Jonathan Muehlstein

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
—Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the internet(More)
  • 1