Website Fingerprinting Defenses at the Application Layer

@article{Cherubin2017WebsiteFD,
  title={Website Fingerprinting Defenses at the Application Layer},
  author={Giovanni Cherubin and Jamie Hayes and Marc Ju{\'a}rez},
  journal={PoPETs},
  year={2017},
  volume={2017},
  pages={186-203}
}
Website Fingerprinting (WF) allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 20 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-10 OF 27 REFERENCES

A golang implementation of the kNN website fingerprinting attack

  • T. Pulls
  • "https://github.com/pylls/go-knn",
  • 2016

Similar Papers

Loading similar papers…