such as passwords. Since
they contain electronic components, keyboards eventually emit electromagnetic waves …

Low-resource routing attacks against Tor

K Bauer, D McCoy, D Grunwald, T Kohno… - Proceedings of the 2007 …, 2007 - dl.acm.org
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its
popularity is due in part to its perceived strong anonymity properties and its relatively low …

Riffle: An efficient communication system with strong anonymity

AH Kwon, D Lazar, S Devadas, B Ford - 2015 - dspace.mit.edu
Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa.
Onion-routing achieves low latency, high bandwidth, and scalable anonymous …

How much anonymity does network latency leak?

N Hopper, EY Vasserman, E Chan-Tin - ACM Transactions on …, 2010 - dl.acm.org
Low-latency anonymity systems such as Tor, AN. ON, Crowds, and Anonymizer. com aim to
provide anonymous connections that are both untraceable by “local” adversaries who …

The predecessor attack: An analysis of a threat to anonymous communications systems

MK Wright, M Adler, BN Levine, C Shields - ACM Transactions on …, 2004 - dl.acm.org
There have been a number of protocols proposed for anonymous network communication.
In this paper, we investigate attacks by corrupt group members that degrade the anonymity …