enter search term and/or author name
Effectiveness and detection of denial-of-service attacks in tor
Norman Danner, Sam Defabbia-Kane, Danny Krizanc, Marc Liberatore
Article No.: 11
Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al.  proposed a denial-of-service-based attack on Tor (and related systems) that significantly increases the probability of...
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity
Michael Brennan, Sadia Afroz, Rachel Greenstadt
Article No.: 12
The use of stylometry, authorship recognition through purely linguistic means, has contributed to literary, historical, and criminal investigation breakthroughs. Existing stylometry research assumes that authors have not attempted to disguise...
Dynamic enforcement of abstract separation of duty constraints
David Basin, Samuel J. Burri, Günter Karjoth
Article No.: 13
Separation of Duties (SoD) aims at preventing fraud and errors by distributing tasks and associated authorizations among multiple users. Li and Wang  proposed an algebra (SoDA) for specifying SoD requirements, which is both expressive in the...
Probabilistic analysis of onion routing in a black-box model
Joan Feigenbaum, Aaron Johnson, Paul Syverson
Article No.: 14
We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable (UC) framework that abstracts the essential properties of onion routing in the presence...