Entry Mittal:2012:ILS from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Mittal:2012:ILS,
  author =       "Prateek Mittal and Nikita Borisov",
  title =        "Information Leaks in Structured Peer-to-Peer Anonymous
                 Communication Systems",
  journal =      j-TISSEC,
  volume =       "15",
  number =       "1",
  pages =        "5:1--5:??",
  month =        mar,
  year =         "2012",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2133375.2133380",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Sat Mar 24 09:45:43 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We analyze information leaks in the lookup mechanisms
                 of structured peer-to-peer (P2P) anonymous
                 communication systems and how these leaks can be used
                 to compromise anonymity. We show that the techniques
                 used to combat active attacks on the lookup mechanism
                 dramatically increase information leaks and the
                 efficacy of passive attacks, resulting in a tradeoff
                 between robustness to active and passive attacks. We
                 study this tradeoff in two P2P anonymous systems: Salsa
                 and AP3. In both cases, we find that, by combining both
                 passive and active attacks, anonymity can be
                 compromised much more effectively than previously
                 thought, rendering these systems insecure for most
                 proposed uses. Our results hold even if security
                 parameters are changed or other improvements to the
                 systems are considered. Our study, therefore, shows the
                 importance of considering these attacks in P2P
                 anonymous communication.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries