Sciweavers

2474 search results - page 12 / 495
» Attacks on Steganographic Systems
Sort
View
TON
2012
13 years 2 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
INFOCOM
2012
IEEE
13 years 2 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
SEC
2003
15 years 1 months ago
Statistical Disclosure Attacks
Abstract An improvement over the previously known disclosure attack is presented that allows, using statistical methods, to effectively deanonymize users of a mix system. Furtherm...
George Danezis
75
Voted
HOTOS
2007
IEEE
15 years 3 months ago
A Web Based Covert File System
We present the idea of a web based covert file system, CovertFS. This file system allows a user to store files covertly on media sharing websites while guaranteeing confidentialit...
Arati Baliga, Joe Kilian, Liviu Iftode
ISCAPDCS
2004
15 years 1 months ago
Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems us...
Stephen M. Specht, Ruby B. Lee