BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Events - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Events
X-ORIGINAL-URL:https://events.ucsc.edu
X-WR-CALDESC:Events for Events
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20250309T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20251102T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20260308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20261101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20270314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20271107T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20260220T140000
DTEND;TZID=America/Los_Angeles:20260220T160000
DTSTAMP:20260409T081903
CREATED:20260210T193542Z
LAST-MODIFIED:20260210T193542Z
UID:10009193-1771596000-1771603200@events.ucsc.edu
SUMMARY:Fredrickson\, K. (CSE) - Practical Anonymity with Formal Resistance to Traffic Analysis
DESCRIPTION:Anonymous communication systems hide who is talking to whom\, not just what is said. However\, existing systems are either vulnerable to traffic analysis attacks–attacks where adversaries observe and correlate the network traffic of users–or are forced to rely on unrealistic and unenforceable assumptions about how users behave. Worse\, existing theory lacks tools to rigorously model traffic analysis attacks\, much less inform whether if a system is secure against traffic analysis or how to design systems that are. \nWe make several contributions toward our goal of practical anonymity systems that resist traffic analysis. First\, we develop the first formal framework for describing the security of systems against traffic analysis attacks\, allowing us to quantitatively describe and compare the security of all existing works. Second\, leveraging this framework\, we develop a security definition that distinguishes between systems that are and are not susceptible to traffic analysis. We call this property input/output independence. We use this definition to prove that the dominant model of systems–synchronous systems–cannot practically provide input/output independence. We then design a new asynchronous anonymity functionality\, deferred retrieval\, that achieves input/output independence with far more flexible user assumptions and up to 3400 times less traffic overhead for the same latency compared to prior methods. Finally\, we design and implement Sparta\, a family of high-throughput\, scalable instantiations of deferred retrieval using trusted execution environments and oblivious algorithms\, yielding the first practical anonymity systems that are formally resistant to long-term traffic analysis. \nEvent Host: Kyle Fredrickson\, Ph.D. Candidate\, Computer Science and Engineering \nAdvisor: Darrell Long \nZoom – https://ucsc.zoom.us/j/98133127429?pwd=QNICsMrQa6bQUKNPo40PthZyQEQCFl.1 \nPasscode – 242206
URL:https://events.ucsc.edu/event/fredrickson-k-cse-practical-anonymity-with-formal-resistance-to-traffic-analysis/
LOCATION:Engineering 2\, Engineering 2 1156 High Street\, Santa Cruz\, CA\, 95064
CATEGORIES:Ph.D. Presentations
ATTACH;FMTTYPE=image/jpeg:https://events.ucsc.edu/wp-content/uploads/2026/02/ph.d.-presentation-graphic-option2.jpg
GEO:37.0009723;-122.0632371
X-APPLE-STRUCTURED-LOCATION;VALUE=URI;X-ADDRESS=Engineering 2 Engineering 2 1156 High Street Santa Cruz CA 95064;X-APPLE-RADIUS=500;X-TITLE=Engineering 2 1156 High Street:geo:-122.0632371,37.0009723
END:VEVENT
END:VCALENDAR