Tag: anonymous

Mar 24

DNS leak test

What is a DNS leak and why should I care?

When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network. If any traffic leaks outside of the secure connection to the network, any adversary monitoring your traffic will be able to log your activity.

DNS or the domain name system is used to translate domain names such as www.privacyinternational.org into numerical IP addresses e.g. which are required to route packets of data on the Internet. Whenever your computer needs to contact a server on the Internet, such as when you enter a URL into your browser, your computer contacts a DNS server and requests the IP address. Most Internet service providers assign their customers a DNS server which they control and use for logging and recording your Internet activities.

Under certain conditions, even when connected to the anonymity network, the operating system will continue to use its default DNS servers instead of the anonymous DNS servers assigned to your computer by the anonymity network. DNS leaks are a major privacy threat since the anonymity network may be providing a false sense of security while private data is leaking.

via DNS leak test.

Oct 27

Revealed: how Whisper app tracks ‘anonymous’ users | Technology | The Guardian

Revealed: how Whisper app tracks ‘anonymous’ users | Technology | The Guardian.

Jun 30

File sharing via TOR micahflee/onionshare · GitHub

Securely and anonymously share a file of any size


via micahflee/onionshare · GitHub.

Jul 03


Syndie is an open source system for operating distributed forums (Why would you use Syndie?), offering a secure and consistent interface to various anonymous and non-anonymous content networks.

via Syndie.

May 17

The New Yorker Launches ‘Strongbox’ For Secure Anonymous Leaks – Slashdot

The New Yorker Launches ‘Strongbox’ For Secure Anonymous Leaks – Slashdot.

Jan 12

Linguistics identifies anonymous users – Hackers – SC Magazine Australia – Secure Business Intelligence

Linguistics identifies anonymous users – Hackers – SC Magazine Australia – Secure Business Intelligence.

Aug 16

International Journal of Computer Science & Network Security

International Journal of Computer Science & Network Security


Call for Papers:

Prospective authors are invited to submit journal papers relevant to the following special issues.

Special Topics:  

(1) Computer Science
(2) Communication Network
(3) Information Security.

Papers must be received by the IJCSNS Editorial Board no later than August 25, 2012. We have an outstanding international Editorial Staffs and have worked hard to produce excellent issues. Your subscription will significantly help us to build a great international IJCSNS publication during the August issues.

Within ten days, the submitted paper will be evaluated through e-mail by three anonymous reviewers and decided whether it is accepted, or not. We hope to publish your paper up to August 30, 2012. I will try to publish your paper during the IJCSNS May issues.   

The subscription (MS word) sample form is attached within www.ijcsns.org. Please submit your paper into editor@ijcsns.org (MS word file-doc). Thank you for your contributions.

Aug 09

Eleventh Smart Card Research and Advanced Application Conference – Cardis 2012

CARDIS 2012 – Call for Papers
Eleventh Smart Card Research and Advanced Application Conference

Since 1994, CARDIS is the foremost international conference dedicated
to smart card research and applications. Smart cards and secure
elements are the basis for many secure systems and play a decisive
role in ID management. Established computer science areas like
hardware design, operating systems, system modeling, cryptography,
verification and networking got adapted to this fast growing
technology and investigate emerging issues resulting from it. Unlike
events devoted to commercial and application aspects of smart cards,
CARDIS conferences gather researchers and technologists who focus on
all aspects of the design, development, deployment, validation and
application of smart cards and secure elements in secure platforms or

