Protecting against website fingerprinting with multihoming

S Henri, G Garcia-Aviles, P Serrano… - Proceedings on …, 2020 - petsymposium.org
Anonymous communication tools, such as Tor, are extensively employed by users who want
to keep their web activity private. But recent works have shown that when a local, passive …

Traffic analysis attacks on tor: A survey

L Basyoni, N Fetais, A Erbad… - … on Informatics, IoT …, 2020 - ieeexplore.ieee.org
The Tor anonymity network is one of the most popular and widely used tools to protect the
privacy of online users. Tor provides defenses against multiple adversarial activities aiming …

A game-theoretically optimal defense paradigm against traffic analysis attacks using multipath routing and deception

M Abolfathi, I Shomorony, A Vahid… - Proceedings of the 27th …, 2022 - dl.acm.org
While encryption can protect network traffic against simple on-path eavesdrop** attacks, it
cannot prevent sophisticated traffic analysis (TA) attacks from inferring sensitive information …

[HTML][HTML] Website Fingerprinting in the Age of QUIC

JP Smith - 2021 - research-collection.ethz.ch
∩ ç* A&h*╣▌±* bêhHåÜPüΣB╚£** åΦFα²* ü≈ néI£=⌐╟«* i=@ ìµ¥ º÷ ƒ╞ ÿq≡@┌*╢╪|
&E╛═ d {╛ ï⌠ g, ï|╙ t4╙ ëMJ=@±Åm^∩ Ö≥╝ ²áì┌ sXCº*┌\* ασ: væúπ▌─ …

{QCSD}: A {QUIC}{Client-Side}{Website-Fingerprinting} Defence Framework

JP Smith, L Dolfi, P Mittal, A Perrig - 31st USENIX Security Symposium …, 2022 - usenix.org
Website fingerprinting attacks, which analyse the metadata of encrypted network
communication to identify visited websites, have been shown to be effective on privacy …

Towards reproducible network traffic analysis

J Holland, P Schmitt, P Mittal, N Feamster - arxiv preprint arxiv …, 2022 - arxiv.org
Analysis techniques are critical for gaining insight into network traffic given both the higher
proportion of encrypted traffic and increasing data rates. Unfortunately, the domain of …

Website data transparency in the browser

S Zimmeck, D Goldelman, O Kaplan… - Proceedings on …, 2024 - petsymposium.org
Data collection by websites and their integrated third parties is often not transparent. We
design privacy interfaces for the browser to help people understand who is collecting which …

SMRT: An Effective Malicious Node Resistance Design for Mixnets

J Zou, Z Tan, Y Huang, Y Chen… - 2022 7th IEEE …, 2022 - ieeexplore.ieee.org
With the increasing requirement of communication privacy protection, anonymous
communication networks are widely used to transmit sensitive data or important business …

Enhancing Encrypted Network Traffic Security Against Advanced Traffic Analysis Attacks

M Abolfathi - 2024 - search.proquest.com
In the evolving domain of wireless communication, the necessity to secure encrypted
network traffic against Traffic Analysis (TA) attacks is paramount. By exploiting patterns in …