Sept. 12, 2022, 1:20 a.m. | Sebastian Simon, Cezara Petrui, Carlos Pinzón, Catuscia Palamidessi

cs.CR updates on arXiv.org arxiv.org

An attacker can gain information of a user by analyzing its network traffic.
The size of transferred data leaks information about the file being transferred
or the service being used, and this is particularly revealing when the attacker
has background knowledge about the files or services available for transfer. To
prevent this, servers may pad their files using a padding scheme, changing the
file sizes and preventing anyone from guessing their identity uniquely. This
work focuses on finding optimal padding …

constraints information information leakage under

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Regional Leader, Cyber Crisis Communications

@ Google | United Kingdom

Regional Intelligence Manager, Compliance, Safety and Risk Management

@ Google | London, UK

Senior Analyst, Endpoint Security

@ Scotiabank | Toronto, ON, CA, M1K5L1

Software Engineer, Security/Privacy, Google Cloud

@ Google | Bengaluru, Karnataka, India

Senior Security Engineer

@ Coinbase | Remote - USA