2,437 research outputs found
Entropy Bounds for Traffic Confirmation
Consider an open MIX-based anonymity system with participants and a batch size of .
Assume a global passive adversary who targets a given participant Alice with a set of
communicating partners.
Let denote the entropy of as calculated by the adversary
given message sets (MIX batches) where Alice is a sender in each message set.
Our main result is to express the rate at which the anonymity of Alice
(as measured by )
degrades over time as a function of the main parameters , and
Random multi-index matching problems
The multi-index matching problem (MIMP) generalizes the well known matching
problem by going from pairs to d-uplets. We use the cavity method from
statistical physics to analyze its properties when the costs of the d-uplets
are random. At low temperatures we find for d>2 a frozen glassy phase with
vanishing entropy. We also investigate some properties of small samples by
enumerating the lowest cost matchings to compare with our theoretical
predictions.Comment: 22 pages, 16 figure
Measuring Information Leakage in Website Fingerprinting Attacks and Defenses
Tor provides low-latency anonymous and uncensored network access against a
local or network adversary. Due to the design choice to minimize traffic
overhead (and increase the pool of potential users) Tor allows some information
about the client's connections to leak. Attacks using (features extracted from)
this information to infer the website a user visits are called Website
Fingerprinting (WF) attacks. We develop a methodology and tools to measure the
amount of leaked information about a website. We apply this tool to a
comprehensive set of features extracted from a large set of websites and WF
defense mechanisms, allowing us to make more fine-grained observations about WF
attacks and defenses.Comment: In Proceedings of the 2018 ACM SIGSAC Conference on Computer and
Communications Security (CCS '18
New activity pattern in human interactive dynamics
We investigate the response function of human agents as demonstrated by
written correspondence, uncovering a new universal pattern for how the reactive
dynamics of individuals is distributed across the set of each agent's contacts.
In long-term empirical data on email, we find that the set of response times
considered separately for the messages to each different correspondent of a
given writer, generate a family of heavy-tailed distributions, which have
largely the same features for all agents, and whose characteristic times grow
exponentially with the rank of each correspondent. We furthermore show that
this universal behavioral pattern emerges robustly by considering weighted
moving averages of the priority-conditioned response-time probabilities
generated by a basic prioritization model. Our findings clarify how the range
of priorities in the inputs from one's environment underpin and shape the
dynamics of agents embedded in a net of reactive relations. These newly
revealed activity patterns might be present in other general interactive
environments, and constrain future models of communication and interaction
networks, affecting their architecture and evolution.Comment: 15 pages, 7 figure
- …