The eleventh Smart Card Research and Advanced Application IFIP
Conference, organized by the Institute for Applied Information
Processing and Communications (IAIK), Graz University of Technology,
will be held in the Weitzer Hotel, Graz, Austria.
The program committee is seeking original papers on all aspects of
smart cards and secure elements. Submissions across a broad range of
the development phases are encouraged, from exploratory research and
proof-of-concept studies to practical applications and deployment of
smart cards and related technologies. Topics of interest include, but
are not limited to:
– Software for secure embedded systems (operating systems, virtual
machines, … )
– Hardware architectures for secure embedded systems
– Security of RFID systems and sensor nodes
– Security of mobile devices and applications
– Efficient and secure implementations of cryptographic algorithms
– Cryptographic protocols for embedded systems
– Physical attacks and countermeasures
– Secure applications for embedded systems
– Embedded systems networking
– Person representation in embedded systems
– Formal modeling and formal proofs
– Validation and certification of embedded systems and applications
– Identity, privacy and trust issues

Authors are invited to submit papers (PDF or PS format) with novel
contributions electronically using the submission form available on
the following web site:
Submitted papers must be original, unpublished, anonymous and not
submitted to journals or other conferences/workshops that have
proceedings. Submissions must be written in English and should be at
most 15 pages in total. Papers not meeting these guidelines risk
rejection without consideration. All submissions will be

Submission implies the willingness of at least one of the authors to
register and present the paper. The proceedings will be published in
the Springer Lecture Notes in Computer Science (LNCS) series. Accepted
papers should follow the LNCS default author instructions at

Important dates

Submission of papers: August 20th, 2012, 23:59 GMT+02
Notification of acceptance: October 15, 2012
Camera-ready version of papers for pre-proceedings: November 7, 2012
Workshop date: November 28–30, 2012
Final version of papers: December 17, 2012

Program Committee
N. Asokan,  Nokia Research Center, Finland
Gildas Avoine,  UCL, Belgium
Chetali Boutheina,  Trusted Labs, France
Josep Domingo Ferrer,  Rovari i Virgili University, Catalonia
Hermann Drexler,  Giesecke & Devrient, Germany
Martin Feldhofer,  NXP, Austria
Berndt Gammel,  Infineon, Germany
Tim Güneysu,  Ruhr-University Bochum, Germany
Helena Handschuh,  Cryptography Research Inc., USA and KU Leuven, Belgium
Michael Hutter,  TU Graz, Austria
Marc Joye,  Technicolor, France
Ioannis Krontiris,  Göthe Universität Frankfurt, Germany
Jean-Louis Lanet,  University of Limoges, France
Konstantinos Markantonakis,  Royal Holloway, UK
Andrew Martin,  University of Oxford, UK
David Naccache,  ENS, France
Elisabeth Oswald,  University of Bristol, UK
Catuscia Palamidessi,  INRIA, France
Eric Peeters,  Texas Instruments, USA
Erik Poll,  RU Nijmegen, Netherlands
Bart Preneel,  KU Leuven, Belgium
Emmanuel Prouff,  ANSSI, France
Matthieu Rivain,  CryptoExperts, France
Pankaj Rohatgi,  Cryptography Research, USA
Ahmad-Reza Sadeghi,  TU Darmstadt, Germany
Jean-Pierre Seifert,  TU Berlin, Germany
Sergei Skorobogatov,  Cambridge University, UK
François-Xavier Standaert,  UCL, Belgium
Frederic Stumpf,  Fraunhofer AISEC, Germany
Marc Witteman,  Riscure, Netherlands

Organizational Committee
Stefan Mangard
(Program Chair)
Infineon Technologies, Germany
Email: Stefan.Mangard AT infineon.com

Jörn-Marc Schmidt
(General Chair)
Graz University of Technology, Austria
Email: joern-marc.schmidt AT iaik.tugraz.at

Jean-Jacques Quisquater
(Publicity Chair)
Université catholique de Louvain, Belgium
Email: jjq AT uclouvain.be

Jul 30


!                                COSADE 2013
!             Fourth International Workshop on Constructive
!                 Side-Channel Analysis and Secure Design
!                              Paris, France
!                             7-8 March 2013
!                          http://www.cosade.org

Important Dates

Abstract submission     24 September
Paper submission         01 October
Notification                   03 December
Final version                 17 December
Workshop                   7-8 March

Background, aim and scope

Side-channel analysis (SCA) and implementation attacks have become an
important field of research at universities and in the industry. In
order to enhance the resistance of cryptographic and security critical
implementations within the design phase, constructive attacks and
analyzing techniques may serve as a quality metric to optimize the
design and development process. Since 2010, COSADE provides an
international platform for researchers, academics, and industry
participants to present their work and their current research topics.
It is an excellent opportunity to exchange on new results with
international experts and to initiate new collaborations and
information exchange at a professional level. The workshop will
feature both invited presentations and contributed talks.

