Skip to main content

Showing 1–6 of 6 results for author: Burkert, C

  1. Probing for Passwords -- Privacy Implications of SSIDs in Probe Requests

    Authors: Johanna Ansohn McDougall, Christian Burkert, Daniel Demmler, Monina Schwarz, Vincent Hubbe, Hannes Federrath

    Abstract: Probe requests help mobile devices discover active Wi-Fi networks. They often contain a multitude of data that can be used to identify and track devices and thereby their users. The past years have been a cat-and-mouse game of improving fingerprinting and introducing countermeasures against fingerprinting. This paper analyses the content of probe requests sent by mobile devices and operating syste… ▽ More

    Submitted 6 July, 2022; v1 submitted 8 June, 2022; originally announced June 2022.

  2. arXiv:2205.13776  [pdf, other

    cs.CR

    PrivacyDates: A Framework for More Privacy-Preserving Timestamp Data Types

    Authors: Christian Burkert, Jonathan Balack, Hannes Federrath

    Abstract: Case studies of application software data models indicate that timestamps are excessively used in connection with user activity. This contradicts the principle of data minimisation which demands a limitation to data necessary for a given purpose. Prior work has also identified common purposes of timestamps that can be realised by more privacy-preserving alternatives like counters and dates with pu… ▽ More

    Submitted 7 June, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: Accepted and presented at the conference GI Sicherheit 2022

  3. PEEPLL: Privacy-Enhanced Event Pseudonymisation with Limited Linkability

    Authors: Ephraim Zimmer, Christian Burkert, Tom Petersen, Hannes Federrath

    Abstract: Pseudonymisation provides the means to reduce the privacy impact of monitoring, auditing, intrusion detection, and data collection in general on individual subjects. Its application on data records, especially in an environment with additional constraints, like re-identification in the course of incident response, implies assumptions and privacy issues, which contradict the achievement of the desi… ▽ More

    Submitted 12 December, 2019; originally announced December 2019.

    Comments: 10 pages. Extended version, Dec. 2019. A shortened version has been accepted for publication in the proceedings of the 35th ACM/SIGAPP Symposium On Applied Computing 2020

  4. arXiv:1905.03518  [pdf, other

    cs.CR cs.PF

    Enhanced Performance and Privacy for TLS over TCP Fast Open

    Authors: Erik Sy, Tobias Mueller, Christian Burkert, Hannes Federrath, Mathias Fischer

    Abstract: Small TCP flows make up the majority of web flows. For them, the TCP three-way handshake induces significant delay overhead. The TCP Fast Open (TFO) protocol can significantly decrease this delay via zero round-trip time (0-RTT) handshakes for all TCP handshakes that follow a full initial handshake to the same host. However, this comes at the cost of privacy limitations and also has some performan… ▽ More

    Submitted 12 November, 2019; v1 submitted 9 May, 2019; originally announced May 2019.

    Comments: 12 pages

  5. arXiv:1904.06228  [pdf, other

    cs.NI cs.CR

    QUICker connection establishment with out-of-band validation tokens

    Authors: Erik Sy, Christian Burkert, Tobias Mueller, Hannes Federrath, Mathias Fischer

    Abstract: QUIC is a secure transport protocol that improves the performance of HTTPS. An initial QUIC handshake that enforces a strict validation of the client's source address requires two round-trips. In this work, we extend QUIC's address validation mechanism by an out-of-band validation token to save one round-trip time during the initial handshake. The proposed token allows sharing an address validatio… ▽ More

    Submitted 3 May, 2019; v1 submitted 12 April, 2019; originally announced April 2019.

    Comments: 8 pages

  6. Tracking Users across the Web via TLS Session Resumption

    Authors: Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer

    Abstract: User tracking on the Internet can come in various forms, e.g., via cookies or by fingerprinting web browsers. A technique that got less attention so far is user tracking based on TLS and specifically based on the TLS session resumption mechanism. To the best of our knowledge, we are the first that investigate the applicability of TLS session resumption for user tracking. For that, we evaluated the… ▽ More

    Submitted 16 October, 2018; originally announced October 2018.

    Comments: 11 pages

    Journal ref: Published in 2018 Annual Computer Security Applications Conference (ACSAC '18), December 3-7, 2018, San Juan, PR, USA