Search Results

1 - 10 of 64 items :

  • "Measurement" x
  • IT-Security and Cryptology x
Clear All
Analyzing the Great Firewall of China Over Space and Time

network path and end-system characteristics. In Passive and Active Network Measurement. Springer, 2005. [10] China internet and mobile phone users. Available at http: // corner/china-internet-users/. [11] R. Clayton, S. J. Murdoch, and R. N. M. Watson. Ignoring the Great Firewall of China. In Privacy Enhancing Technologies. Springer, 2006. [12] J. R. Crandall, D. Zinn, M. Byrd, E. Barr, and R. East. ConceptDoppler: A weather tracker for Internet censorship. In

Open access
An Automated Approach for Complementing Ad Blockers’ Blacklists

. Madhyastha, and V. Sekar. Understanding website complexity: Measurements, metrics, and implications. In Proc. IMC ’11 , pages 313–328, 2011. [9] R. Cookson. Google, Microsoft and Amazon pay to get around ad blocking tool. Financial Times (2015-02-01), . Accessed: 2015-02-15. [10] M. E. Crovella and A. Bestavros. Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Trans. Netw. , 5(6):835–846, 1997. [11] J. Demšar, T. Curk, A. Erjavec, Črt Gorup, T. Hočevar

Open access
Cross-Device Tracking: Measurement and Disclosures

-peter-steiner-knows-the-joke-rings-as-relevant-as-ever/2013/07/31/73372600-f98d-11e2-8e84-c56731a202fb_blog.html , July 2013. [30] E. Felten, “Does Hashing Data Make Data ’Anonymous’?,” , Apr. 2012. [31] Fed. Trade Comm’n, “FTC Isssues Warning Letters to App Developers Using ’Silverpush’ Code,” , March 2016. [32] S. Englehardt and A. Narayanan, “Online tracking: A 1-million-site measurement and

Open access
PeerFlow: Secure Load Balancing in Tor

election system. In Ajay D. Kshemkalyani and Nir Shavit, editors, Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, PODC 2001, Newport, Rhode Island, USA, August 26-29, 2001 , pages 274–283. ACM, 2001. [7] Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. Low-resource routing attacks against Tor. In ACM WPES , 2007. [8] Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann. Trawling for Tor hidden services: Detection, measurement, deanonymization. In IEEE S&P , 2013. [9] Ronald

Open access
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction

Applications, technologies, architectures, and protocols for computer communication , pages 163–174, 2012. [5] M. Akhoondi, C. Yu, and H. Madhyastha. LASTor: A Low-Latency AS-Aware Tor Client. In Proceedings of the 2012 IEEE Symposium on Security and Privacy , pages 476–490, 2012. [6] B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman, M. Latapy, C. Magnien, and R. Teixeira. Avoiding traceroute anomalies with Paris traceroute. In Proceedings of the 6th ACM SIGCOMM conference on Internet Measurement Conference (IMC) , pages 153–158, 2006. [7] B

Open access
Detecting Anti Ad-blockers in the Wild

-site measurement and analysis. In ACM Conference on Computer and Communications Security (CCS) . ACM, 2016. [5] Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements. In ACM Internet Measurement Conference (IMC) , 2014. [6] Daniel G Goldstein, R Preston McAfee, and Siddharth Suri. The Cost of Annoying Ads. In WWW , 2013. [7] AdBlock Plus. . [8] Matthew Malloy, Mark McNamara, Aaron Cahn, and

Open access
4 Years of EU Cookie Law: Results and Lessons Learned

-and-electronic-communication-sector . [27] D isconnect . . [28] E ckersley , P. How unique is your web browser? In Privacy Enhancing Technologies (2010), vol. 6205, Springer, pp. 1–18. [29] E nglehardt , S., H an , J., and N arayanan , A. I never signed up for this# privacy implications of email tracking. Proceedings on Privacy Enhancing Technologies 2018 , 1 (2018), 109 – 126. [30] E nglehardt , S., and N arayanan , A. Online tracking: A 1-million-site measurement and analysis. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and

Open access
Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures

: a free network mapping and security scanning tool. . [28] S.B. Moon, P. Skelly, and D. Towsley. Estimation and removal of clock skew from network delay measurements. In Proceedings of the 18th Annual IEEE International Conference on Computer Communications (INFOCOM) , pages 227–234, 1999. [29] Keaton Mowery and Hovav Shacham. Pixel perfect: Fingerprinting canvas in HTML5. In Proceedings of Web 2.0 Security and Privacy Workshop (W2SP) , 2012. [30] Nick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker

Open access
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols

anonymity providing systems. In I. S. Moskowitz, editor, Proceedings of Information Hiding Workshop (IH 2001) , pages 245–257. Springer-Verlag, LNCS 2137, April 2001. [17] A. Barton and M. Wright. Denasa: Destination-naive asawareness in anonymous communications. In Proceedings of the 16th Privacy Enhancing Technologies Symposium (PETS 2016) , July 2016. [18] A. Biryukov, I. Pustogarov, and R.-P. Weinmann. Trawling for Tor Hidden services: Detection, measurement, deanonymization. In Proceedings of the 2013 IEEE Symposium on Security and Privacy , May 2013

Open access
Detecting TCP/IP Connections via IPID Hash Collisions

References [1] Alexa. Alexa Top 500 Global Sites. . [2] G. Alexander and J. R. Crandall. Off-path round trip time measurement via TCP/IP side channels. In 2015 IEEE Conference on Computer Communications (INFOCOM) , pages 1589–1597. IEEE, 2015. [3] Y. Angel and P. Winter. obfs4 (the obfourscator). , 2014. [4] Antirez. new tcp scan method. Posted to the bugtraq mailing list, 18 December 1998. [5] S. Axelsson. The base

Open access