[PDF][PDF] Website Fingerprinting at Internet Scale.
The website fingerprinting attack aims to identify the content (ie, a webpage accessed by a
client) of encrypted and anonymized connections by observing patterns of data flows such …
client) of encrypted and anonymized connections by observing patterns of data flows such …
k-fingerprinting: A robust scalable website fingerprinting technique
Website fingerprinting enables an attacker to infer which web page a client is browsing
through encrypted or anonymized network connections. We present a new website …
through encrypted or anonymized network connections. We present a new website …
{DupLESS}:{Server-Aided} encryption for deduplicated storage
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication
to save space by only storing one copy of each file uploaded. Should clients conventionally …
to save space by only storing one copy of each file uploaded. Should clients conventionally …
Effective attacks and provable defenses for website fingerprinting
Website fingerprinting attacks allow a local, passive eavesdropper to identify a user's web
activity by leveraging packet sequence information. These attacks break the privacy …
activity by leveraging packet sequence information. These attacks break the privacy …
{Walkie-Talkie}: An efficient defense against passive website fingerprinting attacks
T Wang, I Goldberg - … USENIX Security Symposium (USENIX Security 17 …, 2017 - usenix.org
Website fingerprinting (WF) is a traffic analysis attack that allows an eavesdropper to
determine the web activity of a client, even if the client is using privacy technologies such as …
determine the web activity of a client, even if the client is using privacy technologies such as …
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …
A critical evaluation of website fingerprinting attacks
Recent studies on Website Fingerprinting (WF) claim to have found highly effective attacks
on Tor. However, these studies make assumptions about user settings, adversary …
on Tor. However, these studies make assumptions about user settings, adversary …
Touching from a distance: Website fingerprinting attacks and defenses
We present a novel web page fingerprinting attack that is able to defeat several recently
proposed defenses against traffic analysis attacks, including the application-level defenses …
proposed defenses against traffic analysis attacks, including the application-level defenses …
Website fingerprinting in onion routing based anonymization networks
A Panchenko, L Niessen, A Zinnen… - Proceedings of the 10th …, 2011 - dl.acm.org
Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and
the content of communications from a local observer, ie, an entity that can eavesdrop the …
the content of communications from a local observer, ie, an entity that can eavesdrop the …
Network flow watermarking: A survey
A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …
network administration often takes advantage of TA for purposes such as security, intrusion …