Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
Subverting website fingerprinting defenses with robust traffic representation
Anonymity networks, eg, Tor, are vulnerable to various website fingerprinting (WF) attacks,
which allows attackers to perceive user privacy on these networks. However, the defenses …
which allows attackers to perceive user privacy on these networks. However, the defenses …
A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
Sok: A critical evaluation of efficient website fingerprinting defenses
N Mathews, JK Holland, SE Oh… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Recent website fingerprinting attacks have been shown to achieve very high performance
against traffic through Tor. These attacks allow an adversary to deduce the website a Tor …
against traffic through Tor. These attacks allow an adversary to deduce the website a Tor …
Manda: On adversarial example detection for network intrusion detection system
With the rapid advancement in machine learning (ML), ML-based Intrusion Detection
Systems (IDSs) are widely deployed to protect networks from various attacks. One of the …
Systems (IDSs) are widely deployed to protect networks from various attacks. One of the …
Black-box Adversarial Example Attack towards {FCG} Based Android Malware Detection under Incomplete Feature Information
The function call graph (FCG) based Android malware detection methods have recently
attracted increasing attention due to their promising performance. However, these methods …
attracted increasing attention due to their promising performance. However, these methods …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Robust multi-tab website fingerprinting attacks in the wild
Website fingerprinting enables an eavesdropper to determine which websites a user is
visiting over an encrypted connection. State-of-the-art website fingerprinting (WF) attacks …
visiting over an encrypted connection. State-of-the-art website fingerprinting (WF) attacks …
Robust adversarial attacks against DNN-based wireless communication systems
There is significant enthusiasm for the employment of Deep Neural Networks (DNNs) for
important tasks in major wireless communication systems: channel estimation and decoding …
important tasks in major wireless communication systems: channel estimation and decoding …