The first SCION book, published in 2017, summarized the results of eight years of work by over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
The MPEG-DASH streaming video standard contains an information leak: even if the stream is encrypted, the segmentation prescribed by the standard causes content-dependent …
Website fingerprinting attacks enable an adversary to infer which website a victim is visiting, even if the victim uses an encrypting proxy, such as Tor. Previous work has shown that all …
Despite the widespread use of encryption techniques to provide confidentiality over Internet communications, mobile device users are still susceptible to privacy and security risks. In …
Web caching or web proxy has been considered as the prime vehicle of coping with the ever- increasing demand for information retrieval over the Internet, the WWW being a typical …
Smartphone apps have changed the way we interact with online services, but highly specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive …
The overall network traffic patterns generated by today's smartphones result from the typically large and diverse set of installed applications. In addition to the traffic generated by …
Smartphones and tablets are now ubiquitous in many people's lives and are used throughout the day in many public places. They are often connected to a wireless local area …
Active service discovery in Wi-Fi involves wireless stations broadcasting their Wi-Fi fingerprint, ie the SSIDs of their preferred wireless networks. The content of those Wi-Fi …