RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks
暂无分享,去创建一个
LiangMin Wang | Hui Zhao | Tao Luo | ShangNan Yin | Hao Shentu | Liangmin Wang | Tao Luo | Hui Zhao | Shangnan Yin | Shentu Hao
[1] George Danezis,et al. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique , 2015, USENIX Security Symposium.
[2] Wouter Joosen,et al. Automated Website Fingerprinting through Deep Learning , 2017, NDSS.
[3] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[4] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[5] Liu Wei,et al. Edge Computing—An Emerging Computing Model for the Internet of Everything Era , 2017 .
[6] Xiapu Luo,et al. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows , 2011, NDSS.
[7] Hilde van der Togt,et al. Publisher's Note , 2003, J. Netw. Comput. Appl..
[8] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[9] Victor S. Sheng,et al. Multilevel Identification and Classification Analysis of Tor on Mobile and PC Platforms , 2021, IEEE Transactions on Industrial Informatics.
[10] Eric Rescorla,et al. The Secure HyperText Transfer Protocol , 1999, RFC.
[11] Shigeki Goto,et al. Fingerprinting Attack on Tor Anonymity using Deep Learning , 2016 .
[12] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[13] Tao Wang,et al. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks , 2017, USENIX Security Symposium.
[14] Rachel Greenstadt,et al. A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.
[15] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[16] Mike Perry,et al. Toward an Efficient Website Fingerprinting Defense , 2015, ESORICS.
[17] Bhavani Thuraisingham,et al. BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks , 2019, IEEE Transactions on Dependable and Secure Computing.
[18] Xiang Cai,et al. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense , 2014, WPES.
[19] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[20] Mohsen Imani,et al. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning , 2018, CCS.
[21] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[22] Mohammad Saidur Rahman,et al. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning , 2019, CCS.