Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic
暂无分享,去创建一个
Qi Zhang | Xiangyu Zhang | Dongyan Xu | Kristen Johnson | Hongjun Choi | Yonghwi Kwon | Brendan Saltaformaggio | John Qian | Qi Zhang | X. Zhang | Dongyan Xu | Yonghwi Kwon | Brendan Saltaformaggio | Hongjun Choi | Kristen Johnson | J. Qian
[1] Ivan Martinovic,et al. Who do you sync you are?: smartphone fingerprinting via application behaviour , 2013, WiSec '13.
[2] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[3] Deborah Estrin,et al. A first look at traffic on smartphones , 2010, IMC '10.
[4] Scott E. Coull,et al. Traffic Analysis of Encrypted Messaging Services: Apple iMessage and Beyond , 2014, CCRV.
[5] Charles V. Wright,et al. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.
[6] Anja Feldmann,et al. Understanding online social network usage from a network perspective , 2009, IMC '09.
[7] Christopher Krügel,et al. Prospex: Protocol Specification Extraction , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[8] Qiang Xu,et al. Automatic generation of mobile app signatures from traffic observations , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[9] R. Weiss,et al. Sex on demand: geosocial networking phone apps and risk of sexually transmitted infections among a cross-sectional sample of men who have sex with men in Los Angeles county , 2014, Sexually Transmitted Infections.
[10] Christopher. Simons,et al. Machine learning with Python , 2017 .
[11] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[12] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] Xun Gong,et al. Fingerprinting websites using remote traffic analysis , 2010, CCS '10.
[14] Fulvio Risso,et al. Per-user policy enforcement on mobile apps through network functions virtualization , 2014, MobiArch '14.
[15] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[16] Andrew W. Moore,et al. A Machine Learning Approach for Efficient Traffic Classification , 2007, 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.
[17] Stefan Savage,et al. Unexpected means of protocol inference , 2006, IMC '06.
[18] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[19] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[20] Li Guo,et al. Inferring Protocol State Machine from Network Traces: A Probabilistic Approach , 2011, ACNS.
[21] Iulian Neamtiu,et al. Targeted and depth-first exploration for systematic testing of android apps , 2013, OOPSLA.
[22] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[23] Fan Zhang,et al. Inferring users' online activities through traffic analysis , 2011, WiSec '11.
[24] Nino Vincenzo Verde,et al. Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.
[25] Li Guo,et al. A semantics aware approach to automated reverse engineering unknown protocols , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[26] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.
[27] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[28] Dawn Xiaodong Song,et al. Understanding Mobile App Usage Patterns Using In-App Advertisements , 2013, PAM.
[29] Charles V. Wright,et al. On Inferring Application Protocol Behaviors in Encrypted Network Traffic , 2006, J. Mach. Learn. Res..
[30] Michalis Faloutsos,et al. ProfileDroid: multi-layer profiling of android applications , 2012, Mobicom '12.
[31] Qiang Xu,et al. Identifying diverse usage behaviors of smartphone apps , 2011, IMC '11.
[32] Ling Huang,et al. I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis , 2014, Privacy Enhancing Technologies.
[33] Nino Vincenzo Verde,et al. No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.
[34] Dawn Xiaodong Song,et al. NetworkProfiler: Towards automatic fingerprinting of Android apps , 2013, 2013 Proceedings IEEE INFOCOM.
[35] Klara Nahrstedt,et al. Identity, location, disease and more: inferring your secrets from android public resources , 2013, CCS.
[36] Fabian Monrose,et al. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks , 2011, 2011 IEEE Symposium on Security and Privacy.
[37] Charles V. Wright,et al. HMM profiles for network traffic classification , 2004, VizSEC/DMSEC '04.
[38] Porfirio Tramontana,et al. Using GUI ripping for automated testing of Android applications , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[39] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[40] Helen J. Wang,et al. Discoverer: Automatic Protocol Reverse Engineering from Network Traces , 2007, USENIX Security Symposium.
[41] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[42] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[43] Nino Vincenzo Verde,et al. Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis , 2014, CODASPY.