Filters








2,886 Hits in 6.1 sec

Co-location Detection on the Cloud [chapter]

Mehmet Sinan İnci, Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
2016 Lecture Notes in Computer Science  
We demonstrate and compare three co-location detection methods namely, cooperative Last-Level Cache (LLC) covert channel, software profiling on the LLC and memory bus locking.  ...  Finally, we show that both cooperative and non-cooperative co-location to specific targets on cloud is still possible on major cloud services.  ...  Acknowledgments This work is supported by the National Science Foundation, under grants CNS-1318919 and CNS-1314770.  ... 
doi:10.1007/978-3-319-43283-0_2 fatcat:yebd452h35bcpmo63aqbklvdqm

All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking [article]

Muyuan Li, Haojin Zhu, Zhaoyu Gao, Si Chen, Kui Ren, Le Yu, Shangqian Hu
2013 arXiv   pre-print
Many popular location-based social networks (LBSNs) support built-in location-based social discovery with hundreds of millions of users around the world.  ...  These techniques are assumed to be secure and are exercised on the daily base. In this paper, we question the safety of these location-obfuscation techniques used by existing LBSNs.  ...  Note that, a tracking attacker may start with a target person in mind and exploit certain side-channel information of the target to help obtain the corresponding UID or user number.  ... 
arXiv:1310.2547v2 fatcat:czdocfimabhb5ej27to6oeksau

Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version) [article]

Clément Massart, François-Xavier Standaert
2019 IACR Cryptology ePrint Archive  
Inspired by the literature on side-channel attacks against cryptographic implementations, we describe a framework for the analysis of location privacy.  ...  It allows us to revisit (continuous) re-identification attacks with a combination of information theoretic and security metrics.  ...  François-Xavier Standaert is a Senior Research Associate of the Belgian Fund for Scientific Research (FNRS-F.R.S.).  ... 
dblp:journals/iacr/MassartS19 fatcat:uptyskemy5bqnpuzktgqe3bknu

Your Neighbors Are My Spies: Location and other Privacy Concerns in Dating Apps [article]

Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa
2016 arXiv   pre-print
Trilateration has recently become one of the well-known threat models to the user's location privacy in location-based applications (aka: location-based services or LBS), especially those containing highly  ...  and Grindr.  ...  Additionally, we introduce a side channel attack fashion that can be conducted due to current design of Jack'd.  ... 
arXiv:1604.07850v1 fatcat:ztf7ewqa4refrbwr64tzgxzrqq

LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks

Yu Seung Kim, Yuan Tian, Le T. Nguyen, Patrick Tague
2014 2014 IEEE Conference on Communications and Network Security  
Since APs are often named after the location, business, or affiliation of the host, an attacker can learn about nearby users and infer social connections.  ...  We demonstrate how LAPWiN can be implemented by modifying a widely used network manager and evaluate the performance and achievable privacy gains.  ...  Whenever C revisits this area and determines that it is located in l 3 , it will probe with the SSID of A.  ... 
doi:10.1109/cns.2014.6997512 dblp:conf/cns/KimTNT14 fatcat:c7mmr62jh5gwxhn4mtnug4cv4y

Transcending Sovereignty: Locating Indigenous Peoples in Transboundary Water Law

Jennifer L. Archer
2012 Social Science Research Network  
All people rely upon water for life. Indigenous peoples are especially vulnerable to water conflicts and yet lack recognition in international water law.  ...  ) a proposal for the reconstruction of transboundary water law in a manner that recognizes the internationally affirmed rights of Indigenous peoples.  ...  It is personal, spiritual and political. It is derived from harmonious relations and exploited for domination and oppression.  ... 
doi:10.2139/ssrn.1997539 fatcat:g52sl73nhbahfdghm5r74khgjy

Comparisons of auditorium acoustics measurements as a function of location in halls

John S. Bradley, A. C. Gade, Gary W. Siebein
1993 Journal of the Acoustical Society of America  
A comparison of binaural reflectograms for locations within each room were also made.  ...  For most measurements, no statistically significant differences were found between octave band IACC values for the two microphone locations.  ...  These data suggest that the auditory system is able to group vowel formants based on expected spectral location and use that for echo suppression.  ... 
doi:10.1121/1.406637 fatcat:qm3xseekvjgtpaucjdpbkm3o2y

Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications [article]

Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa
2016 pre-print
The threat model mainly bases on the publicly shown distance from a targeted victim to the adversary to pinpoint the victim's location.  ...  Trilateration is one of the well-known threat models to the user's location privacy in location-based apps, especially those contain highly sensitive information such as dating apps.  ...  ACKNOWLEDGMENT This work was supported by JSPS KAKENHI Grant Number 15K00423 and the Kayamori Foundation of Informational Science Advancement.  ... 
doi:10.13140/rg.2.1.3584.8081 arXiv:1604.08235v1 fatcat:zdk7yium6nggfkayfskz3f2ejy

