5 Hits in 4.3 sec

Peel the onion: Recognition of Android apps behind the Tor Network [article]

Emanuele Petagna and Giuseppe Laurenza and Claudio Ciccotelli and Leonardo Querzoni
2019 arXiv   pre-print
In this work we show that Tor is vulnerable to app deanonymization attacks on Android devices through network traffic analysis.  ...  that highlights Tor vulnerability to apps deanonymization attacks on Android devices.  ...  Another improvement to this work may be to enlarge the datasets with a richer set of apps.  ... 
arXiv:1901.04434v1 fatcat:slufndkdlzebzl53q7wsvlyvyu

Statistical Inference, Learning and Models in Big Data

Beate Franke, Jean-François Plante, Ribana Roscher, En-shiun Annie Lee, Cathal Smyth, Armin Hatefi, Fuqi Chen, Einat Gil, Alexander Schwing, Alessandro Selvitella, Michael M. Hoffman, Roger Grosse (+2 others)
2016 International Statistical Review  
This paper gives an overview of the topics covered, describing challenges and strategies that seem common to many different areas of application, and including some examples of applications to make these  ...  of the Canadian Statistical Sciences Institute, with major funding from, and most activities located at, the Fields Institute for Research in Mathematical Sciences.  ...  The Fields Institute is funded by the Natural Sciences and Engineering Research Council of Canada and the Ministry of Training, Colleges and Universities in Ontario.  ... 
doi:10.1111/insr.12176 fatcat:cwweasntvbcsfbm2nnpwwwmojy

DIgital Security and Source Protection for Journalists

Susan E. McGregor
First and second, I present overviews of the current state of law and technology as they exist in and shape the realities of digital communications, privacy, and security with a focus on the needs of source  ...  In order to maintain the confidence of–and therefore the access to–our sources, it is imperative that the journalistic profession as a whole develops a coherent set of professional practices around their  ...  Enter Tor, or "the onion router."  ... 
doi:10.7916/d89p3d4m fatcat:hqh3wrha4fc2zcta6qzrfbezhy

An empirical evaluation of misconfiguration in Internet services [article]

Tobias Fiebig, Technische Universität Berlin, Technische Universität Berlin, Anja Feldmann
In this thesis we empirically investigate the nature of security misconfigurations.  ...  In fact, there is a constant stream of new, complex techniques to ensure the confidentiality, integrity, and availability of data and systems.  ...  (Spring, 2016) Users of .onion (TOR hidden service websites) were ex-posed due to installed Apache modules. Unknown TOR Webserver ?  ... 
doi:10.14279/depositonce-6140 fatcat:lvw4geuxrrgfhi3ms3t7m6pkl4

The Future of Law and eTechnologies The Future of Law and eTechnologies

Tanel Kerikmäe, Addi, Rull Editors, Tanel Kerikmäe, Addi Rull
For example, a pattern of an experienced scammer during profile establishment may be to do so using a Tor Browser that anonymises the communication to a social networking site through a so-called Onion  ...  An interesting example is 3DprinterOS represented in Fig. 8-a cloud-based open operating system for 3D printers. 74 It is like an Android for 3D printers but runs its apps in the cloud.  ...  According to the Estonian Family Law Act, 14 marriage is contracted in the presence of a registry official of a vital statistics office (registrar 15 ). 16 Procedure begins by the presentation of  ...