Anonymous Web transactions with Crowds
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead
Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Low-Cost Traffic Analysis of Tor
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Fundamental Limits on the Anonymity Provided by the MIX Technique
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Denial of service or denial of security?
Proceedings of the 14th ACM conference on Computer and communications security
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
On the Impact of Social Network Profiling on Anonymity
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Information leaks in structured peer-to-peer anonymous communication systems
Proceedings of the 15th ACM conference on Computer and communications security
Prying Data out of a Social Network
ASONAM '09 Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining
More Anonymous Onion Routing Through Trust
CSF '09 Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium
Sphinx: A Compact and Provably Secure Mix Format
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
The bayesian traffic analysis of mix networks
Proceedings of the 16th ACM conference on Computer and communications security
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Sampled traffic analysis by internet-exchange-level adversaries
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
On the security of the tor authentication protocol
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Evolution of social-attribute networks: measurements, modeling, and implications using google+
Proceedings of the 2012 ACM conference on Internet measurement conference
Dynamix: anonymity on dynamic social structures
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
SGor: Trust graph based onion routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The system uses a relay based anonymization mechanism where circuits are routed over a social network in a peer-to-peer fashion, using full padding strategies and separate epochs to hide connection and disconnection events. Unlike established systems, Drac gives away the identity of a user's friends to guarantee the unobservability of actual calls, while still providing anonymity when talking to untrusted third parties. We present the core design and components of Drac, we discuss the key ways in which it challenges our current concepts of anonymity and provide an initial simulation-based security analysis.