skip to main content
Article
Free access

Timing attacks on Web privacy

Published: 01 November 2000 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    ALBITZ,P.,AND LIU,C.DNS and BIND, third ed. O'Reilly and Associates, 1998.
    [2]
    ANONYMIZER. Web site at http://www.anonymizer.com.
    [3]
    GABBER, E., GIBBONS,P.,MATIAS,Y.,AND MAYER,A. How to make personalized web browsing simple, secure, and anonymous. In Proc. of Financial Cryptography '97 (1997).
    [4]
    MARTIN JR., D. M., RAJAGOPALAN, S., AND RUBIN, A. D. Blocking Java applets at the firewall. In Proc. of Internet Society Symposium on Network and Distributed System Security (1997).
    [5]
    NETSCAPE COMMUNICATIONS. Persistent client state: HTTP cookies. Web site at http://home.netscape.com/newsref/std/cookie spec.html.
    [6]
    REITER, M. K., AND RUBIN, A. D. Crowds: Anonymity for web transactions. ACM Trans. on Information and System Security 1, 1 (June 1998).
    [7]
    The squid web proxy cache. Web site at http://squid.nlanr.net.
    [8]
    VOELKER, G. Personal communication.
    [9]
    WOLMAN, A., VOELKER, G., SHARMA, N., CARDWELL, N., BROWN, M., LANDRAY,T.,PINNEL, D., KARLIN, A., AND LEVY, H. Organization-based analysis of web-object sharing and caching. In Proc. of Second USENIX Symp. on Internet Technologies and Systems (Oct. 1999), pp. 25-36.
    [10]
    ZERO KNOWLEDGE SYSTEMS. Freedom 1.0. Web site at http://www.freedom.net.

    Cited By

    View all
    • (2024)Extent of spending behavior, problems encountered, and financial knowledge across generational cohorts among state universities and colleges employeesInternational Journal of ADVANCED AND APPLIED SCIENCES10.21833/ijaas.2024.02.02411:2(230-237)Online publication date: Feb-2024
    • (2023)Pool-partyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620634(7091-7105)Online publication date: 9-Aug-2023
    • (2023)A Survey on Performance Evaluation Mechanisms for Privacy-Aware Web Search SchemesProtecting User Privacy in Web Search Utilization10.4018/978-1-6684-6914-9.ch002(26-45)Online publication date: 3-Mar-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '00: Proceedings of the 7th ACM conference on Computer and Communications Security
    November 2000
    255 pages
    ISBN:1581132034
    DOI:10.1145/352600
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 November 2000

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    CCS00
    Sponsor:
    • SIGSAC
    • Greek Com Soc
    • Athens U of Econ & Business

    Acceptance Rates

    CCS '00 Paper Acceptance Rate 28 of 132 submissions, 21%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)381
    • Downloads (Last 6 weeks)60

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Extent of spending behavior, problems encountered, and financial knowledge across generational cohorts among state universities and colleges employeesInternational Journal of ADVANCED AND APPLIED SCIENCES10.21833/ijaas.2024.02.02411:2(230-237)Online publication date: Feb-2024
    • (2023)Pool-partyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620634(7091-7105)Online publication date: 9-Aug-2023
    • (2023)A Survey on Performance Evaluation Mechanisms for Privacy-Aware Web Search SchemesProtecting User Privacy in Web Search Utilization10.4018/978-1-6684-6914-9.ch002(26-45)Online publication date: 3-Mar-2023
    • (2023)When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the WildProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627186(44-55)Online publication date: 4-Dec-2023
    • (2023)Quantifying and Mitigating Cache Side Channel Leakage with Differential SetProceedings of the ACM on Programming Languages10.1145/36228507:OOPSLA2(1470-1498)Online publication date: 16-Oct-2023
    • (2023)The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179311(2744-2760)Online publication date: May-2023
    • (2023)Time Will Tell: Exploiting Timing Leaks Using HTTP Response HeadersComputer Security – ESORICS 202310.1007/978-3-031-51476-0_1(3-22)Online publication date: 25-Sep-2023
    • (2023)Timed Non-interference Under Partial Observability and Bounded MemoryFormal Modeling and Analysis of Timed Systems10.1007/978-3-031-42626-1_8(122-137)Online publication date: 29-Aug-2023
    • (2022)A Countermeasure Approach for Brute-Force Timing Attacks on Cache Privacy in Named Data Networking ArchitecturesElectronics10.3390/electronics1108126511:8(1265)Online publication date: 16-Apr-2022
    • (2022)Timed Automata as a Formalism for Expressing Security: A Survey on Theory and PracticeACM Computing Surveys10.1145/353496755:6(1-36)Online publication date: 7-Dec-2022
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media