Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic

N Apthorpe, D Reisman, S Sundaresan… - arXiv preprint arXiv …, 2017 - arxiv.org
The growing market for smart home IoT devices promises new conveniences for consumers
while presenting new challenges for preserving privacy within the home. Many smart home …

Keeping the smart home private with smart (er) iot traffic shaping

N Apthorpe, DY Huang, D Reisman… - arXiv preprint arXiv …, 2018 - arxiv.org
The proliferation of smart home Internet of Things (IoT) devices presents unprecedented
challenges for preserving privacy within the home. In this paper, we demonstrate that a …

Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail

KP Dyer, SE Coull, T Ristenpart… - 2012 IEEE symposium …, 2012 - ieeexplore.ieee.org
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …

Inferring the source of encrypted HTTP connections

M Liberatore, BN Levine - Proceedings of the 13th ACM conference on …, 2006 - dl.acm.org
We examine the effectiveness of two traffic analysis techniques for identifying encrypted
HTTP streams. The techniques are based upon classification algorithms, identifying …

Is anybody home? inferring activity from smart home network traffic

B Copos, K Levitt, M Bishop… - 2016 IEEE Security and …, 2016 - ieeexplore.ieee.org
As smart home devices are introduced into our homes, security and privacy concerns are
being raised. Smart home devices collect, exchange, and transmit various data about the …

Timing analysis in low-latency mix networks: Attacks and defenses

V Shmatikov, MH Wang - … –ESORICS 2006: 11th European Symposium on …, 2006 - Springer
Mix networks are a popular mechanism for anonymous Internet communications. By routing
IP traffic through an overlay chain of mixes, they aim to hide the relationship between its …

Privacy vulnerabilities in encrypted HTTP streams

GD Bissias, M Liberatore, D Jensen… - … Workshop, PET 2005 …, 2006 - Springer
Encrypting traffic does not prevent an attacker from performing some types of traffic analysis.
We present a straightforward traffic analysis attack against encrypted HTTP streams that is …

On flow correlation attacks and countermeasures in mix networks

Y Zhu, X Fu, B Graham, R Bettati, W Zhao - … Enhancing Technologies: 4th …, 2005 - Springer
In this paper, we address issues related to flow correlation attacks and the corresponding
countermeasures in mix networks. Mixes have been used in many anonymous …

I can hear your alexa: Voice command fingerprinting on smart home speakers

S Kennedy, H Li, C Wang, H Liu… - 2019 IEEE Conference …, 2019 - ieeexplore.ieee.org
Millions of smart home speakers, such as Amazon Echo and Google Home, have been
purchased by US consumers. However, the security and privacy of smart home speakers …

A developer-friendly library for smart home iot privacy-preserving traffic obfuscation

T Datta, N Apthorpe, N Feamster - Proceedings of the 2018 workshop on …, 2018 - dl.acm.org
The number and variety of Internet-connected devices have grown enormously in the past
few years, presenting new challenges to security and privacy. Research has shown that …