Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Edmundson, Anne"'
Autor:
Winter, Philipp, Edmundson, Anne, Roberts, Laura M., Dutkowska-Zuk, Agnieszka, Chetty, Marshini, Feamster, Nick
Publikováno v:
USENIX Security Symposium, Baltimore, Maryland, August 2018
Onion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names that are lon
Externí odkaz:
http://arxiv.org/abs/1806.11278
Virtually every Internet communication typically involves a Domain Name System (DNS) lookup for the destination server that the client wants to communicate with. Operators of DNS recursive resolvers---the machines that receive a client's query for a
Externí odkaz:
http://arxiv.org/abs/1806.00276
As publishers increasingly use Content Distribution Networks (CDNs) to distribute content across geographically diverse networks, CDNs themselves are becoming unwitting targets of requests for both access to user data and content takedown. From copyr
Externí odkaz:
http://arxiv.org/abs/1711.01478
Tor is vulnerable to network-level adversaries who can observe both ends of the communication to deanonymize users. Recent work has shown that Tor is susceptible to the previously unknown active BGP routing attacks, called RAPTOR attacks, which expos
Externí odkaz:
http://arxiv.org/abs/1704.00843
An increasing number of countries are passing laws that facilitate the mass surveillance of Internet traffic. In response, governments and citizens are increasingly paying attention to the countries that their Internet traffic traverses. In some case
Externí odkaz:
http://arxiv.org/abs/1605.07685
Autor:
Sun, Yixin, Edmundson, Anne, Vanbever, Laurent, Li, Oscar, Rexford, Jennifer, Chiang, Mung, Mittal, Prateek
The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the
Externí odkaz:
http://arxiv.org/abs/1503.03940
Publikováno v:
Evidence-Based Communication Assessment & Intervention; Sep2019, Vol. 13 Issue 3, p107-135, 29p, 1 Chart
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Edmundson, Anne, Holtkamp, Brian, Rivera, Emanuel, Finifter, Matthew, Mettler, Adrian, Wagner, David
Publikováno v:
Engineering Secure Software & Systems (9783642365621); 2013, p197-212, 16p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.