2014 11th International ISC Conference on Information Security and Cryptology 2014
DOI: 10.1109/iscisc.2014.6994050
|View full text |Cite
|
Sign up to set email alerts
|

Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Meanwhile, researchers also propose methods to enhance Tor's security by optimizing the bandwidth report for selecting guard nodes [73] and monitoring circuit construction [74]. Also, some recent Tor improvements consider generating cover traffic within middle routers of circuits, such that the middle routers can hide any relationship between compromised entry and exit nodes [75], [76]. TEE and SGX-Tor.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, researchers also propose methods to enhance Tor's security by optimizing the bandwidth report for selecting guard nodes [73] and monitoring circuit construction [74]. Also, some recent Tor improvements consider generating cover traffic within middle routers of circuits, such that the middle routers can hide any relationship between compromised entry and exit nodes [75], [76]. TEE and SGX-Tor.…”
Section: Related Workmentioning
confidence: 99%