Technical privacy metrics: a systematic survey

I Wagner, D Eckhoff - ACM Computing Surveys (Csur), 2018 - dl.acm.org
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …

Privacy and confidentiality in process mining: Threats and research challenges

G Elkoumy, SA Fahrenkrog-Petersen, MF Sani… - ACM Transactions on …, 2021 - dl.acm.org
Privacy and confidentiality are very important prerequisites for applying process mining to
comply with regulations and keep company secrets. This article provides a foundation for …

Deepcorr: Strong flow correlation attacks on tor using deep learning

M Nasr, A Bahramali, A Houmansadr - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …

Tarzan: A peer-to-peer anonymizing network layer

MJ Freedman, R Morris - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
Tarzan is a peer-to-peer anonymous IP network overlay. Because it provides IP service,
Tarzan is general-purpose and transparent to applications. Organized as a decentralized …

Towards measuring anonymity

C Diaz, S Seys, J Claessens, B Preneel - International Workshop on …, 2002 - Springer
This paper introduces an information theoretic model that allows to quantify the degree of
anonymity provided by schemes for anonymous connections. It considers attackers that …

Inferring the source of encrypted HTTP connections

M Liberatore, BN Levine - Proceedings of the 13th ACM conference on …, 2006 - dl.acm.org
We examine the effectiveness of two traffic analysis techniques for identifying encrypted
HTTP streams. The techniques are based upon classification algorithms, identifying …

Low-resource routing attacks against Tor

K Bauer, D McCoy, D Grunwald, T Kohno… - Proceedings of the 2007 …, 2007 - dl.acm.org
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its
popularity is due in part to its perceived strong anonymity properties and its relatively low …

Locating hidden servers

L Overlier, P Syverson - 2006 IEEE Symposium on Security and …, 2006 - ieeexplore.ieee.org
Hidden services were deployed on the Tor anonymous communication network in 2004.
Announced properties include server resistance to distributed DoS. Both the EFF and …

Timing analysis in low-latency mix networks: Attacks and defenses

V Shmatikov, MH Wang - … –ESORICS 2006: 11th European Symposium on …, 2006 - Springer
Mix networks are a popular mechanism for anonymous Internet communications. By routing
IP traffic through an overlay chain of mixes, they aim to hide the relationship between its …

Timing attacks in low-latency mix systems

BN Levine, MK Reiter, C Wang, M Wright - … , FC 2004, Key West, FL, USA …, 2004 - Springer
A mix is a communication proxy that attempts to hide the correspondence between its
incoming and outgoing messages. Timing attacks are a significant challenge for mix-based …