Jan. 20, 2023, 2:10 a.m. | Jeppe Fredsgaard Blaabjerg, Aslan Askarrov

cs.CR updates on arXiv.org arxiv.org

Traffic analysis attacks remain a significant problem for online security.
Communication between nodes can be observed by network level attackers as it
inherently takes place in the open. Despite online services increasingly using
encrypted traffic, the shape of the traffic is not hidden. To prevent traffic
analysis, the shape of a system's traffic must be independent of secrets. We
investigate adapting the data-oblivious approach the reactive setting and
present OblivIO, a secure language for writing reactive programs driven by
network …

analysis attackers attacks communication data encrypted encrypted traffic hidden network nodes oblivious online security online services problem secrets security services system traffic traffic analysis

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Solution Architect

@ Civica | London, England, United Kingdom

Information Security Officer (80-100%)

@ SIX Group | Zurich, CH

Cloud Information Systems Security Engineer

@ Analytic Solutions Group | Chantilly, Virginia, United States

SRE Engineer & Security Software Administrator

@ Talan | Mexico City, Spain