May 9, 2022, 1:20 a.m. | Mona Wang, Anunay Kulshrestha, Liang Wang, Prateek Mittal

cs.CR updates on arXiv.org arxiv.org

Network-level adversaries have developed increasingly sophisticated
techniques to surveil and control users' network traffic. In this paper, we
exploit our observation that many encrypted protocol connections are no longer
tied to device IP address (e.g., the connection migration feature in QUIC, or
IP roaming in WireGuard and Mosh), due to the need for performance in a
mobile-first world. We design and implement a novel framework, Connection
Migration Powered Splitting (CoMPS), that utilizes these performance features
for enhancing user privacy. With …

migration privacy traffic

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Director, Data Security Lead

@ Mastercard | London, England (Angel Lane)

Security Officer L1

@ NTT DATA | Texas, United States of America

Sr. Staff Application Security Engineer

@ Aurora Innovation | Seattle, WA

Senior Penetration Testing Engineer

@ WPP | Chennai

Cyber Security - Senior Software Developer in Test

@ BlackBerry | Bengaluru, Residency Road