Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

Robustbench: a standardized adversarial robustness benchmark

F Croce, M Andriushchenko, V Sehwag… - arXiv preprint arXiv …, 2020 - arxiv.org
As a research community, we are still lacking a systematic understanding of the progress on
adversarial robustness which often makes it hard to identify the most promising ideas in …

The rise of website fingerprinting on Tor: Analysis on techniques and assumptions

MAIM Aminuddin, ZF Zaaba, A Samsudin, F Zaki… - Journal of Network and …, 2023 - Elsevier
Tor is one of the most popular anonymity networks that allows Internet users to hide their
browsing activity. Hiding browsing activity is essential for Internet users to increase their …

Subverting website fingerprinting defenses with robust traffic representation

M Shen, K Ji, Z Gao, Q Li, L Zhu, K Xu - 32nd USENIX Security …, 2023 - usenix.org
Anonymity networks, eg, Tor, are vulnerable to various website fingerprinting (WF) attacks,
which allows attackers to perceive user privacy on these networks. However, the defenses …

Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations

M Nasr, A Bahramali, A Houmansadr - 30th USENIX Security …, 2021 - usenix.org
Deep neural networks (DNNs) are commonly used for various traffic analysis problems, such
as website fingerprinting and flow correlation, as they outperform traditional (eg, statistical) …

Paradefender: A scenario-driven parallel system for defending metaverses

J Han, M Yang, X Chen, H Liu, Y Wang… - … on Systems, Man …, 2022 - ieeexplore.ieee.org
The metaverse, as an instance of cyber–physical–social systems (CPSS) that originates in
cyber–physical systems (CPS), features growing complexity, and diversity in terms of …

Sok: A critical evaluation of efficient website fingerprinting defenses

N Mathews, JK Holland, SE Oh… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Recent website fingerprinting attacks have been shown to achieve very high performance
against traffic through Tor. These attacks allow an adversary to deduce the website a Tor …

Black-box Adversarial Example Attack towards {FCG} Based Android Malware Detection under Incomplete Feature Information

H Li, Z Cheng, B Wu, L Yuan, C Gao, W Yuan… - 32nd USENIX Security …, 2023 - usenix.org
The function call graph (FCG) based Android malware detection methods have recently
attracted increasing attention due to their promising performance. However, these methods …

Active learning for network traffic classification: a technical study

A Shahraki, M Abbasi, A Taherkordi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Network Traffic Classification (NTC) has become an important feature in various network
management operations, eg, Quality of Service (QoS) provisioning and security services …

Robust multi-tab website fingerprinting attacks in the wild

X Deng, Q Yin, Z Liu, X Zhao, Q Li… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Website fingerprinting enables an eavesdropper to determine which websites a user is
visiting over an encrypted connection. State-of-the-art website fingerprinting (WF) attacks …