A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

[PDF][PDF] Website Fingerprinting at Internet Scale.

A Panchenko, F Lanze, J Pennekamp, T Engel… - NDSS, 2016 - nymity.ch
The website fingerprinting attack aims to identify the content (ie, a webpage accessed by a
client) of encrypted and anonymized connections by observing patterns of data flows such …

k-fingerprinting: A robust scalable website fingerprinting technique

J Hayes, G Danezis - … USENIX Security Symposium (USENIX Security 16 …, 2016 - usenix.org
Website fingerprinting enables an attacker to infer which web page a client is browsing
through encrypted or anonymized network connections. We present a new website …

Effective attacks and provable defenses for website fingerprinting

T Wang, X Cai, R Nithyanand, R Johnson… - 23rd USENIX Security …, 2014 - usenix.org
Website fingerprinting attacks allow a local, passive eavesdropper to identify a user's web
activity by leveraging packet sequence information. These attacks break the privacy …

{Walkie-Talkie}: An efficient defense against passive website fingerprinting attacks

T Wang, I Goldberg - … USENIX Security Symposium (USENIX Security 17 …, 2017 - usenix.org
Website fingerprinting (WF) is a traffic analysis attack that allows an eavesdropper to
determine the web activity of a client, even if the client is using privacy technologies such as …

Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail

KP Dyer, SE Coull, T Ristenpart… - 2012 IEEE symposium …, 2012 - ieeexplore.ieee.org
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …

A critical evaluation of website fingerprinting attacks

M Juarez, S Afroz, G Acar, C Diaz… - Proceedings of the 2014 …, 2014 - dl.acm.org
Recent studies on Website Fingerprinting (WF) claim to have found highly effective attacks
on Tor. However, these studies make assumptions about user settings, adversary …

Touching from a distance: Website fingerprinting attacks and defenses

X Cai, XC Zhang, B Joshi, R Johnson - … of the 2012 ACM conference on …, 2012 - dl.acm.org
We present a novel web page fingerprinting attack that is able to defeat several recently
proposed defenses against traffic analysis attacks, including the application-level defenses …

Toward an efficient website fingerprinting defense

M Juarez, M Imani, M Perry, C Diaz… - … Security–ESORICS 2016 …, 2016 - Springer
Website Fingerprinting attacks enable a passive eavesdropper to recover the user's
otherwise anonymized web browsing activity by matching the observed traffic with …