eHealth cloud security challenges: a survey

Y Al-Issa, MA Ottom, A Tamrawi - Journal of healthcare …, 2019 - Wiley Online Library
Cloud computing is a promising technology that is expected to transform the healthcare
industry. Cloud computing has many benefits like flexibility, cost and energy savings …

Privacy in mobile technology for personal healthcare

S Avancha, A Baxi, D Kotz - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …

Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail

KP Dyer, SE Coull, T Ristenpart… - 2012 IEEE symposium …, 2012 - ieeexplore.ieee.org
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …

Packet-level signatures for smart home devices

R Trimananda, J Varmarken, A Markopoulou… - Network and …, 2020 - par.nsf.gov
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …

Identity, location, disease and more: Inferring your secrets from android public resources

X Zhou, S Demetriou, D He, M Naveed, X Pan… - Proceedings of the …, 2013 - dl.acm.org
The design of Android is based on a set of unprotected shared resources, including those
inherited from Linux (eg, Linux public directories). However, the dramatic development in …

Ethical considerations in network measurement papers

C Partridge, M Allman - Communications of the ACM, 2016 - dl.acm.org
Ethical considerations in network measurement papers Page 1 58 COMMUNICATIONS OF
THE ACM | OCTOBER 2016 | VOL. 59 | NO. 10 contributed articles PHO T O FROM EVERETT …

Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

KG Paterson, T Ristenpart, T Shrimpton - … on the Theory and Application of …, 2011 - Springer
We analyze the security of the TLS Record Protocol, a MAC-then-Encode-then-Encrypt
(MEE) scheme whose design targets confidentiality and integrity for application layer …

Practical traffic analysis attacks on secure messaging applications

A Bahramali, R Soltani, A Houmansadr… - arxiv preprint arxiv …, 2020 - arxiv.org
Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp have become
extremely popular in recent years. Unfortunately, such IM services have been targets of …

Spying through your voice assistants: realistic voice command fingerprinting

D Ahmed, A Sabir, A Das - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Voice assistants are becoming increasingly pervasive due to the convenience and
automation they provide through the voice interface. However, such convenience often …

**Pong: Packet-level signatures for smart home device events

R Trimananda, J Varmarken, A Markopoulou… - arxiv preprint arxiv …, 2019 - arxiv.org
Smart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …