Skip to main content

Showing 1–6 of 6 results for author: Pulls, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.09510  [pdf, other

    cs.CR

    Maybenot: A Framework for Traffic Analysis Defenses

    Authors: Tobias Pulls

    Abstract: End-to-end encryption is a powerful tool for protecting the privacy of Internet users. Together with the increasing use of technologies such as Tor, VPNs, and encrypted messaging, it is becoming increasingly difficult for network adversaries to monitor and censor Internet traffic. One remaining avenue for adversaries is traffic analysis: the analysis of patterns in encrypted traffic to infer infor… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

  2. arXiv:2011.13471  [pdf, other

    cs.CR

    Towards Effective and Efficient Padding Machines for Tor

    Authors: Tobias Pulls

    Abstract: Tor recently integrated a circuit padding framework for creating padding machines: defenses that work by defining state machines that inject dummy traffic to protect against traffic analysis attacks like Website Fingerprinting (WF) attacks. In this paper, we explore the design of effective and efficient padding machines to defend against WF attacks. Through the use of carefully crafted datasets, a… ▽ More

    Submitted 26 November, 2020; originally announced November 2020.

  3. arXiv:1806.08817  [pdf, other

    cs.CR

    Aggregation-Based Certificate Transparency Gossip

    Authors: Rasmus Dahlberg, Tobias Pulls, Jonathan Vestin, Toke Høiland-Jørgensen, Andreas Kassler

    Abstract: Certificate Transparency (CT) requires that every CA-issued TLS certificate must be publicly logged. While a CT log need not be trusted in theory, it relies on the assumption that every client observes and cryptographically verifies the same log. As such, some form of gossip mechanism is needed in practice. Despite CT being adopted by several major browser vendors, no gossip mechanism is widely de… ▽ More

    Submitted 18 April, 2019; v1 submitted 22 June, 2018; originally announced June 2018.

  4. arXiv:1711.03952  [pdf, other

    cs.CR

    Verifiable Light-Weight Monitoring for Certificate Transparency Logs

    Authors: Rasmus Dahlberg, Tobias Pulls

    Abstract: Trust in publicly verifiable Certificate Transparency (CT) logs is reduced through cryptography, gossip, auditing, and monitoring. The role of a monitor is to observe each and every log entry, looking for suspicious certificates that interest the entity running the monitor. While anyone can run a monitor, it requires continuous operation and copies of the logs to be inspected. This has lead to the… ▽ More

    Submitted 28 October, 2018; v1 submitted 10 November, 2017; originally announced November 2017.

  5. arXiv:1609.08187  [pdf, other

    cs.CR

    The Effect of DNS on Tor's Anonymity

    Authors: Benjamin Greschbach, Tobias Pulls, Laura M. Roberts, Philipp Winter, Nick Feamster

    Abstract: Previous attacks that link the sender and receiver of traffic in the Tor network ("correlation attacks") have generally relied on analyzing traffic from TCP connections. The TCP connections of a typical client application, however, are often accompanied by DNS requests and responses. This additional traffic presents more opportunities for correlation attacks. This paper quantifies how DNS traffic… ▽ More

    Submitted 11 October, 2016; v1 submitted 26 September, 2016; originally announced September 2016.

  6. arXiv:1305.3199  [pdf, other

    cs.CR

    ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship

    Authors: Philipp Winter, Tobias Pulls, Juergen Fuss

    Abstract: Deep packet inspection technology became a cornerstone of Internet censorship by facilitating cheap and effective filtering of what censors consider undesired information. Moreover, filtering is not limited to simple pattern matching but makes use of sophisticated techniques such as active probing and protocol classification to block access to popular circumvention tools such as Tor. In this pap… ▽ More

    Submitted 14 May, 2013; originally announced May 2013.