Sciweavers

381 search results - page 2 / 77
» Timing attacks on Web privacy
Sort
View
CSFW
2009
IEEE
14 years 2 days ago
Securing Timeout Instructions in Web Applications
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. Th...
Alejandro Russo, Andrei Sabelfeld
PET
2010
Springer
13 years 9 months ago
Preventing Active Timing Attacks in Low-Latency Anonymous Communication
Joan Feigenbaum, Aaron Johnson, Paul F. Syverson
PET
2007
Springer
13 years 11 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
GLOBECOM
2010
IEEE
13 years 3 months ago
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy....
Titus Abraham, Matthew Wright