2003 International Conference on Parallel Processing, 2003. Proceedings. 2003
DOI: 10.1109/icpp.2003.1240613
|View full text |Cite
|
Sign up to set email alerts
|

Analytical and empirical analysis of countermeasures to traffic analysis attacks

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2005
2005
2010
2010

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(41 citation statements)
references
References 15 publications
0
41
0
Order By: Relevance
“…In this paper, we assume that the adversary uses a classical timing analysis attack ( [1,22]), which we summarize as follows:…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we assume that the adversary uses a classical timing analysis attack ( [1,22]), which we summarize as follows:…”
Section: Threat Modelmentioning
confidence: 99%
“…It is likely more effective because periodic traffic patterns are very difficult to generate with sufficient accuracy. We showed in NetCamo [22,34], for example, how high-accuracy traffic analysis can easily break periodic link padding schemes.…”
Section: Overviewmentioning
confidence: 99%
“…Layered encryption is often used in anonymity protocols [7,28]. Traffic covering can prevent traffic timing analysis [13,17]. These techniques often work together to achieve anonymity.…”
Section: Anonymous Unicastmentioning
confidence: 99%
“…In this section, we will describe one such system, which we developed and experimentally evaluated on a number of platforms, ranging from general-purpose to realtime [3]. We think that NetCamo is representative of many link padding implementations and believe that results described here can be at least qualitatively applied to any general link padding implementation.…”
Section: Canonical Link Padding Implementationmentioning
confidence: 99%
“…These disturbances perturb the generation of controlled, padded traffic. It has been shown that even sophisticated software implementations with tight timing control on real-time operating systems show this effect [3].…”
Section: Introductionmentioning
confidence: 99%