[PDF][PDF] Website Fingerprinting at Internet Scale.

A Panchenko, F Lanze, J Pennekamp, T Engel… - NDSS, 2016 - nymity.ch
The website fingerprinting attack aims to identify the content (ie, a webpage accessed by a
client) of encrypted and anonymized connections by observing patterns of data flows such …

k-fingerprinting: A robust scalable website fingerprinting technique

J Hayes, G Danezis - … USENIX Security Symposium (USENIX Security 16 …, 2016 - usenix.org
Website fingerprinting enables an attacker to infer which web page a client is browsing
through encrypted or anonymized network connections. We present a new website …

{DupLESS}:{Server-Aided} encryption for deduplicated storage

S Keelveedhi, M Bellare, T Ristenpart - 22nd USENIX security …, 2013 - usenix.org
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication
to save space by only storing one copy of each file uploaded. Should clients conventionally …

Effective attacks and provable defenses for website fingerprinting

T Wang, X Cai, R Nithyanand, R Johnson… - 23rd USENIX Security …, 2014 - usenix.org
Website fingerprinting attacks allow a local, passive eavesdropper to identify a user's web
activity by leveraging packet sequence information. These attacks break the privacy …

{Walkie-Talkie}: An efficient defense against passive website fingerprinting attacks

T Wang, I Goldberg - … USENIX Security Symposium (USENIX Security 17 …, 2017 - usenix.org
Website fingerprinting (WF) is a traffic analysis attack that allows an eavesdropper to
determine the web activity of a client, even if the client is using privacy technologies such as …

Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail

KP Dyer, SE Coull, T Ristenpart… - 2012 IEEE symposium …, 2012 - ieeexplore.ieee.org
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …

A critical evaluation of website fingerprinting attacks

M Juarez, S Afroz, G Acar, C Diaz… - Proceedings of the 2014 …, 2014 - dl.acm.org
Recent studies on Website Fingerprinting (WF) claim to have found highly effective attacks
on Tor. However, these studies make assumptions about user settings, adversary …

Touching from a distance: Website fingerprinting attacks and defenses

X Cai, XC Zhang, B Joshi, R Johnson - … of the 2012 ACM conference on …, 2012 - dl.acm.org
We present a novel web page fingerprinting attack that is able to defeat several recently
proposed defenses against traffic analysis attacks, including the application-level defenses …

Website fingerprinting in onion routing based anonymization networks

A Panchenko, L Niessen, A Zinnen… - Proceedings of the 10th …, 2011 - dl.acm.org
Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and
the content of communications from a local observer, ie, an entity that can eavesdrop the …

Network flow watermarking: A survey

A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …