Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1997–2011https://doi.org/10.1145/3658644.3670272Website Fingerprinting (WF) attacks identify the websites visited by users by performing traffic analysis, compromising user privacy. Particularly, DL-based WF attacks demonstrate impressive attack performance. However, the effectiveness of DL-based WF ...
- research-articleNovember 2024
Defending Against Deep Learning-Based Traffic Fingerprinting Attacks With Adversarial Examples
ACM Transactions on Privacy and Security (TOPS), Volume 28, Issue 1Article No.: 1, Pages 1–23https://doi.org/10.1145/3698591In an increasingly digital and interconnected world, online anonymity and privacy are paramount issues for Internet users. To address this, tools like The Onion Router (Tor) offer anonymous and private communication by routing traffic through multiple ...
- research-articleOctober 2024
TFAN: A Task-adaptive Feature Alignment Network for few-shot website fingerprinting attacks on Tor
AbstractFew-shot website fingerprinting (WF) attacks aim to infer which website a user browsed through anonymity networks, such as Tor, using limited labeled traces. Recent methods either adopt complex metric strategies or perform time-consuming transfer ...
- review-articleMay 2024
Security, information, and structure characterization of Tor: a survey
Telecommunications Systems (TESY), Volume 87, Issue 1Pages 239–255https://doi.org/10.1007/s11235-024-01149-yAbstractContent on the World Wide Web that is not indexable by standard search engines defines a category called the deep Web. Dark networks are a subset of the deep Web. They provide services of great interest to users who seek online anonymity during ...
- research-articleOctober 2024
FlowCorrGCN: Enhancing Flow Correlation Through Graph Convolutional Networks and Triplet Networks
International Journal of Intelligent Systems (IJIS), Volume 2024https://doi.org/10.1155/2024/8823511Anonymous network tracing is a significant research subject in the field of network security, and flow correlation technology serves as a fundamental technique for deanonymizing network traffic. Existing flow correlation techniques are considered ...
-
- research-articleFebruary 2024
A comprehensive analysis of website fingerprinting defenses on Tor
AbstractWebsite fingerprinting (WF) enables eavesdroppers to identify the website a user is visiting by network surveillance, even if the traffic is protected by anonymous communication technologies such as Tor. To avoid this, several defense schemes ...
- ArticleDecember 2023
Dynamic Security Aspects of Onion Routing
AbstractAn anonymous communication network (ACN) is designed to protect the identities of two parties communicating through it, even if an adversary controls or observes parts of the network. Among the ACNs, Tor represents a practical trade-off between ...
- research-articleMarch 2024
A practical multi-tab website fingerprinting attack
Journal of Information Security and Applications (JISA), Volume 79, Issue Chttps://doi.org/10.1016/j.jisa.2023.103627AbstractThe rapid development of Internet of Things technology has allowed a massive number of devices to be connected, resulting in a lot of private data being transmitted over the network. To protect the security and privacy, anonymous communication ...
- research-articleNovember 2023
Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-Funnels
Proceedings of the ACM on Networking (PACMNET), Volume 1, Issue CoNEXT3Article No.: 18, Pages 1–26https://doi.org/10.1145/3629140Anonymous communication systems are essential tools for preserving privacy and freedom of expression. However, traffic analysis attacks make it challenging to maintain unlinkability in circuit-based anonymity networks like Tor, enabling adversaries to ...
- research-articleNovember 2024
ParTEETor: A System for Partial Deployments of TEEs within Tor
- Rachel King,
- Quinn Burke,
- Yohan Beugin,
- Blaine Hoak,
- Kunyang Li,
- Eric Pauley,
- Ryan Sheatsley,
- Patrick McDaniel
WPES '24: Proceedings of the 23rd Workshop on Privacy in the Electronic SocietyPages 40–46https://doi.org/10.1145/3689943.3696203The Tor anonymity network allows users such as political activists and those under repressive governments to protect their privacy when communicating over the internet. At the same time, Tor has been demonstrated to be vulnerable to several classes of ...
