Sciweavers

381 search results - page 2 / 77
» Timing attacks on Web privacy
Sort
View
CSFW
2009
IEEE
15 years 7 months ago
Securing Timeout Instructions in Web Applications
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. Th...
Alejandro Russo, Andrei Sabelfeld
PET
2010
Springer
15 years 5 months ago
Preventing Active Timing Attacks in Low-Latency Anonymous Communication
Joan Feigenbaum, Aaron Johnson, Paul F. Syverson
PET
2007
Springer
15 years 7 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
121
Voted
GLOBECOM
2010
IEEE
14 years 11 months ago
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy....
Titus Abraham, Matthew Wright