Dns over https detection using standard flow telemetry

K Jerabek, K Hynek, O Rysavy, I Burgetova - IEEE Access, 2023 - ieeexplore.ieee.org
The aim of DNS over HTTPS (DoH) is to enhance users' privacy by encrypting DNS.
However, it also enables adversaries to bypass security mechanisms that rely on inspecting …

Stop, Don't Click Here Anymore: Boosting Website Fingerprinting By Considering Sets of Subpages

A Mitseva, A Panchenko - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
A type of traffic analysis, website fingerprinting (WFP), aims to reveal the website a user
visits over an encrypted and anonymized connection by observing and analyzing data flow …

Fragmented visual attention in web browsing: weibull analysis of item visit times

A Putkonen, A Nioche, M Laine, C Kuuramo… - … on Information Retrieval, 2023 - Springer
Users often browse the web in an exploratory way, inspecting what they find interesting
without a specific goal. However, the temporal dynamics of visual attention during such …

Viceroy: Gdpr-/ccpa-compliant enforcement of verifiable accountless consumer requests

S Jordan, Y Nakatsuka, E Ozturk, A Paverd… - arXiv preprint arXiv …, 2021 - arxiv.org
Recent data protection regulations (such as GDPR and CCPA) grant consumers various
rights, including the right to access, modify or delete any personal information collected …

When browsing gets cluttered: exploring and modeling interactions of browsing clutter, browsing habits, and coping

R Ma, H Lassila, L Nurgalieva, J Lindqvist - Proceedings of the 2023 CHI …, 2023 - dl.acm.org
In this paper, we investigate browsing clutter, which refers to cluttered experiences of users
due to buildup of disorganized browser elements and information. We studied what users …

Formal Modeling and Analysis of User Activity Sequence in Online Social Networks: A Stochastic Petri Net-Based Approach

W Yu, J Kong, F Hao, J Li, Y Liu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The continuous interaction of users and information aggregation has become a social
phenomena over massive social media platforms. However, the uncertainty of users' …

TIGER: Tor Traffic Generator for Realistic Experiments

D Lopes, D Castro, D Barradas, N Santos - Proceedings of the 22nd …, 2023 - dl.acm.org
Tor is the most widely adopted anonymity network, helping safeguard the privacy of Internet
users, including journalists and human rights activists. However, effective attacks aimed at …

Tor Trace in Images: A Novel Multi-Tab Website Fingerprinting Attack With Object Detection

Y Xu, L Wang, J Chen, Q Zhou - The Computer Journal, 2024 - academic.oup.com
Website fingerprinting (WF) attacks on Tor enable a passive adversary to predict the
encrypted web browsing activity of a victim by matching the eavesdropped traffic with …

[PDF][PDF] Browser extensions for post-secondary students with disabilities

C Fichten, R Arcuri, C Vo… - … of Education and …, 2023 - cfichten.dawsoncollege.qc.ca
Our objective, in two investigations, was:(1) to provide a listing of safe browser extensions
for Google Chrome that are likely to be useful for college students with disabilities, and (2) to …

[HTML][HTML] Mining Metrics for Enhancing E-Commerce Systems User Experience

A Stefani - Intelligent Information Management, 2022 - scirp.org
The diversity of e-commerce Business to Consumer systems and the significant increase in
their use during the COVID-19 pandemic as a one of the primary channels of retail …