Novel Packet Size-Based Covert Channel Attacks against Anonymizer
暂无分享,去创建一个
Weijia Jia | Zhen Ling | Xinwen Fu | Dong Xuan | Wei Yu | Junzhou Luo | Wei Yu | D. Xuan | W. Jia | Junzhou Luo | Zhen Ling | Xinwen Fu
[1] R. Bettati,et al. NetCamo : Camouflaging Network Traffic for Real-Time Applications , 2003 .
[2] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[3] Gaurav Shah,et al. Keyboards and Covert Channels , 2006, USENIX Security Symposium.
[4] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[5] Nikita Borisov,et al. Multi-flow Attacks Against Network Flow Watermarking Schemes , 2008, USENIX Security Symposium.
[6] R. Hilgers,et al. Parameter , 2019, Springer Reference Medizin.
[7] Tatu Ylönen,et al. The Secure Shell (SSH) Connection Protocol , 2006, RFC.
[8] Weijia Jia,et al. A novel packet size based covert channel attack against anonymizer , 2011, 2011 Proceedings IEEE INFOCOM.
[9] Riccardo Bettati,et al. On Flow Correlation Attacks and Countermeasures in Mix Networks , 2004, Privacy Enhancing Technologies.
[10] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[11] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[12] Nikita Borisov,et al. RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows , 2009, NDSS.
[13] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[14] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[15] Xinwen Fu,et al. DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Sushil Jajodia,et al. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[17] Xuxian Jiang,et al. A First Step towards Live Botmaster Traceback , 2008, RAID.
[18] Walter Willinger,et al. On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.
[19] Lawrence E. Bassham,et al. Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .
[20] Tatu Ylönen,et al. The Secure Shell (SSH) Authentication Protocol , 2006, RFC.
[21] Tatu Ylönen,et al. The Secure Shell (ssh) Transport Layer Protocol , 2006 .
[22] Hyoung-Kee Choi,et al. A behavioral model of Web traffic , 1999, Proceedings. Seventh International Conference on Network Protocols.
[23] H. E. Hurst,et al. Long-Term Storage Capacity of Reservoirs , 1951 .
[24] Maruti Gupta,et al. A NEW TRAFFIC MODEL FOR CURRENT USER WEB BROWSING BEHAVIOR , 2007 .
[25] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[26] Kevin S. Bauer,et al. Low-Resource Routing Attacks Against Anonymous Systems , 2007 .
[27] Charles V. Wright,et al. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.
[28] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[29] Sushil Jajodia,et al. Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.
[30] Douglas S. Reeves,et al. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays , 2003, CCS '03.
[31] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[32] Weijia Jia,et al. A new cell counter based attack against tor , 2009, CCS.
[33] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[34] Riccardo Bettati,et al. Analytical and empirical analysis of countermeasures to traffic analysis attacks , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..
[35] Jan Beran,et al. Statistics for long-memory processes , 1994 .
[36] Peng Ning,et al. On the secrecy of timing-based active watermarking trace-back techniques , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[37] Roger Dingledine,et al. A Practical Congestion Attack on Tor Using Long Paths , 2009, USENIX Security Symposium.
[38] B. Mandelbrot,et al. Fractional Brownian Motions, Fractional Noises and Applications , 1968 .
[39] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[40] Peng Ning,et al. Tracing Traffic through Intermediate Hosts that Repacketize Flows , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.