Now showing items 1-9 of 9

    • Building a Better Tor Experimentation Platform from the Magic of Dynamic ELFs 

      Tracey, Justin (University of Waterloo, 2017-10-30)
      Tor is the most popular tool for providing online anonymity. It is used by journalists, activists, and privacy-conscious individuals to provide low-latency private access to the Internet. However, Tor’s specific design and ...
    • End-to-End Encrypted Group Messaging with Insider Security 

      Unger, Nik (University of Waterloo, 2021-08-11)
      Our society has become heavily dependent on electronic communication, and preserving the integrity of this communication has never been more important. Cryptography is a tool that can help to protect the security and privacy ...
    • Mitigator: Privacy policy compliance using Intel SGX 

      Mazmudar, Miti (University of Waterloo, 2019-06-19)
      Privacy policies have been known to be hard to read and understand by internet users and yet users are obliged to accept these one-sided terms of usage of their data before they can effectively use websites. Although ...
    • Recipes for Resistance: A Censorship Circumvention Cookbook 

      Bocovich, Cecylia (University of Waterloo, 2018-08-16)
      The increasing centralization of Internet infrastructure and web services, along with advancements in the application of machine learning techniques to analyze and classify network traffic, have enabled the growth and ...
    • Robot Social Engineering 

      Postnikoff, Brittany (University of Waterloo, 2020-07-06)
      This thesis establishes the new field of Robot Social Engineering. We define Robot Social Engineering as the use of social abilities and techniques by robots to manipulate others in order to achieve a goal. We build the ...
    • StyleCounsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry 

      McKnight, Christopher (University of Waterloo, 2018-01-12)
      Authorship attribution has piqued the interest of scholars for centuries, but had historically remained a matter of subjective opinion, based upon examination of handwriting and the physical document. Midway through the ...
    • Walking Onions: Scaling Distribution of Information Safely in Anonymity Networks 

      Komlo, Chelsea (University of Waterloo, 2020-08-07)
      Scaling anonymity networks offers unique security challenges, as attackers can exploit differing views of the network’s topology to perform epistemic and route capture attacks. Anonymity networks in practice, such as ...
    • Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput 

      Engler, Steven (University of Waterloo, 2020-08-10)
      The Tor anonymity network has millions of daily users and thousands of volunteer-run relays, but growing it further has several research and deployment challenges. One such challenge is supporting the increase in bandwidth ...
    • Website Fingerprinting: Attacks and Defenses 

      Wang, Tao (University of Waterloo, 2016-01-13)
      Website fingerprinting attacks allow a local, passive eavesdropper to determine a client's web activity by leveraging features from her packet sequence. These attacks break the privacy expected by users of privacy technologies, ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages