We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Measuring Information Leakage in Website Fingerprinting Attacks and Defenses

Abstract: Tor provides low-latency anonymous and uncensored network access against a local or network adversary. Due to the design choice to minimize traffic overhead (and increase the pool of potential users) Tor allows some information about the client's connections to leak. Attacks using (features extracted from) this information to infer the website a user visits are called Website Fingerprinting (WF) attacks. We develop a methodology and tools to measure the amount of leaked information about a website. We apply this tool to a comprehensive set of features extracted from a large set of websites and WF defense mechanisms, allowing us to make more fine-grained observations about WF attacks and defenses.
Comments: In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18)
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:1710.06080 [cs.CR]
  (or arXiv:1710.06080v2 [cs.CR] for this version)

Submission history

From: Shuai Li [view email]
[v1] Tue, 17 Oct 2017 03:55:24 GMT (482kb,D)
[v2] Wed, 5 Jun 2019 00:56:03 GMT (1074kb)

Link back to: arXiv, form interface, contact.