Categories
research security tor

Tor HTTP usage and Information Leakage

Abstract- This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how vulnerable Tor users are to sophisticated de-anonymization attacks: up to 78 % of the Tor users do not use Tor as suggested […]

Categories
research security tor

New publications coming up soon …

Our publications have been accepted at the IFIP CMS’2010 and the SEC 2010 conference. I will publish preprints soon.

Categories
ASE random security

Automated Social Engineering Bot – PASSAT 2009

I got a paper on my Automated Social Engineering Bot accepted at the PASSAT 2009 conference. I’ll post the camery-ready version soon. 🙂