
PoPETs Proceedings — Volume 2017 - petsymposium.org
Why can’t users choose their identity providers on the web? [PDF] What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy [PDF]
Fingerprinting Keywords in Search Queries over Tor
In this paper, we study the extent to which Website Fingerprinting can be extended to fingerprint individual queries or keywords to web applications, a task we call Keyword Fingerprinting (KF).
Abstract: Search engine queries contain a great deal of private and potentially compromising information ×106 2 about users. One technique to prevent search engines.
SeaGlass: Enabling City-Wide IMSI-Catcher Detection
To address this deficiency, we build, deploy, and evaluate SeaGlass, a city-wide cellsite simulator detection network. SeaGlass consists of sensors that measure and upload data on the cellular …
TagIt: Tagging Network Flows using Blind Fingerprints
Abstract: Flow fingerprinting is a mechanism for linking obfuscated network flows at large scale. In this paper, we introduce the first blind flow fingerprinting system called TagIt.
Proceedings on Privacy Enhancing Technologies ; 2017 (2):74–94 Aaron Johnson*, Rob Jansen, Nicholas Hopper, Aaron Segal, and Paul Syverson
Website Fingerprinting Defenses at the Application Layer
In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight …
PoPETs Proceedings — ErasuCrypto: A Light-weight Secure Data …
Abstract: Securely deleting invalid data from secondary storage is critical to protect users’ data privacy against unauthorized accesses. However, secure deletion is very costly for solid state …
In this paper, we introduce the first blind flow fingerprinting system called TagIt. Our system works by modulating finger-print signals into the timing patterns of network flows through slightly d.
m R. Marczak* and Vern Paxson Social Engineering Attacks on Government Opponents: Target Perspectives Abstract: New methods of dissident surveillance em-ployed by repressive nation …