The fourth International Workshop on Constructive Side-Channel
Analysis and Secure Design will be organized and held by Telecom
ParisTech, Paris, France.

The topics of COSADE 2013 include, but are not limited to:

– Constructive side-channel analysis and implementation attacks
– Semi-invasive, invasive and fault attacks
– Leakage models and security models for side-channel analysis
– Cache-attacks and micro-architectural analysis
– Decapsulation and preparation techniques
– Side-channel based reverse engineering
– Leakage Resilient Implementations
– Evaluation methodologies for side-channel resistant designs
– Secure designs and countermeasures
– Evaluation platforms and tools for testing side-channel characteristics


Submitted papers should present novel contributions related to the
topics listed above. They must be original, unpublished, anonymous and
not submitted to another conference or journal for consideration of
publication. Papers must be written in English and they should not
exceed 15 pages. Submissions not meeting these guidelines risk
rejection without consideration of their merits. All submissions will
be blind-refereed. Authors are invited to submit their manuscripts
(PDF or PS format) by filling in the submission form available on the
following web site:

Submission implies the willingness of at least one of the authors to
register and present the paper.


The proceedings will be published as a Springer Lecture Notes in
Computer Science volume.

Steering committee
Sorin Huss, Technische Universität Darmstadt, Germany
Werner Schindler, Bundesamt für Sicherheit in der Informationstechnik
(BSI), Germany

Conference Chair
Jean-Luc Danger, TELECOM ParisTech, France

Conference Chair
Emmanuel Prouff, ANSSI, France

Program committee
Dakshi            Agrawal            IBM, USA
Guido              Bertoni             ST Microelectronics, Italy
Ray                 Cheung            City University of Hong Kong, Hong Kong
Jean-Sébastien Coron              Tranef, France
Markus            Dichtl               Siemens AG, Germany
Hermann          Drexler             Giesecke & Devrient, Germany
Benoit              Feix                Inside, France
Catherine         Gebotys           University of Waterloo, Canada
Benedikt          Gierlichs           K.U.Leuven, Belgium
Chirstophe       Giraud              Oberthur Technologies, France
Sylvain             Guilley             Télécom ParisTech, France
Naofumi           Homma            Tohoku University, Japan
Ilya                  Kizhvatov          Riscure, The Netherlands
Markus            Kuhn                University of Cambridge, UK
Victor               Lomné             ANSSI, France
Stefan              Mangard           Infineon, Germany
Amir                 Moradi             Ruhr-Universität Bochum, Germany
Debdeep           Mukhopadhyay Indian Institute of Technology Kharagpur, India
Elisabeth          Oswald             University of Bristol, UK
Axel                 Poschman        Nanyang Technological University, Singapore
Anand              Rajan               Intel Corporation, USA
Matthieu           Rivain              CryptoExperts, France
Kazuo              Sakiyama        The University of
Electro-Communications Tokyo, Japan
Akashi             Satoh              RCIS, Japan
Patrick             Schaumont      Virginia Tech, Blacksburg, USA
Jorn-Marc        Schmidt           IAIK Graz, Austria
François-Xavier Standaert         UCL, Belgium
Hugues            Thiebeauld       RFI Global, UK
Mathias            Wagner           NXP, Germany

May 14

Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2012)

FDTC 2012: Call for Papers

The 9th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC
2012) will be held in Leuven, Belgium, on September 9, 2012. FDTC 2012
is one day before CHES 2012 (September 10-12, 2012). This Call for
Papers is also available for download as a PDF file

