Adaptive encrypted traffic fingerprinting with bi-directional dependence
暂无分享,去创建一个
Bhavani M. Thuraisingham | Latifur Khan | Khaled Al-Naami | Kevin W. Hamlen | Zhiqiang Lin | Swarup Chandra | Ahmad M. Mustafa | A. M. Mustafa | B. Thuraisingham | Zhiqiang Lin | L. Khan | K. Al-Naami | Swarup Chandra
[1] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[2] Ian Goldberg,et al. Enhancing Tor's performance using real-time traffic classification , 2012, CCS.
[3] Tao Wang,et al. On Realistically Attacking Tor with Website Fingerprinting , 2016, Proc. Priv. Enhancing Technol..
[4] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[5] Rachel Greenstadt,et al. A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.
[6] Mauro Conti,et al. AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[7] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[8] Dawn Xiaodong Song,et al. NetworkProfiler: Towards automatic fingerprinting of Android apps , 2013, 2013 Proceedings IEEE INFOCOM.
[9] Yong Liao,et al. AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic , 2015, PAM.
[10] Klaus Wehrle,et al. Website Fingerprinting at Internet Scale , 2016, NDSS.
[11] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[12] Nino Vincenzo Verde,et al. No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position , 2015, NSS.
[13] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[14] Charu C. Aggarwal,et al. Efficient handling of concept drift and concept evolution over Stream Data , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).
[15] Nino Vincenzo Verde,et al. Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis , 2014, CODASPY.
[16] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[17] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[18] Chuangang Ren,et al. Sidewinder Targeted Attack against Android in The Golden Age of Ad Libraries , 2014 .
[19] Maria Kihl,et al. Traffic analysis and characterization of Internet user behavior , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.
[20] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.
[21] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[22] Ming Yang,et al. A novel Website Fingerprinting attack against multi-tab browsing behavior , 2015, 2015 IEEE 19th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[23] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[24] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[25] Tao Wang,et al. Improved website fingerprinting on Tor , 2013, WPES.
[26] Suman Nath,et al. Brahmastra: Driving Apps to Test the Security of Third-Party Components , 2014, USENIX Security Symposium.
[27] Latifur Khan,et al. SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps , 2014, NDSS.
[28] Latifur Khan,et al. SAND: Semi-Supervised Adaptive Novel Class Detection and Classification over Data Stream , 2016, AAAI.
[29] Martin Newby,et al. Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems , 2013, 2013 European Intelligence and Security Informatics Conference.
[30] Ivan Martinovic,et al. Who do you sync you are?: smartphone fingerprinting via application behaviour , 2013, WiSec '13.
[31] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[32] Nicolas Christin,et al. All Your Droid Are Belong to Us: A Survey of Current Android Attacks , 2011, WOOT.
[33] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[34] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[35] David Plonka,et al. FlowScan: A Network Traffic Flow Reporting and Visualization Tool , 2000, LISA.
[36] Ron Kohavi,et al. Supervised and Unsupervised Discretization of Continuous Features , 1995, ICML.
[37] Nino Vincenzo Verde,et al. Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.
[38] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.