TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting
暂无分享,去创建一个
Klaus Wehrle | Andriy Panchenko | Asya Mitseva | Jens Hiller | Sebastian Reuter | Jan Pennekamp | Julian Filter | Thomas Engel | Wladimir De la Cadena | J. Pennekamp | Jens Hiller | T. Engel | A. Panchenko | Klaus Wehrle | Asya Mitseva | Sebastian Reuter | Julian Filter
[1] Ian Goldberg,et al. Network-Based Website Fingerprinting , 2019 .
[2] Klaus Wehrle,et al. POSTER: Traffic Splitting to Counter Website Fingerprinting , 2019, CCS.
[3] Patrick Thiran,et al. Protecting against Website Fingerprinting with Multihoming , 2020, Proc. Priv. Enhancing Technol..
[4] Xiang Cai,et al. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense , 2014, WPES.
[5] Srinivas Devadas,et al. DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows , 2018, WPES@CCS.
[6] Jiajun Gong,et al. Zero-delay Lightweight Defenses against Website Fingerprinting , 2020, USENIX Security Symposium.
[7] Tao Wang,et al. On Realistically Attacking Tor with Website Fingerprinting , 2016, Proc. Priv. Enhancing Technol..
[8] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[9] Vern Paxson,et al. SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[10] Roy T. Fielding,et al. Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content , 2014, RFC.
[11] Junhua Yan,et al. Feature Selection for Website Fingerprinting , 2018, Proc. Priv. Enhancing Technol..
[12] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[13] Rachel Greenstadt,et al. A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.
[14] Ian Goldberg,et al. The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting , 2013, Privacy Enhancing Technologies.
[15] George Danezis,et al. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique , 2015, USENIX Security Symposium.
[16] Ian Goldberg,et al. SoK: Making Sense of Censorship Resistance Systems , 2016, Proc. Priv. Enhancing Technol..
[17] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[18] Micah Sherr,et al. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor , 2019, USENIX Security Symposium.
[19] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[20] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[21] Nicholas Hopper,et al. p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning , 2019, Proc. Priv. Enhancing Technol..
[22] Andriy Panchenko,et al. Path Selection Metrics for Performance-Improved Onion Routing , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.
[23] Shigeki Goto,et al. Fingerprinting Attack on Tor Anonymity using Deep Learning , 2016 .
[24] Thomas Engel,et al. Analysis of Multi-path Onion Routing-Based Anonymization Networks , 2019, DBSec.
[25] Tao Wang,et al. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks , 2017, USENIX Security Symposium.
[26] Giovanni Cherubin,et al. Website Fingerprinting Defenses at the Application Layer , 2017, Proc. Priv. Enhancing Technol..
[27] Roy T. Fielding,et al. Hypertext Transfer Protocol (HTTP/1.1): Range Requests , 2014, RFC.
[28] Shuai Li,et al. Measuring Information Leakage in Website Fingerprinting Attacks and Defenses , 2017, CCS.
[29] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[30] Tobias Pulls,et al. Website Fingerprinting with Website Oracles , 2020, Proc. Priv. Enhancing Technol..
[31] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[32] Mohsen Imani,et al. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning , 2018, CCS.
[33] Xiapu Luo,et al. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows , 2011, NDSS.
[34] Andriy Panchenko,et al. Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing , 2019, 2019 IEEE 27th International Conference on Network Protocols (ICNP).
[35] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[36] Lei Yang,et al. mTor: A multipath Tor routing beyond bandwidth throttling , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[37] Mohammad Saidur Rahman,et al. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning , 2019, CCS.
[38] Klaus Wehrle,et al. Website Fingerprinting at Internet Scale , 2016, NDSS.
[39] Tao Wang,et al. Improved website fingerprinting on Tor , 2013, WPES.
[40] Wouter Joosen,et al. Automated Website Fingerprinting through Deep Learning , 2017, NDSS.
[41] Mike Perry,et al. Toward an Efficient Website Fingerprinting Defense , 2015, ESORICS.