Sambuddho Chakravarty

According to our database1, Sambuddho Chakravarty authored at least 18 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System.
Proc. Priv. Enhancing Technol., January, 2023

2021
Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs.
Proc. Priv. Enhancing Technol., 2021

Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
SiegeBreaker: An SDN Based Practical Decoy Routing System.
Proc. Priv. Enhancing Technol., 2020

The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor.
Proc. Priv. Enhancing Technol., 2020

2018
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
The Devils in The Details: Placing Decoy Routers in the Internet.
CoRR, 2017

Mending Wall: On the Implementation of Censorship in India.
Proceedings of the Security and Privacy in Communication Networks, 2017

Few Throats to Choke: On the Current Structure of the Internet.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

The Devil's in The Details: Placing Decoy Routers in the Internet.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2015
Detection and analysis of eavesdropping in anonymous communication networks.
Int. J. Inf. Sec., 2015

2014
Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication.
PhD thesis, 2014

On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

2011
Detecting Traffic Snooping in Tor Using Decoys.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

2010
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation.
Proceedings of the Computer Security, 2010

2008
Identifying Proxy Nodes in a Tor Anonymization Circuit.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

2007
An Experimental Study of Location Assisted Proactive Handover.
Proceedings of the Global Communications Conference, 2007


  Loading...