On the properties of non-media digital watermarking: a review of state of the art techniques
Over the last 25 years, there has been much work on multimedia digital watermarking. In this
domain, the primary limitation to watermark strength has been in its visibility. For multimedia …
domain, the primary limitation to watermark strength has been in its visibility. For multimedia …
A survey of timing channels and countermeasures
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations
Deep neural networks (DNNs) are commonly used for various traffic analysis problems, such
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …
Deepcorr: Strong flow correlation attacks on tor using deep learning
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …
[图书][B] Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
Describes Information Hiding in communication networks, and highlights their important
issues, challenges, trends, and applications. Highlights development trends and potential …
issues, challenges, trends, and applications. Highlights development trends and potential …
DeepCoFFEA: Improved flow correlation attacks on Tor via metric learning and amplification
End-to-end flow correlation attacks are among the oldest known attacks on low-latency
anonymity networks, and are treated as a core primitive for traffic analysis of Tor. However …
anonymity networks, and are treated as a core primitive for traffic analysis of Tor. However …
An entropy-based approach to detecting covert timing channels
S Gianvecchio, H Wang - IEEE Transactions on Dependable …, 2010 - ieeexplore.ieee.org
The detection of covert timing channels is of increasing interest in light of recent exploits of
covert timing channels over the Internet. However, due to the high variation in legitimate …
covert timing channels over the Internet. However, due to the high variation in legitimate …
Detecting co-residency with active traffic analysis techniques
A Bates, B Mood, J Pletcher, H Pruse… - Proceedings of the …, 2012 - dl.acm.org
Virtualization is the cornerstone of the developing third party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
TARANET: Traffic-analysis resistant anonymity at the network layer
Modern low-latency anonymity systems, no matter whether constructed as an overlay or
implemented at the network layer, offer limited security guarantees against traffic analysis …
implemented at the network layer, offer limited security guarantees against traffic analysis …
Compressive traffic analysis: A new paradigm for scalable traffic analysis
Traffic analysis is the practice of inferring sensitive information from communication patterns,
particularly packet timings and packet sizes. Traffic analysis is increasingly becoming …
particularly packet timings and packet sizes. Traffic analysis is increasingly becoming …