Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
A survey on encrypted network traffic analysis applications, techniques, and countermeasures
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …
encryption protocols to secure communications and protect the privacy of users. In addition …
[PDF][PDF] Website Fingerprinting at Internet Scale.
The website fingerprinting attack aims to identify the content (ie, a webpage accessed by a
client) of encrypted and anonymized connections by observing patterns of data flows such …
client) of encrypted and anonymized connections by observing patterns of data flows such …
VC3: Trustworthy data analytics in the cloud using SGX
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …
computations in the cloud while kee** their code and data secret, and ensuring the …
Homonit: Monitoring smart home apps from encrypted traffic
Smart home is an emerging technology for intelligently connecting a large variety of smart
sensors and devices to facilitate automation of home appliances, lighting, heating and …
sensors and devices to facilitate automation of home appliances, lighting, heating and …
Practical timing side channel attacks against kernel space ASLR
Due to the prevalence of control-flow hijacking attacks, a wide variety of defense methods to
protect both user space and kernel space code have been developed in the past years. A …
protect both user space and kernel space code have been developed in the past years. A …
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …
identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can …
Website fingerprinting in onion routing based anonymization networks
A Panchenko, L Niessen, A Zinnen… - Proceedings of the 10th …, 2011 - dl.acm.org
Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and
the content of communications from a local observer, ie, an entity that can eavesdrop the …
the content of communications from a local observer, ie, an entity that can eavesdrop the …
Analyzing android encrypted network traffic to identify user actions
Mobile devices can be maliciously exploited to violate the privacy of people. In most attack
scenarios, the adversary takes the local or remote control of the mobile device, by …
scenarios, the adversary takes the local or remote control of the mobile device, by …
The Complete Guide to SCION
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …