Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
The disadvantages of free MIX routes and how to overcome them
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
A Reputation System to Increase MIX-Net Reliability
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Reliable MIX cascade networks through reputation
FC'02 Proceedings of the 6th international conference on Financial cryptography
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Heartbeat traffic to counter (n-1) attacks: red-green-black mixes
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Minx: a simple and efficient anonymous packet format
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
The pynchon gate: a secure method of pseudonymous mail retrieval
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Timing channels, anonymity, mixes, and spikes
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Large-scale collection and sanitization of network security data: risks and challenges
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Analysis of flow-correlation attacks in anonymity network
International Journal of Security and Networks
Privacy preservation services: challenges and solutions
Proceedings of the 2008 ACM symposium on Applied computing
A holistic anonymity framework for web services
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
On the Impact of Social Network Profiling on Anonymity
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Studying Timing Analysis on the Internet with SubRosa
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Bridging and Fingerprinting: Epistemic Attacks on Route Selection
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
How to Bypass Two Anonymity Revocation Schemes
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
Financial Cryptography and Data Security
C-Mix: A Lightweight Anonymous Routing Approach
Information Hiding
An HMM Approach to Anonymity Analysis of Continuous Mixes
Advanced Web and NetworkTechnologies, and Applications
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Privatizing constraint optimization
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
Compromising anonymous communication systems using blind source separation
ACM Transactions on Information and System Security (TISSEC)
Hashing it out in public: common failure modes of DHT-based anonymity schemes
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Noisy timing channels with binary inputs and outputs
IH'06 Proceedings of the 8th international conference on Information hiding
A fresh look at the generalised mix framework
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Low-latency Mix Using Split and Merge Operations
Journal of Network and Systems Management
A practical congestion attack on tor using long paths
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Dissent: accountable anonymous group messaging
Proceedings of the 17th ACM conference on Computer and communications security
Putting together QoS and security in autonomic pervasive systems
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Pool-based anonymous communication framework for high-performance computing
The Journal of Supercomputing
Anonymity attacks on mix systems: a formal analysis
IH'11 Proceedings of the 13th international conference on Information hiding
Statistical disclosure or intersection attacks on anonymity systems
IH'04 Proceedings of the 6th international conference on Information Hiding
Reasoning about the anonymity provided by pool mixes that generate dummy traffic
IH'04 Proceedings of the 6th international conference on Information Hiding
Anonymity and covert channels in simple timed mix-firewalls
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Practical traffic analysis: extending and resisting statistical disclosure
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
The traffic analysis of continuous-time mixes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Synchronous batching: from cascades to free routes
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On the PET workshop panel “mix cascades versus peer-to-peer: is one concept superior?”
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
On blending attacks for mixes with memory
IH'05 Proceedings of the 7th international conference on Information Hiding
Local view attack on anonymous communication
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Blending different latency traffic with alpha-mixing
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Towards practical attacker classification for risk analysis in anonymous communication
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Message splitting against the partial adversary
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Towards modeling wireless location privacy
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
Protocol-level attacks against Tor
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the limits of provable anonymity
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Conscript your friends into larger anonymity sets with JavaScript
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
The literature contains a variety of different mixes, some of which have been used in deployed anonymity systems. We explore their anonymity and message delay properties, and show how to mount active attacks against them by altering the traffic between the mixes. We show that if certain mixes are used, such attacks cannot destroy the anonymity of a particular message completely. We work out the cost of these attacks in terms of the number of messages the attacker must insert into the network and the time he must spend. We discuss advantages and disadvantages of these mixes and the settings in which their use is appropriate. Finally, we look at dummy traffic and SG mixes as other promising ways of protecting against the attacks, point out potential weaknesses in existing designs, and suggest improvements.