Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Len Sassaman is active.

Publication


Featured researches published by Len Sassaman.


workshop on privacy in the electronic society | 2005

The pynchon gate: a secure method of pseudonymous mail retrieval

Len Sassaman; Bram Cohen; Nick Mathewson

We describe the Pynchon Gate, a practical pseudonymous message retrieval system. Our design uses a simple distributed-trust private information retrieval protocol to prevent adversaries from linking recipients to their pseudonyms, even when some of the infrastructure has been compromised. This approach resists global traffic analysis significantly better than existing deployed pseudonymous email solutions, at the cost of additional bandwidth. We examine security concerns raised by our model, and propose solutions.


european symposium on research in computer security | 2004

Comparison Between Two Practical Mix Designs

Claudia Diaz; Len Sassaman; Evelyne Dewitte

We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model the algorithms used by these mixing applications. Our simulations are based on actual traffic data obtained from a public anonymous remailer (mix node). We determine that assumptions made in previous literature about the distribution of mix input traffic are incorrect: in particular, the input traffic does not follow a Poisson distribution. We establish for the first time that a lower bound exists on the anonymity of Mixmaster, and discover that under certain circumstances the algorithm used by Reliable provides no anonymity. We find that the upper bound on anonymity provided by Mixmaster is slightly higher than that provided by Reliable.


workshop on privacy in the electronic society | 2003

Heartbeat traffic to counter (n-1) attacks: red-green-black mixes

George Danezis; Len Sassaman

A dummy traffic strategy is described that can be implemented by mix nodes in an anonymous communication network to detect and counter active (n - 1) attacks and their variants. Heartbeat messages are sent anonymously from the mix node back to itself in order to establish its state of connectivity with the rest of the network. In case the mix is under attack, the flow of heartbeat messages is interrupted and the mix takes measures to preserve the quality of the anonymity it provides by introducing decoy messages.


financial cryptography | 2010

PKI layer cake: new collision attacks against the global x.509 infrastructure

Dan Kaminsky; Meredith L. Patterson; Len Sassaman

Research unveiled in December of 2008 [15] showed how MD5’s long-known flaws could be actively exploited to attack the real-worldCertification Authority infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509: the applicability of MD2 preimage attacks against the primary root certificate for Verisign, and the difficulty of validating X.509 Names contained within PKCS#10 Certificate Requests.We also draw particular attention to two possibly unrecognized vectors for implementation flaws that have been problematic in the past: the ASN.1 BER decoder required to parsePKCS#10, and the potential for SQL injection fromtext contained within its requests. Finally, we explore why the implications of these attacks are broader than some have realized — first, because Client Authentication is sometimes tied to X.509, and second, because Extended Validation certificates were only intended to stop phishing attacks from names similar to trusted brands. As per the work of Adam Barth and Collin Jackson [4], EV does not prevent an attacker who can synthesize or acquire a “low assurance” certificate for a given name from acquiring the “green bar” EV experience.


privacy enhancing technologies | 2008

How to Bypass Two Anonymity Revocation Schemes

George Danezis; Len Sassaman

In recent years, there have been several proposals for anonymous communication systems that provide intentional weaknesses to allow anonymity to be circumvented in special cases. These anonymity revocation schemes attempt to retain the properties of strong anonymity systems while granting a special class of people the ability to selectively break through their protections. We evaluate the two dominant classes of anonymity revocation systems, and identify fundamental flaws in their architecture, leading to a failure to ensure proper anonymity revocation, as well as introducing additional weaknesses for users not targeted for anonymity revocation.


financial cryptography | 2010

Ethical guidelines for computer security researchers: Be reasonable

Len Sassaman

For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. This paper deals solely with the issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers.


Archive | 2000

Mixmaster protocol --- version 2

Markus Holopainen; Lance Cottrell; Peter Palfrader; Len Sassaman


IEEE Systems Journal | 2013

Security Applications of Formal Language Theory

Len Sassaman; Meredith L. Patterson; Sergey Bratus; Michael E. Locasto


workshop on privacy in the electronic society | 2003

Heartbeat Traffic to Counter (n-1) Attacks

Red-Green-Black Mixes; George Danezis; Len Sassaman


ieee symposium on security and privacy | 2012

A Patch for Postel's Robustness Principle

Len Sassaman; Meredith L. Patterson; Sergey Bratus

Collaboration


Dive into the Len Sassaman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

George Danezis

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Claudia Diaz

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

David Chaum

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Evelyne Dewitte

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge