Toward an Efficient Website Fingerprinting Defense
暂无分享,去创建一个
Mike Perry | Claudia Díaz | Mohsen Imani | Matthew Wright | Marc Juárez | M. Wright | Claudia Díaz | Marc Juárez | M. Imani | Mike Perry
[1] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[2] Ling Huang,et al. I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis , 2014, Privacy Enhancing Technologies.
[3] Xiapu Luo,et al. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows , 2011, NDSS.
[4] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[5] Mun Choon Chan,et al. Website Fingerprinting and Identification Using Ordered Feature Sequences , 2010, ESORICS.
[6] Xiang Cai,et al. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense , 2014, WPES.
[7] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[8] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[9] Andrew Hintz,et al. Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.
[10] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.
[11] Tao Wang,et al. On Realistically Attacking Tor with Website Fingerprinting , 2016, Proc. Priv. Enhancing Technol..
[12] Tao Wang,et al. Website Fingerprinting: Attacks and Defenses , 2016 .
[13] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[14] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[15] Rachel Greenstadt,et al. A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.
[16] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[17] Tao Wang,et al. Improved website fingerprinting on Tor , 2013, WPES.
[18] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[19] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[20] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[21] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[22] Klaus Wehrle,et al. Website Fingerprinting at Internet Scale , 2016, NDSS.
[23] Xiang Cai,et al. Glove: A Bespoke Website Fingerprinting Defense , 2014, WPES.