Exposing invisible timing-based traffic watermarks with BACKLIT
- 5 December 2011
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 197-206
- https://doi.org/10.1145/2076732.2076760
Abstract
No abstract availableFunding Information
- National Science Foundation (831300)
- Office of Naval Research (N000140710907N000140911042)
- Hong Kong Polytechnic University (G-U386)
- U.S. Department of Homeland Security (FA8750-08-2-0141)
This publication has 20 references indexed in Scilit:
- A First Step towards Live Botmaster TracebackLecture Notes in Computer Science, 2008
- Studying Timing Analysis on the Internet with SubRosaLecture Notes in Computer Science, 2008
- Analysis of internet backbone traffic and header anomalies observedPublished by Association for Computing Machinery (ACM) ,2007
- Timing Analysis in Low-Latency Mix Networks: Attacks and DefensesLecture Notes in Computer Science, 2006
- Measuring the evolution of transport protocols in the internetACM SIGCOMM Computer Communication Review, 2005
- A Study of Burstiness in TCP FlowsLecture Notes in Computer Science, 2005
- Packet-Dispersion Techniques and a Capacity-Estimation MethodologyIEEE/ACM Transactions on Networking, 2004
- Detection of Interactive Stepping Stones: Algorithms and Confidence BoundsLecture Notes in Computer Science, 2004
- Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delaysPublished by Association for Computing Machinery (ACM) ,2003
- Passive estimation of TCP round-trip timesACM SIGCOMM Computer Communication Review, 2002