Slotted Packet Counting Attacks on Anonymity Protocols


In this paper we present a slotted packet counting attack against anonymity protocols. Common packet counting attacks make strong assumptions on the setup and can easily lead to wrong conclusions, as we will show in our work. To overcome these limitations, we account for the variation of tra c load over time. We use correlation to express the relation… (More)


6 Figures and Tables

Cite this paper

@inproceedings{Fusenig2009SlottedPC, title={Slotted Packet Counting Attacks on Anonymity Protocols}, author={Volker Fusenig and Eugen Staab and Ulrich K. Sorger and Thomas Engel}, booktitle={AISC}, year={2009} }