DeepAI AI Chat
Log In Sign Up

A Survey of Privacy Infrastructures and Their Vulnerabilities

12/15/2018
by   Tian Yunfan, et al.
Northeastern University
0

Over the last two decades, the scale and complexity of Anonymous networks and its associated technologies grows exponentially as privacy has become a major concern of individuals. Also, some cyber attackers make use of privacy infrastructures including botnets and Tor to do illegal activities like drug, contraband or DDoS attack. However, anonymous networks are not perfect, there are some methods could exploit the vulnerabilities and track user information. In this paper, we analyze few of privacy infrastructures and their vulnerabilities.

READ FULL TEXT

page 1

page 2

page 3

12/28/2021

Common Privacy Weaknesses and Vulnerabilities in Software Applications

In this digital era, our privacy is under constant threat as our persona...
11/25/2014

Detecting fraudulent activity in a cloud using privacy-friendly data aggregates

More users and companies make use of cloud services every day. They all ...
01/25/2023

SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation

Every attack begins with gathering information about the target. The ent...
02/18/2020

Discovering ePassport Vulnerabilities using Bisimilarity

We uncover privacy vulnerabilities in the ICAO 9303 standard implemented...
07/30/2018

Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging

Over the last years, considerable attention has been given to the privac...
05/28/2019

Privacy Vulnerabilities of Dataset Anonymization Techniques

Vast amounts of information of all types are collected daily about peopl...
05/28/2018

The Coming Era of AlphaHacking?

With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, ...