all InfoSec news
Minimizing Information Leakage under Padding Constraints. (arXiv:2209.04379v1 [cs.CR])
Sept. 12, 2022, 1:20 a.m. | Sebastian Simon, Cezara Petrui, Carlos Pinzón, Catuscia Palamidessi
cs.CR updates on arXiv.org arxiv.org
An attacker can gain information of a user by analyzing its network traffic.
The size of transferred data leaks information about the file being transferred
or the service being used, and this is particularly revealing when the attacker
has background knowledge about the files or services available for transfer. To
prevent this, servers may pad their files using a padding scheme, changing the
file sizes and preventing anyone from guessing their identity uniquely. This
work focuses on finding optimal padding …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Regional Leader, Cyber Crisis Communications
@ Google | United Kingdom
Regional Intelligence Manager, Compliance, Safety and Risk Management
@ Google | London, UK
Senior Analyst, Endpoint Security
@ Scotiabank | Toronto, ON, CA, M1K5L1
Software Engineer, Security/Privacy, Google Cloud
@ Google | Bengaluru, Karnataka, India
Senior Security Engineer
@ Coinbase | Remote - USA