Author of the publication

Cover your ACKs: pitfalls of covert channel censorship circumvention.

, , and . ACM Conference on Computer and Communications Security, page 361-372. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Location leaks over the GSM air interface., , , and . NDSS, The Internet Society, (2012)Shadow: Running Tor in a Box for Accurate and Efficient Experimentation., and . NDSS, The Internet Society, (2012)Losing Control of the Internet: Using the Data Plane to Attack the Control Plane., , , , , and . NDSS, The Internet Society, (2011)Accurate and Provably Secure Latency Estimation with Treeple., and . NDSS, The Internet Society, (2011)p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning., , and . Proc. Priv. Enhancing Technol., 2019 (3): 191-209 (2019)On the effectiveness of k;-anonymity against traffic analysis and surveillance., and . WPES, page 9-18. ACM, (2006)On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design., and . WPES, page 31-40. ACM, (2009)MP3: A More Efficient Private Presence Protocol., , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 38-57. Springer, (2018)Laserbeak: Evolving Website Fingerprinting Attacks With Attention and Multi-Channel Feature Representation., , , and . IEEE Trans. Inf. Forensics Secur., (2024)From Weak to Strong Watermarking., , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 362-382. Springer, (2007)