• Publications
  • Influence
Towards an Information Theoretic Metric for Anonymity
An alternative information theoretic measure of anonymity is proposed which takes into account the probabilities of users sending and receiving the messages and is shown how to calculate it for a message in a standard mix-based anonymity system. Expand
Low-cost traffic analysis of Tor
New traffic-analysis techniques are presented that allow adversaries with only a partial view of the network to infer which nodes are being used to relay the anonymous streams and therefore greatly reduce the anonymity provided by Tor, and it is shown that otherwise unrelated streams can be linked back to the same initiator. Expand
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
The technique, k-fingerprinting, performs better than current state-of-the-art attacks even against website fingerprinting defenses, and it is shown that it is possible to launch aWebsite fingerprinting attack in the face of a large amount of noisy data. Expand
Mixminion: design of a type III anonymous remailer protocol
Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters. Expand
Privacy-Friendly Aggregation for the Smart-Grid
Protocols that can be used to privately compute aggregate meter measurements over defined sets of meters, allowing for fraud and leakage detection as well as network management and further statistical processing of meter measurements, without revealing any additional information about the individual meter readings are presented. Expand
SybilInfer: Detecting Sybil Nodes using Social Networks
This work proves that, given standard constraints on the adversary, SybilInfer is secure, in that it successfully distinguishes between honest and dishonest nodes and is not susceptible to manipulation by the adversary. Expand
The Traffic Analysis of Continuous-Time Mixes
  • G. Danezis
  • Computer Science
  • Privacy Enhancing Technologies
  • 26 May 2004
The information-theoretic anonymity metrics are applied to continuous-time mixes, that individually delay messages instead of batching them, and as an example the exponential mix is analysed, simulated and shown to use the optimal strategy. Expand
Centrally Banked Cryptocurrencies
RSCoin is introduced, a cryptocurrency framework in which central banks maintain complete control over the monetary supply, but rely on a distributed set of authorities, or mintettes, to prevent double-spending. Expand
Prying Data out of a Social Network
This work examines the difficulty of collecting profile and graph information from the popular social networking website Facebook and describes several novel ways in which data can be extracted by third parties, and demonstrates the efficiency of these methods on crawled data. Expand
Generating steganographic images via adversarial training
This paper defines a game between three parties, Alice, Bob and Eve, and shows that adversarial training can produce robust steganographic techniques: the unsupervised training scheme produces a steganography algorithm that competes with state-of-the-art steganographers techniques. Expand