2015
DOI: 10.1109/comst.2015.2453434
|View full text |Cite
|
Sign up to set email alerts
|

How to Find Hidden Users: A Survey of Attacks on Anonymity Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(22 citation statements)
references
References 31 publications
0
22
0
Order By: Relevance
“… Intersection: This attack is also known as a composition attack. It targets the system's privacy by gaining secondary information from the system [25], [112]. The attackers gather such information from third party sources or public records [113].…”
Section: ) Application Layer Attacksmentioning
confidence: 99%
“… Intersection: This attack is also known as a composition attack. It targets the system's privacy by gaining secondary information from the system [25], [112]. The attackers gather such information from third party sources or public records [113].…”
Section: ) Application Layer Attacksmentioning
confidence: 99%
“…In the works [4], [73], it is noted that while high-latency networks can provide good anonymity, the popularity of low-latency networks provides a more practical anonymity improvement. As found in [73], an attacker that can trick a user at the application layer to use Java applets, or similar, can bypass the proxy settings.…”
Section: P2p Network Analysismentioning
confidence: 99%
“…A possible way to overcome this problem is to have preinstalled and pre-configured software packages on smartphones or computers, and to generally increase the awareness of this privacy challenge, possible solutions, and the existence of easy-to-use integrated browser solutions. Unfortunately, even anonymous communication protocols may leak private information through various attacks [188], for example traffic correlation [189] or timing attacks [190].…”
Section: A Ubiquitous Connectivitymentioning
confidence: 99%