About 1,760 results
Open links in new tab
  1. PoPETs Proceedings — Volume 2017 - petsymposium.org

    Why can’t users choose their identity providers on the web? [PDF] What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy [PDF]

  2. Fingerprinting Keywords in Search Queries over Tor

    In this paper, we study the extent to which Website Fingerprinting can be extended to fingerprint individual queries or keywords to web applications, a task we call Keyword Fingerprinting (KF).

  3. Abstract: Search engine queries contain a great deal of private and potentially compromising information ×106 2 about users. One technique to prevent search engines.

  4. SeaGlass: Enabling City-Wide IMSI-Catcher Detection

    To address this deficiency, we build, deploy, and evaluate SeaGlass, a city-wide cellsite simulator detection network. SeaGlass consists of sensors that measure and upload data on the cellular …

  5. TagIt: Tagging Network Flows using Blind Fingerprints

    Abstract: Flow fingerprinting is a mechanism for linking obfuscated network flows at large scale. In this paper, we introduce the first blind flow fingerprinting system called TagIt.

  6. Proceedings on Privacy Enhancing Technologies ; 2017 (2):74–94 Aaron Johnson*, Rob Jansen, Nicholas Hopper, Aaron Segal, and Paul Syverson

  7. Website Fingerprinting Defenses at the Application Layer

    In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight …

  8. PoPETs Proceedings — ErasuCrypto: A Light-weight Secure Data …

    Abstract: Securely deleting invalid data from secondary storage is critical to protect users’ data privacy against unauthorized accesses. However, secure deletion is very costly for solid state …

  9. In this paper, we introduce the first blind flow fingerprinting system called TagIt. Our system works by modulating finger-print signals into the timing patterns of network flows through slightly d.

  10. m R. Marczak* and Vern Paxson Social Engineering Attacks on Government Opponents: Target Perspectives Abstract: New methods of dissident surveillance em-ployed by repressive nation …