- research-articleSeptember 2023
Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor
AbstractTor is the most popular anonymization network with millions of daily users. This makes it an attractive target for attacks, e.g., by malicious autonomous systems (ASs) performing active routing attacks to become man in the middle and deanonymize ...
- research-articleSeptember 2023
An extended view on measuring tor AS-level adversaries
- Gabriel K. Gegenhuber,
- Markus Maier,
- Florian Holzbauer,
- Wilfried Mayer,
- Georg Merzdovnik,
- Edgar Weippl,
- Johanna Ullrich
Highlights- Update on Tor AS-level adversaries (comparison of measurement results for IPv4 in 2020 and 2022).
- Measuring AS-level adversaries for IPv6.
- Measuring AS-level adversaries in censored countries (case study, based on popular clients ...
Tor provides anonymity to millions of users around the globe which has made it a valuable target for malicious actors. As a low-latency anonymity system, it is vulnerable to traffic correlation attacks from strong passive adversaries such as ...
- research-articleAugust 2023
Cheaper than you thought? A dive into the darkweb market of cyber-crime products
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 106, Pages 1–10https://doi.org/10.1145/3600160.3605012The darkweb is nowadays considered a very popular place to sell and buy illegal cyber-crime related content. From botnet services and malware, to user data such as credit card information and passwords, darkweb marketplaces offer ease of use, product ...
- short-paperAugust 2023
Modeling Tor Network Growth by Extrapolating Consensus Data
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 29, Pages 1–7https://doi.org/10.1145/3600160.3600164Since the Tor network is evolving into an infrastructure for anonymous communication, analyzing the consequences of network growth is becoming more relevant than ever. In particular, adding large amounts of resources may have unintentional consequences ...
- ArticleNovember 2023
AAP: Defending Against Website Fingerprinting Through Burst Obfuscation
AbstractWebsite fingerprinting enables eavesdroppers to identify the website a user is visiting by network surveillance, even if the traffic is protected by anonymous communication technologies such as Tor. To defend against website fingerprinting attacks,...
- ArticleAugust 2023
Temporal Analysis of Privacy Enhancing Technology Traffic Using Deep Learning
Security and Privacy in Social Networks and Big DataPages 239–251https://doi.org/10.1007/978-981-99-5177-2_14AbstractTor is an open-source communications software program that enables anonymity on the Internet. Tor’s ability to hide its users’ identity means it is incredibly popular with criminals, who use it to keep their online activities secret from law ...
- ArticleJune 2023
Tiny WFP: Lightweight and Effective Website Fingerprinting via Wavelet Multi-Resolution Analysis
AbstractNetwork eavesdroppers can determine which website Tor users visit by analyzing encrypted traffic traces with the Website Fingerprinting (WF) attack. WF attacks based on Deep Learning, like Deep Fingerprinting (DF) outperformed traditional ...
- ArticleDecember 2023
- review-articleMarch 2023
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions
Journal of Network and Computer Applications (JNCA), Volume 212, Issue Chttps://doi.org/10.1016/j.jnca.2023.103582AbstractTor is one of the most popular anonymity networks that allows Internet users to hide their browsing activity. Hiding browsing activity is essential for Internet users to increase their privacy. Only Tor users should know the website ...
Graphical abstractDisplay Omitted
Highlights- We reviewed studies related to WF on Tor which encompass 12 years of research.
- ...
- research-articleDecember 2022
Sliding window based ON/OFF flow watermarking on Tor
Computer Communications (COMS), Volume 196, Issue CPages 66–75https://doi.org/10.1016/j.comcom.2022.09.028AbstractTo analyze traffic in the anonymity network, an active network flow watermark scheme, the ON/OFF watermarking, is proposed to embed timing information into the network flow. This scheme exploits a technique that drops packets at ...