Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping
暂无分享,去创建一个
Nick Feamster | Arvind Narayanan | Danny Yuxing Huang | Noah Apthorpe | Dillon Reisman | A. Narayanan | N. Feamster | Noah J. Apthorpe | D. Huang | D. Reisman | Arvind Narayanan
[1] Edward W. Felten,et al. Timing attacks on Web privacy , 2000, CCS.
[2] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[3] Steven M. Bellovin,et al. A technique for counting natted hosts , 2002, IMW '02.
[4] Riccardo Bettati,et al. Analytical and empirical analysis of countermeasures to traffic analysis attacks , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..
[5] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[6] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[7] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[8] Dawn Xiaodong Song,et al. Fig: Automatic Fingerprint Generation , 2007, NDSS.
[9] Wei Wang,et al. Dependent link padding algorithms for low latency anonymity systems , 2008, CCS.
[10] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[11] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[12] Nikita Borisov,et al. Website Detection Using Remote Traffic Analysis , 2011, Privacy Enhancing Technologies.
[13] Tao Wang,et al. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.
[14] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[15] Nino Vincenzo Verde,et al. No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.
[16] Sang Hyuk Son,et al. Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics , 2014, Sensors.
[17] Hershel: single-packet os fingerprinting , 2014, SIGMETRICS.
[18] Xiang Cai,et al. Glove: A Bespoke Website Fingerprinting Defense , 2014, WPES.
[19] J. Alex Halderman,et al. A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.
[20] Nickolai Zeldovich,et al. Vuvuzela: scalable private messaging resistant to traffic analysis , 2015, SOSP.
[21] Karl N. Levitt,et al. Is Anybody Home? Inferring Activity From Smart Home Network Traffic , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[22] Dmitri Loguinov,et al. Hershel: Single-Packet OS Fingerprinting , 2014, IEEE/ACM Transactions on Networking.
[23] Paul E. Hoffman,et al. Specification for DNS over Transport Layer Security (TLS) , 2016, RFC.
[24] John C. Mitchell,et al. Evaluating the privacy properties of telephone metadata , 2016, Proceedings of the National Academy of Sciences.
[25] Tao Wang,et al. On Realistically Attacking Tor with Website Fingerprinting , 2016, Proc. Priv. Enhancing Technol..
[26] Mike Perry,et al. Toward an Efficient Website Fingerprinting Defense , 2015, ESORICS.
[27] Nick Feamster,et al. Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers , 2017, ArXiv.
[28] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[29] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[30] Nick Feamster,et al. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic , 2017, ArXiv.
[31] Nasir D. Memon,et al. Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis , 2017, NDSS.
[32] Tao Wang,et al. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks , 2017, USENIX Security Symposium.
[33] Dmitri Loguinov,et al. Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting , 2017, CCS.
[34] Nick Feamster,et al. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.
[35] Paul E. Hoffman,et al. DNS Queries over HTTPS (DoH) , 2018, RFC.
[36] Yuguang Fang,et al. EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis , 2018, IEEE Internet of Things Journal.
[37] Qiang Li,et al. Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices , 2018, USENIX Security Symposium.
[38] Nick Feamster,et al. A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation , 2018, IoT S&P@SIGCOMM.
[39] Oblivious DNS: practical privacy for DNS queries: published in PoPETS 2019 , 2018, ANRW.
[40] Nick Feamster,et al. Oblivious DNS: Practical Privacy for DNS Queries , 2018, Proc. Priv. Enhancing Technol..
[41] Dmitri Loguinov,et al. Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting , 2021, IEEE/ACM Transactions on Networking.