Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

[PDF][PDF] Website Fingerprinting at Internet Scale.

A Panchenko, F Lanze, J Pennekamp, T Engel… - NDSS, 2016 - nymity.ch
The website fingerprinting attack aims to identify the content (ie, a webpage accessed by a
client) of encrypted and anonymized connections by observing patterns of data flows such …

VC3: Trustworthy data analytics in the cloud using SGX

F Schuster, M Costa, C Fournet… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …

Homonit: Monitoring smart home apps from encrypted traffic

W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang… - Proceedings of the 2018 …, 2018 - dl.acm.org
Smart home is an emerging technology for intelligently connecting a large variety of smart
sensors and devices to facilitate automation of home appliances, lighting, heating and …

Practical timing side channel attacks against kernel space ASLR

R Hund, C Willems, T Holz - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Due to the prevalence of control-flow hijacking attacks, a wide variety of defense methods to
protect both user space and kernel space code have been developed in the past years. A …

Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail

KP Dyer, SE Coull, T Ristenpart… - 2012 IEEE symposium …, 2012 - ieeexplore.ieee.org
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …

Website fingerprinting in onion routing based anonymization networks

A Panchenko, L Niessen, A Zinnen… - Proceedings of the 10th …, 2011 - dl.acm.org
Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and
the content of communications from a local observer, ie, an entity that can eavesdrop the …

Analyzing android encrypted network traffic to identify user actions

M Conti, LV Mancini, R Spolaor… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Mobile devices can be maliciously exploited to violate the privacy of people. In most attack
scenarios, the adversary takes the local or remote control of the mobile device, by …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …