Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Obfuscation / Network Steganography Research

Collin Anderson collin at averysmallbird.com
Sun Nov 3 22:19:45 PST 2013


Philipp Winter keeps a fairly comprehensive and up-to-date archive of
papers that often cover network steganography for circumvention purposes
under CensorBib: http://www.cs.kau.se/philwint/censorbib/



On Sun, Nov 3, 2013 at 11:29 PM, Lucas Dixon <ldixon at google.com> wrote:

> Hi,
>
> I'm trying to put together a good reading and person list for what is
> currently known on network steganography (in particular, network traffic
> obfuscation):
>
> What are the methods by which one type of traffic can be distinguished
> from another, and how can one type of traffic be hidden as another. How
> much computation and extra bandwidth do you have to pay to make it how much
> harder to distinguish? And what's the current computation and memory
> capacity of DPI machines?
>
> Any suggestions?
>
> Thanks!
> lucas
>
> --
> Lucas Dixon | Google Ideas
>
> --
> Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by emailing moderator at
> companys at stanford.edu.
>



-- 
*Collin David Anderson*
averysmallbird.com | @cda | Washington, D.C.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20131104/92ae610a/attachment.html>


More information about the liberationtech mailing list