Beauty and the burst: Remote identification of encrypted video streams

R Schuster, V Shmatikov, E Tromer - 26th USENIX Security Symposium …, 2017 - usenix.org
The MPEG-DASH streaming video standard contains an information leak: even if the stream
is encrypted, the segmentation prescribed by the standard causes content-dependent …

Quantifying the information leakage in timing side channels in deterministic work-conserving schedulers

X Gong, N Kiyavash - IEEE/ACM Transactions on Networking, 2015 - ieeexplore.ieee.org
When multiple job processes are served by a single scheduler, the queueing delays of one
process are often affected by the others, resulting in a timing side channel that leaks the …

Anonymity of memory-limited Chaum mixes under timing analysis: An information theoretic perspective

P Venkitasubramaniam, A Mishra - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Anonymous communication, where users communicate without revealing the identities of
communicating parties or the paths of data flow is critical in data networks. On the Internet …

Delay anonymity tradeoff in mix networks: Optimal routing

O Javidbakht… - IEEE/ACM Transactions …, 2017 - ieeexplore.ieee.org
Anonymous systems on the Internet aim to protect users from revealing to an external
unauthorized entity their identities and their network activities. Despite using layered …

A covert queueing channel in round robin schedulers

AE Ghassami, A Yekkehkhany, N Kiyavash - arXiv preprint arXiv …, 2017 - arxiv.org
We study a covert queueing channel (CQC) between two users sharing a round robin
scheduler. Such a covert channel can arise when users share a resource such as a …

Preventing timing analysis in networks: A statistical inference perspective

S Kadloor, P Venkitasubramaniam… - IEEE Signal …, 2013 - ieeexplore.ieee.org
Information security requires the protection of not only the contents of data transmitted but
also the timing of network operations. Knowledge of timing alone can reveal to an adversary …

Proportional fair rate allocation for private shared networks

S Feghhi, DJ Leith, M Karzand - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks
by an eavesdropper. We initiate the study of the joint trade-off between privacy, throughput …

Information leakage in arbiter protocols

N Tsiskaridze, L Bang, J McMahan, T Bultan… - … for Verification and …, 2018 - Springer
Resource sharing while preserving privacy is an increasingly important problem due to a
wide-scale adoption of cloud computing. Under multitenancy, it is common to have multiple …

[PDF][PDF] A statistical inference perspective on preventing timing analysis in networks

S Kadloor, P Venkitasubramaniam, N Kiyavash - publish.illinois.edu
Abstract Information security requires the protection of, not only the contents of data
transmitted, but also the timing of packet transmissions in a network. Knowledge of timing …

Learning from expert advice framework: Algorithms and applications

A Truong - 2018 - ideals.illinois.edu
Abstract" Online recommendation systems have been widely used by retailers, digital
marketing, and especially in e-commerce applications. Popular sites such as Netflix and …