Susceptibility of Instant Message Metadata to Traffic Analysis
Analysis of Instant Message traffic and its susceptibility to keystroke analysis timing to bypass encryption. Includes all files needed to replicate the experiment and some of the final raw results.