Effective defense against fingerprinting attack based on autocorrelation property minimization approach
暂无分享,去创建一个
[1] Giovanni Cherubin,et al. Website Fingerprinting Defenses at the Application Layer , 2017, Proc. Priv. Enhancing Technol..
[2] Saeed Jalili,et al. A novel passive website fingerprinting attack on tor using fast fourier transform , 2016, Comput. Commun..
[3] Klaus Wehrle,et al. Website Fingerprinting at Internet Scale , 2016, NDSS.
[4] Mike Perry,et al. WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor , 2015, ArXiv.
[5] Riccardo Bettati,et al. On Flow Correlation Attacks and Countermeasures in Mix Networks , 2004, Privacy Enhancing Technologies.
[6] Andrew Hintz,et al. Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.
[7] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.
[8] Ian Goldberg,et al. Walkie-Talkie: An Effective and Efficient Defense against Website Fingerprinting , 2015 .
[9] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[10] Rachel Greenstadt,et al. A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.
[11] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[12] Ming Yang,et al. A novel Website Fingerprinting attack against multi-tab browsing behavior , 2015, 2015 IEEE 19th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[13] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[14] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[15] Ming Yang,et al. A novel active website fingerprinting attack against Tor anonymous system , 2014, Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[16] Xiang Cai,et al. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense , 2014, WPES.
[17] Hu Chuan-Gan,et al. On The Shift Register Sequences , 2004 .
[18] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[19] Tao Wang,et al. Improved website fingerprinting on Tor , 2013, WPES.
[20] Yi Shi,et al. Fingerprinting Attack on the Tor Anonymity System , 2009, ICICS.
[21] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[22] Tao Wang,et al. Comparing Website Fingerprinting Attacks and Defenses , 2013 .
[23] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[24] George Danezis,et al. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique , 2015, USENIX Security Symposium.
[25] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[26] Xiapu Luo,et al. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows , 2011, NDSS.
[27] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.