Camouflaged private communication

Amir Herzberg, Ely Porat, Nir Soffer, Erez Waisbard

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Communication such as web browsing is often monitored and restricted by organizations and governments. Users who wish to bypass the monitoring and restrictions often relay their (encrypted) communication via proxy servers or anonymizing networks such as Tor. While this type of solution allows users to hide the content of their communication and often bypass the restrictions, the mere use of a proxy may alert authorities, placing the users at risk. We introduce a simple and efficient construction, leveraging general purpose services, which allows users to hide their communication from active adversaries without relying on prior trust. Finally, we implement a proof of concept showing that camouflaged web browsing is possible using legitimate services such as Gmail without requiring software installation on the client side.

Original languageEnglish
Title of host publicationProceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011
Pages1159-1162
Number of pages4
DOIs
StatePublished - 2011
Event2011 IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2011 and 2011 IEEE International Conference on Social Computing, SocialCom 2011 - Boston, MA, United States
Duration: 9 Oct 201111 Oct 2011

Publication series

NameProceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011

Conference

Conference2011 IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2011 and 2011 IEEE International Conference on Social Computing, SocialCom 2011
Country/TerritoryUnited States
CityBoston, MA
Period9/10/1111/10/11

Bibliographical note

Place of conference:USA

Fingerprint

Dive into the research topics of 'Camouflaged private communication'. Together they form a unique fingerprint.

Cite this