메뉴 건너뛰기




Volumn , Issue , 2012, Pages 605-616

Touching from a distance: Website fingerprinting attacks and defenses

Author keywords

Anonymity; Website fingerprinting attacks

Indexed keywords

ANONYMITY; NETWORK BEHAVIORS; PROVABLE SECURITY; TRAFFIC ANALYSIS;

EID: 84869419567     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382260     Document Type: Conference Paper
Times cited : (367)

References (28)
  • 1
    • 84865203025 scopus 로고    scopus 로고
    • Good edit similarity learning by loss minimization
    • Aurelien Bellet, Amaury Habrard, and Marc Sebban. Good edit similarity learning by loss minimization. Machine Learning, 2012.
    • (2012) Machine Learning
    • Bellet, A.1    Habrard, A.2    Sebban, M.3
  • 7
    • 84870629473 scopus 로고    scopus 로고
    • Facebook. http://www.facebook.com/.
  • 9
    • 78650031731 scopus 로고    scopus 로고
    • Fingerprinting websites using remote traffic analysis
    • Xun Gong, Negar Kiyavash, and Nikita Borisov. Fingerprinting websites using remote traffic analysis. In ACM CCS, 2010.
    • (2010) ACM CCS
    • Gong, X.1    Kiyavash, N.2    Borisov, N.3
  • 11
    • 6344251217 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • Andrew Hintz. Fingerprinting websites using traffic analysis. In Privacy Enhancing Technologies. 2003.
    • (2003) Privacy Enhancing Technologies
    • Hintz, A.1
  • 13
    • 34547350876 scopus 로고    scopus 로고
    • Inferring the source of encrypted http connections
    • Marc Liberatore and Brian Neil Levine. Inferring the source of encrypted http connections. In ACM CCS, 2006.
    • (2006) ACM CCS
    • Liberatore, M.1    Levine, B.N.2
  • 14
    • 84861117400 scopus 로고    scopus 로고
    • Website fingerprinting and identification using ordered feature sequences
    • Liming Lu, Ee-Chien Chang, and Mun Chan. Website fingerprinting and identification using ordered feature sequences. In ESORICS. 2010.
    • (2010) ESORICS
    • Lu, L.1    Chang, E.-C.2    Chan, M.3
  • 15
    • 84893410867 scopus 로고    scopus 로고
    • HTTPOS: Sealing information leaks with browser-side obfuscation of encrypted OWS
    • Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci. HTTPOS: Sealing information leaks with browser-side obfuscation of encrypted ows. In NDSS, 2011.
    • (2011) NDSS
    • Luo, X.1    Zhou, P.2    Chan, E.W.W.3    Lee, W.4    Chang, R.K.C.5    Perdisci, R.6
  • 16
    • 0345566149 scopus 로고    scopus 로고
    • A guided tour to approximate string matching
    • March
    • Gonzalo Navarro. A guided tour to approximate string matching. ACM Comput. Surv., 33:31-88, March 2001.
    • (2001) ACM Comput. Surv. , vol.33 , pp. 31-88
    • Navarro, G.1
  • 19
    • 76549110566 scopus 로고    scopus 로고
    • Fingerprinting attack on the Tor anonymity system
    • volume 5927 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg
    • Yi Shi and Kanta Matsuura. Fingerprinting attack on the Tor anonymity system. In Information and Communications Security, volume 5927 of Lecture Notes in Computer Science, pages 425-438. Springer Berlin / Heidelberg, 2009.
    • (2009) Information and Communications Security , pp. 425-438
    • Shi, Y.1    Matsuura, K.2
  • 26
    • 80755134983 scopus 로고    scopus 로고
    • Traffic morphing: An efficient defense against statistical traffic analysis
    • Charles V. Wright, Scott E. Coull, and Fabian Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS, 2009.
    • (2009) NDSS
    • Wright, C.V.1    Coull, S.E.2    Monrose, F.3
  • 27
    • 84910614609 scopus 로고    scopus 로고
    • Attacking anonymous web browsing at local area networks through browsing dynamics
    • Shui Yu, Wanlei Zhou, Weijia Jia, and Jiankun Hu. Attacking anonymous web browsing at local area networks through browsing dynamics. The Computer Journal, 2011.
    • (2011) The Computer Journal
    • Yu, S.1    Zhou, W.2    Jia, W.3    Hu, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.