On the properties of non-media digital watermarking: a review of state of the art techniques

AS Panah, R Van Schyndel, T Sellis, E Bertino - IEEE Access, 2016 - ieeexplore.ieee.org
Over the last 25 years, there has been much work on multimedia digital watermarking. In this
domain, the primary limitation to watermark strength has been in its visibility. For multimedia …

A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations

M Nasr, A Bahramali, A Houmansadr - 30th USENIX Security …, 2021 - usenix.org
Deep neural networks (DNNs) are commonly used for various traffic analysis problems, such
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …

Deepcorr: Strong flow correlation attacks on tor using deep learning

M Nasr, A Bahramali, A Houmansadr - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …

[图书][B] Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures

W Mazurczyk, S Wendzel, S Zander, A Houmansadr… - 2016 - books.google.com
Describes Information Hiding in communication networks, and highlights their important
issues, challenges, trends, and applications. Highlights development trends and potential …

DeepCoFFEA: Improved flow correlation attacks on Tor via metric learning and amplification

SE Oh, T Yang, N Mathews, JK Holland… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
End-to-end flow correlation attacks are among the oldest known attacks on low-latency
anonymity networks, and are treated as a core primitive for traffic analysis of Tor. However …

An entropy-based approach to detecting covert timing channels

S Gianvecchio, H Wang - IEEE Transactions on Dependable …, 2010 - ieeexplore.ieee.org
The detection of covert timing channels is of increasing interest in light of recent exploits of
covert timing channels over the Internet. However, due to the high variation in legitimate …

Detecting co-residency with active traffic analysis techniques

A Bates, B Mood, J Pletcher, H Pruse… - Proceedings of the …, 2012 - dl.acm.org
Virtualization is the cornerstone of the developing third party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …

TARANET: Traffic-analysis resistant anonymity at the network layer

C Chen, DE Asoni, A Perrig, D Barrera… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Modern low-latency anonymity systems, no matter whether constructed as an overlay or
implemented at the network layer, offer limited security guarantees against traffic analysis …

Compressive traffic analysis: A new paradigm for scalable traffic analysis

M Nasr, A Houmansadr, A Mazumdar - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Traffic analysis is the practice of inferring sensitive information from communication patterns,
particularly packet timings and packet sizes. Traffic analysis is increasingly becoming …