2022
DOI: 10.1007/978-3-030-95312-6_15
|View full text |Cite
|
Sign up to set email alerts
|

On Fingerprinting Attacks and Length-Hiding Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…We used several methods to learn about Simply Voting's application configuration. We performed an SSL test 6 to determine their supported and preferred encryption methods and analyzed the server headers sent to us while interacting with the demo application. We were able to determine the following relevant information about their server configuration:…”
Section: Technical Implementation Of the Server Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…We used several methods to learn about Simply Voting's application configuration. We performed an SSL test 6 to determine their supported and preferred encryption methods and analyzed the server headers sent to us while interacting with the demo application. We were able to determine the following relevant information about their server configuration:…”
Section: Technical Implementation Of the Server Applicationmentioning
confidence: 99%
“…Much discussion exists on the mitigation of length-based fingerprinting attacks, including adding padding to ensure the response is always of a fixed length. Gellert et al describe such as scheme as "perfect length-hiding padding", but also outline major performance tradeoffs [6].…”
Section: Fixed-length Responsesmentioning
confidence: 99%