Andriy Panchenko

Affiliations:
  • Brandenburg University of Technology, Germany
  • University of Luxembourg (former)
  • RWTH Aachen University, Germany (PhD 2010)


According to our database1, Andriy Panchenko authored at least 50 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor.
Comput. Secur., September, 2023

Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls.
CoRR, 2023

A Survey on Controller Area Network Reverse Engineering.
IEEE Commun. Surv. Tutorials, 2023

Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Demo: Traffic Splitting for Tor - A Defense against Fingerprinting Attacks.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2022

Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks.
Proceedings of the Security and Privacy in Communication Networks, 2021

WhisperChord: Scalable and Secure Node Discovery for Overlay Networks.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

POSTER: How Dangerous is My Click? Boosting Website Fingerprinting By Considering Sequences of Webpages.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Analyzing PeerFlow - A Bandwidth Estimation System for Untrustworthy Environments.
Proceedings of the Sicherheit 2020, Sicherheit, 2020

Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Hi Doppelgänger : Towards Detecting Manipulation in News Comments.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Analysis of Multi-path Onion Routing-Based Anonymization Networks.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

POSTER: Traffic Splitting to Counter Website Fingerprinting.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
The state of affairs in BGP security: A survey of attacks and defenses.
Comput. Commun., 2018

2017
Analysis of Fingerprinting Techniques for Tor Hidden Services.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2016
Website Fingerprinting at Internet Scale.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

POSTER: Fingerprinting Tor Hidden Services.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Formalization of Fingerprinting Techniques.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Hacker's toolbox: Detecting software-based 802.11 evil twin access points.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11.
Proceedings of the Q2SWinet'14, 2014

Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2012
Improving performance and anonymity in the Tor network.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Clock skew based remote device fingerprinting demystified.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Introducing SOR: SSH-based Onion Routing.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Further Privacy Mechanisms.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Privacy in Communications on the Internet.
Prax. Inf.verarb. Kommun., 2011

Website fingerprinting in onion routing based anonymization networks.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Lightweight Hidden Services.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Anonymous Communication in the Digital World.
Proceedings of the 17th GI/ITG Conference on Communication in Distributed Systems, 2011

Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
Anonymous communication in the age of the internet.
PhD thesis, 2010

Anonymous Communication.
Proceedings of the Joint Workshop of the German Research Training Groups in Computer Science, 2010

2009
A Kademlia-Based Node Lookup System for Anonymization Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

Path Selection Metrics for Performance-Improved Onion Routing.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

SHALON: Lightweight Anonymization Based on Open Standards.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Interconnected Tool-assistance for Development of Agent-oriented Software Systems.
Proceedings of the KEOD 2009 - Proceedings of the International Conference on Knowledge Engineering and Ontology Development, Funchal, 2009

NISAN: network information service for anonymization networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Self-certified Sybil-free pseudonyms.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Cross-layer attack on anonymizing networks.
Proceedings of the 2008 International Conference on Telecommunications, 2008

Performance Analysis of Anonymous Communication Channels Provided by Tor.
Proceedings of the The Third International Conference on Availability, 2008

2007
Practical anonymous communication on the mobile internet using Tor.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Using Trust to Resist Censorship in the Presence of Collusion.
Proceedings of the New Approaches for Security, 2007

2006
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
Proceedings of the Communications and Multimedia Security, 2006


  Loading...