eHealth cloud security challenges: a survey
Cloud computing is a promising technology that is expected to transform the healthcare
industry. Cloud computing has many benefits like flexibility, cost and energy savings …
industry. Cloud computing has many benefits like flexibility, cost and energy savings …
Privacy in mobile technology for personal healthcare
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …
survey, we examine the privacy requirements of mobile computing technologies that have …
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …
Packet-level signatures for smart home devices
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
Identity, location, disease and more: Inferring your secrets from android public resources
The design of Android is based on a set of unprotected shared resources, including those
inherited from Linux (eg, Linux public directories). However, the dramatic development in …
inherited from Linux (eg, Linux public directories). However, the dramatic development in …
Ethical considerations in network measurement papers
Ethical considerations in network measurement papers Page 1 58 COMMUNICATIONS OF
THE ACM | OCTOBER 2016 | VOL. 59 | NO. 10 contributed articles PHO T O FROM EVERETT …
THE ACM | OCTOBER 2016 | VOL. 59 | NO. 10 contributed articles PHO T O FROM EVERETT …
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
We analyze the security of the TLS Record Protocol, a MAC-then-Encode-then-Encrypt
(MEE) scheme whose design targets confidentiality and integrity for application layer …
(MEE) scheme whose design targets confidentiality and integrity for application layer …
Practical traffic analysis attacks on secure messaging applications
Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp have become
extremely popular in recent years. Unfortunately, such IM services have been targets of …
extremely popular in recent years. Unfortunately, such IM services have been targets of …
Spying through your voice assistants: realistic voice command fingerprinting
Voice assistants are becoming increasingly pervasive due to the convenience and
automation they provide through the voice interface. However, such convenience often …
automation they provide through the voice interface. However, such convenience often …
**Pong: Packet-level signatures for smart home device events
Smart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …