Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
@article{Rahman2020TikTokTU, title={Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks}, author={M. S. Rahman and Payap Sirinam and Nate Mathews and K. Gangadhara and M. Wright}, journal={Proceedings on Privacy Enhancing Technologies}, year={2020}, volume={2020}, pages={5 - 24} }
Abstract A passive local eavesdropper can leverage Website Fingerprinting (WF) to deanonymize the web browsing activity of Tor users. The value of timing information to WF has often been discounted in recent works due to the volatility of low-level timing information. In this paper, we more carefully examine the extent to which packet timing can be used to facilitate WF attacks. We first propose a new set of timing-related features based on burst-level characteristics to further identify more… Expand
Figures, Tables, and Topics from this paper
9 Citations
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2021
- 8
- PDF
Fingerprinting encrypted voice traffic on smart speakers with deep learning
- Computer Science
- WISEC
- 2020
- 2
- PDF
References
SHOWING 1-10 OF 40 REFERENCES
Automated Website Fingerprinting through Deep Learning
- Computer Science
- NDSS
- 2018
- 82
- Highly Influential
- PDF
Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning
- Computer Science
- CCS
- 2019
- 14
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks
- Computer Science
- USENIX Security Symposium
- 2017
- 83
- Highly Influential
- PDF
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
- Computer Science
- CCS
- 2018
- 91
- PDF
Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning
- Computer Science
- Proc. Priv. Enhancing Technol.
- 2019
- 24
- PDF
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
- Computer Science
- 2012 IEEE Symposium on Security and Privacy
- 2012
- 310
- PDF