Proceedings of the 21st Workshop on Privacy in the Electronic Society 2022
DOI: 10.1145/3559613.3563199
|View full text |Cite
|
Sign up to set email alerts
|

Splitting Hairs and Network Traces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 24 publications
0
0
0
Order By: Relevance
“…The UI mock-ups were designed according to the use case scenario described in Section 2.2 and based on earlier designs in the project PAPAYA [8]. In Figure 2, we present three screens from the UI mock-ups 1 .…”
Section: Ui Mock-up Walk-throughsmentioning
confidence: 99%
“…The UI mock-ups were designed according to the use case scenario described in Section 2.2 and based on earlier designs in the project PAPAYA [8]. In Figure 2, we present three screens from the UI mock-ups 1 .…”
Section: Ui Mock-up Walk-throughsmentioning
confidence: 99%
“…The split-based solutions do achieve subflow unlinkability to some extent. However, a recent study from Beckerle et al [6] performs a critical evaluation of splitting-based defenses, and demonstrates that the defenses are less effective once the adversary is able to observe the vast majority of traffic. Beckerle et al [6] develop novel Maturesc attacks against existing splittingbased defenses that can achieve good accuracy.…”
Section: Related Workmentioning
confidence: 99%