Touching from a distance: Website fingerprinting attacks and defenses

X Cai, XC Zhang, B Joshi, R Johnson - … of the 2012 ACM conference on …, 2012 - dl.acm.org
We present a novel web page fingerprinting attack that is able to defeat several recently
proposed defenses against traffic analysis attacks, including the application-level defenses …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

Beauty and the burst: Remote identification of encrypted video streams

R Schuster, V Shmatikov, E Tromer - 26th USENIX Security Symposium …, 2017 - usenix.org
The MPEG-DASH streaming video standard contains an information leak: even if the stream
is encrypted, the segmentation prescribed by the standard causes content-dependent …

Cs-buflo: A congestion sensitive website fingerprinting defense

X Cai, R Nithyanand, R Johnson - Proceedings of the 13th Workshop on …, 2014 - dl.acm.org
Website fingerprinting attacks enable an adversary to infer which website a victim is visiting,
even if the victim uses an encrypting proxy, such as Tor. Previous work has shown that all …

Deep learning for encrypted traffic classification and unknown data detection

MH Pathmaperuma, Y Rahulamathavan, S Dogan… - Sensors, 2022 - mdpi.com
Despite the widespread use of encryption techniques to provide confidentiality over Internet
communications, mobile device users are still susceptible to privacy and security risks. In …

On the optimal placement of web proxies in the internet

B Li, MJ Golin, GF Italiano, X Deng… - IEEE INFOCOM'99 …, 1999 - ieeexplore.ieee.org
Web caching or web proxy has been considered as the prime vehicle of coping with the ever-
increasing demand for information retrieval over the Internet, the WWW being a typical …

Eavesdropping on {Fine-Grained} user activities within smartphone apps over encrypted network traffic

B Saltaformaggio, H Choi, K Johnson, Y Kwon… - 10th USENIX workshop …, 2016 - usenix.org
Smartphone apps have changed the way we interact with online services, but highly
specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive …

Who do you sync you are? smartphone fingerprinting via application behaviour

T Stöber, M Frank, J Schmitt, I Martinovic - Proceedings of the sixth ACM …, 2013 - dl.acm.org
The overall network traffic patterns generated by today's smartphones result from the
typically large and diverse set of installed applications. In addition to the traffic generated by …

I know what you did on your smartphone: Inferring app usage over encrypted data traffic

Q Wang, A Yahyavi, B Kemme… - 2015 IEEE conference on …, 2015 - ieeexplore.ieee.org
Smartphones and tablets are now ubiquitous in many people's lives and are used
throughout the day in many public places. They are often connected to a wireless local area …

Linking wireless devices using information contained in Wi-Fi probe requests

M Cunche, MA Kaafar, R Boreli - Pervasive and Mobile Computing, 2014 - Elsevier
Active service discovery in Wi-Fi involves wireless stations broadcasting their Wi-Fi
fingerprint, ie the SSIDs of their preferred wireless networks. The content of those Wi-Fi …