2007 IEEE Symposium on Security and Privacy (SP '07) 2007
DOI: 10.1109/sp.2007.30
|View full text |Cite
|
Sign up to set email alerts
|

Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
182
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 173 publications
(183 citation statements)
references
References 30 publications
0
182
0
Order By: Relevance
“…Linking network flows is an important problem in different applications, including stepping stones detection [13,28] and compromising anonymity [22,23]. For instance, it is widely known that attackers can de-anonymize a low-latency anonymity system by linking its egress and ingress flows.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Linking network flows is an important problem in different applications, including stepping stones detection [13,28] and compromising anonymity [22,23]. For instance, it is widely known that attackers can de-anonymize a low-latency anonymity system by linking its egress and ingress flows.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, it is widely known that attackers can de-anonymize a low-latency anonymity system by linking its egress and ingress flows. Since network flows are commonly encrypted in such applications, linking flows is feasible only through correlation of communication patterns such as packet timings, packet counts, and packet sizes [13,22,23]; this is known as traffic analysis.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations