Online privacy: Attacks and defenses Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter Oldenbourg March 27, 2015

Online privacy: Attacks and defenses

  • Dominik Herrmann

    Dominik Herrmann is a post-doctoral researcher in the group “Sicherheit in verteilten Systemen” at Universiät Hamburg. Besides his research activities in the field of online privacy, he supports administrative tasks at various universities with tailored software tools. He also helps a number of schools with running their IT infrastructure. He was honored with a junior fellowship of Gesellschaft für Informatik in 2014.

    Universität Hamburg, Fachbereich Informatik, Vogt-Kölln-Str. 30, D-22527 Hamburg

    EMAIL logo

Abstract

I approach privacy issues on the Internet from two ends. On the one hand, I design and evaluate defensive measures, so-called privacy enhancing technologies (PETs), which can be used by individuals to protect themselves against surveillance on the Internet. On the other hand, I study the efficacy of offensive techniques. I am especially interested in passive surveillance techniques that cannot be detected. For instance, I have shown how machine learning techniques can be used to infer the contents of encrypted traffic and how to track users solely based on characteristic behavioral patterns.

About the author

Dominik Herrmann

Dominik Herrmann is a post-doctoral researcher in the group “Sicherheit in verteilten Systemen” at Universiät Hamburg. Besides his research activities in the field of online privacy, he supports administrative tasks at various universities with tailored software tools. He also helps a number of schools with running their IT infrastructure. He was honored with a junior fellowship of Gesellschaft für Informatik in 2014.

Universität Hamburg, Fachbereich Informatik, Vogt-Kölln-Str. 30, D-22527 Hamburg

Received: 2015-1-19
Accepted: 2015-1-28
Published Online: 2015-3-27
Published in Print: 2015-4-28

©2015 Walter de Gruyter Berlin/Boston

Downloaded on 13.12.2024 from https://www.degruyter.com/document/doi/10.1515/itit-2015-0001/html
Scroll to top button