Location Privacy in Automotive Telematics [chapter]

Muhammad Usman Iqbal, Samsung Lim
Geographic Information Systems  
However, this research looks beyond a solely technology-based solution. For example, the ethical implications of the use of GPS data in pricing models have not been fully understood.  ...  This thesis also evaluates the existing and potential inferential threats and vulnerabilities to develop security and privacy recommendations for privacy-aware pricing designs for tolls and insurance.  ...  This concept of postpaid anonymity CcUi also l)e taken one step further by exploiting developments in the field of telematics and rechux^ costs associated with maintaining road-side toll infrastructure  ... 
doi:10.4018/978-1-4666-2038-4.ch024 fatcat:acymtmmblndr5hpts65nthe3pu

Achieving guaranteed anonymity in time-series location data

Baik Hoh
2008
Prior privacy techniques for location data such as spatial cloaking techniques based on k-anonymity and best-effort algorithms do not meet both data quality and privacy requirements at the same time.  ...  In the first solution, we propose an uncertainty-aware path cloaking algorithm in a trustworthy privacy server that determines the release of user location updates based on tracking uncertainty and maximum  ...  , figure 8.9, and figure 8 .12 for the purposes of this study.  ... 
doi:10.7282/t3hh6kc5 fatcat:zwi4f6yjinhxbflfm3s3o25gzm

Proceedings of the 13th International Conference on Location-Based Services

S.N.
2016
We thank Brigitte Sonderegger for the recruitment of participants, our student assistants for support in the data collection and above all, our participants for their time and willingness to take part  ...  The research reported is based on the "Mobility, Activity, and Social Interactions Study" (MOASIS) conducted in cooperation between the URPP "Dynamics of Healthy Aging" and the Department of Geography,  ...  For example, users may search locations or check the current weather of tourist spots appeared on a travel channel using smartphones or tablets.  ... 
doi:10.5167/uzh-127276 fatcat:pq4zj44ta5cq7gx6lhvosh75ny

Automatic Quantification of Cache Side-Channels [chapter]

Boris Köpf, Laurent Mauborgne, Martín Ochoa
2012 Lecture Notes in Computer Science  
The latency gap between caches and main memory has been successfully exploited for recovering sensitive input to programs, such as cryptographic keys from implementation of AES and RSA.  ...  At the heart of our approach is a novel technique for efficient counting of concretizations of abstract cache states that enables us to connect state-of-the-art techniques for static cache analysis and  ...  for his help in exploring the Ab-sInt TimingExplorer, and Daniel Bernstein, Pierre Ganty, and Andrew Myers for helpful feedback and suggestions.  ... 
doi:10.1007/978-3-642-31424-7_40 fatcat:7lanj2x6hvcmbba57txgmucrq4

I Know Where You've Been: Geo-Inference Attacks via the Browser Cache

Yaoqi Jia, Xinshu Dong, Zhenkai Liang, Prateek Saxena
2015 IEEE Internet Computing  
In this paper, we demonstrate that such geolocation leakage channels are widely open in popular web applications today, including 62% of Alexa Top 100 websites.  ...  We also discuss whether existing defenses can effectively prevent such attacks and additional support required for a better defense deployment.  ...  We thank Chunwang Zhang, Hong Hu, and Shweta Shinde for their comments on an early presentation of this work. This work is supported by the Ministry of Education, Singapore under Grant No.  ... 
doi:10.1109/mic.2014.103 fatcat:p66nbov6tngcljbinymanr3jx4

High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction [article]

Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl
2018 IACR Cryptology ePrint Archive  
Leakage-Resilient Pseudo-Random Functions (LR-PRFs) aim at solving this by bounding side-channel leakage to non-exploitable levels through frequent re-keying.  ...  Achieving side-channel resistance through Leakage Resilience (LR) is highly relevant for embedded devices where requirements of other countermeasures such as e.g. high quality random numbers are hard to  ...  The work presented in this contribution was supported by the German Federal Ministry of Education and Research in the project ALESSIO through grant number 16KIS0629.  ... 
dblp:journals/iacr/UntersteinHSSS18 fatcat:fskgry2g6fby3cvqr7oqrv7k7e

Speculative Probing

Enes Göktas, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffrida
2020 Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security  
General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications  ...  that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study  ...  We would also like to thank the anonymous reviewers for their valuable feedback.  ... 
doi:10.1145/3372297.3417289 dblp:conf/ccs/GoktasRPBG20 fatcat:kxva6hqskbdktamnlo7d7qyflu
« Previous Showing results 1 — 15 out of 2,886 results