Motivation & Scope

Fault injection is one of the most exploited means for extracting
confidential information from embedded devices or for compromising their
intended behavior. Research is therefore needed to develop methodologies
and techniques for designing robust cryptographic systems (both hardware
and software), and to protect them against both accidental faults and
intentional intrusions and attacks. Of particular interest is protection
against malicious injection of faults into the device for the purpose of
extracting confidential information.
FDTC is the reference event in the field of fault analysis, attacks and

Important dates

Extended submission deadline: May 18, 2012, 23:59 UTC
Notification of acceptance:  June 18, 2012
Final version deadline:       July 2, 2012
Workshop:                September 9, 2012

Paper submission

Contributions to the workshop describing theoretical studies and
practical case studies of fault diagnosis and tolerance in cryptographic
systems (HW and SW) and protocols are solicited. Topics of interest
include, but are not limited to:

– modelling the reliability of cryptographic systems and protocols
– inherently reliable cryptographic systems and algorithms
– faults and fault models for cryptographic devices (HW and SW)
– novel fault diagnosis and tolerance techniques for cryptographic systems
– attacks exploiting micro-architecture components
– physical protection against attacks
– fault attacks using lasers, electromagnetic induction, and clock /
power supply manipulation
– case studies of attacks, reliability, and fault diagnosis and
tolerance techniques in cryptographic systems
– combined attacks
– fault injection: mechanisms, models and countermeasures
– fault exploitation: analysis, attacks and countermeasures
– fault resistant hardware, fault resistant implementations of
cryptographic algorithms and fault resistant protocols

All submissions should be made using the online submission system:


Submissions should conform to the instructions below.

Instructions for authors

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or that have been submitted in parallel
in any other conference or workshop. Submissions should be anonymous,
with no author names, affiliations, acknowledgements or obvious
references. Papers should be at most 10 pages (including the
bibliography and appendices), with at least 11pt font and reasonable

Submission of final papers will be managed directly by Conference
Publishing Services (CPS). Final papers must be formatted following the
instructions in the related author kit (to be communicated). Conference
Publishing Services (CPS) will contact directly the authors for
instructions and will send links to the publishing services.

Accepted papers will be published in an archival proceedings volume by
Conference Publishing Services (CPS) and will be distributed at the time
of the workshop.

At least one author of each accepted paper must register with the
workshop and present the paper in order to be included in the proceedings.

Program committee

Alessandro Barenghi, Politecnico di Milano, Italy
Guido Bertoni, STMicroelectornics, Italy (co-chair)
Christophe Clavier, University of Limoges, France
Wieland Fischer, Infineon Technologies, Germany
Benedikt Gierlichs, KU Leuven, Belgium (co-chair)
Christophe Giraud, Oberthur Technologies, France
Jorge Guarjardo, Bosch, USA
Sylvain Guilley, Telecom ParisTech, France
Helena Handschuh, Intrinsic-ID Inc., USA
Dusko Karaklajic, KU Leuven, Belgium
Kerstin Lemke-Rust, HBRS, Germany
Marcel Medwed, UCL Crypto Group, Belgium
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India
Matthieu Rivain, CryptoExperts, France
Jörn-Marc Schmidt, TU Graz, Austria
Sergei Skorobogatov, University of Cambridge, UK
Junko Takahashi, NTT Corporation, Japan
Michael Tunstall, University of Bristol, UK
Marc Witteman, Riscure, The Netherlands

Contact with the PC co-chairs is pc2012@fdtc-workshop.eu

Steering committee

Luca Breveglieri, Politecnico di Milano, Italy
Israel Koren, University of Massachusetts, USA
David Naccache (chair), Ecole Normale Supérieure, France
Jean-Pierre Seifert, TU Berlin & T-Labs, Germany

FDTC 2012 is in cooperation with IACR – http://www.iacr.org