A Survey of Privacy Infrastructures and Their Vulnerabilities

12/15/2018
by   Tian Yunfan, et al.
0

Over the last two decades, the scale and complexity of Anonymous networks and its associated technologies grows exponentially as privacy has become a major concern of individuals. Also, some cyber attackers make use of privacy infrastructures including botnets and Tor to do illegal activities like drug, contraband or DDoS attack. However, anonymous networks are not perfect, there are some methods could exploit the vulnerabilities and track user information. In this paper, we analyze few of privacy infrastructures and their vulnerabilities.

READ FULL TEXT

page 1

page 2

page 3

research
12/28/2021

Common Privacy Weaknesses and Vulnerabilities in Software Applications

In this digital era, our privacy is under constant threat as our persona...
research
11/25/2014

Detecting fraudulent activity in a cloud using privacy-friendly data aggregates

More users and companies make use of cloud services every day. They all ...
research
01/25/2023

SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation

Every attack begins with gathering information about the target. The ent...
research
02/18/2020

Discovering ePassport Vulnerabilities using Bisimilarity

We uncover privacy vulnerabilities in the ICAO 9303 standard implemented...
research
07/30/2018

Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging

Over the last years, considerable attention has been given to the privac...
research
05/28/2019

Privacy Vulnerabilities of Dataset Anonymization Techniques

Vast amounts of information of all types are collected daily about peopl...
research
05/28/2018

The Coming Era of AlphaHacking?

With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, ...

Please sign up or login with your details

Forgot password? Click here to reset