-
3
-
-
84869486953
-
Touching from a distance: Website fingerprinting attacks and defenses
-
Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. Touching from a distance: Website fingerprinting attacks and defenses. Technical Report SPLAT-TR-12-01, Stony Brook University, 2012.
-
(2012)
Technical Report SPLAT-TR-12-01, Stony Brook University
-
-
Cai, X.1
Zhang, X.C.2
Joshi, B.3
Johnson, R.4
-
6
-
-
84878355718
-
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
-
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, and Thomas Shrimpton. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In Proceedings of the 33rd Annual IEEE Symposium on Security and Privacy, 2012.
-
(2012)
Proceedings of the 33rd Annual IEEE Symposium on Security and Privacy
-
-
Dyer, K.P.1
Coull, S.E.2
Ristenpart, T.3
Shrimpton, T.4
-
7
-
-
84870629473
-
-
Facebook. http://www.facebook.com/.
-
-
-
-
9
-
-
78650031731
-
Fingerprinting websites using remote traffic analysis
-
Xun Gong, Negar Kiyavash, and Nikita Borisov. Fingerprinting websites using remote traffic analysis. In ACM CCS, 2010.
-
(2010)
ACM CCS
-
-
Gong, X.1
Kiyavash, N.2
Borisov, N.3
-
11
-
-
6344251217
-
Fingerprinting websites using traffic analysis
-
Andrew Hintz. Fingerprinting websites using traffic analysis. In Privacy Enhancing Technologies. 2003.
-
(2003)
Privacy Enhancing Technologies
-
-
Hintz, A.1
-
13
-
-
34547350876
-
Inferring the source of encrypted http connections
-
Marc Liberatore and Brian Neil Levine. Inferring the source of encrypted http connections. In ACM CCS, 2006.
-
(2006)
ACM CCS
-
-
Liberatore, M.1
Levine, B.N.2
-
14
-
-
84861117400
-
Website fingerprinting and identification using ordered feature sequences
-
Liming Lu, Ee-Chien Chang, and Mun Chan. Website fingerprinting and identification using ordered feature sequences. In ESORICS. 2010.
-
(2010)
ESORICS
-
-
Lu, L.1
Chang, E.-C.2
Chan, M.3
-
15
-
-
84893410867
-
HTTPOS: Sealing information leaks with browser-side obfuscation of encrypted OWS
-
Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci. HTTPOS: Sealing information leaks with browser-side obfuscation of encrypted ows. In NDSS, 2011.
-
(2011)
NDSS
-
-
Luo, X.1
Zhou, P.2
Chan, E.W.W.3
Lee, W.4
Chang, R.K.C.5
Perdisci, R.6
-
16
-
-
0345566149
-
A guided tour to approximate string matching
-
March
-
Gonzalo Navarro. A guided tour to approximate string matching. ACM Comput. Surv., 33:31-88, March 2001.
-
(2001)
ACM Comput. Surv.
, vol.33
, pp. 31-88
-
-
Navarro, G.1
-
19
-
-
76549110566
-
Fingerprinting attack on the Tor anonymity system
-
volume 5927 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg
-
Yi Shi and Kanta Matsuura. Fingerprinting attack on the Tor anonymity system. In Information and Communications Security, volume 5927 of Lecture Notes in Computer Science, pages 425-438. Springer Berlin / Heidelberg, 2009.
-
(2009)
Information and Communications Security
, pp. 425-438
-
-
Shi, Y.1
Matsuura, K.2
-
20
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, and Lili Qiu. Statistical identification of encrypted web browsing traffic. In Proceedings of the IEEE Symposium on Security and Privacy, 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
23
-
-
40949097728
-
Not quite the average: An empirical study of web use
-
2
-
Harald Weinreich, Hartmut Obendorf, Eelco Herder, and Matthias Mayer. Not quite the average: An empirical study of web use. ACM Transactions on the Web, 1(2):26, 2 2008.
-
(2008)
ACM Transactions on the Web
, vol.1
, Issue.2
, pp. 26
-
-
Weinreich, H.1
Obendorf, H.2
Herder, E.3
Mayer, M.4
-
26
-
-
80755134983
-
Traffic morphing: An efficient defense against statistical traffic analysis
-
Charles V. Wright, Scott E. Coull, and Fabian Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS, 2009.
-
(2009)
NDSS
-
-
Wright, C.V.1
Coull, S.E.2
Monrose, F.3
-
27
-
-
84910614609
-
Attacking anonymous web browsing at local area networks through browsing dynamics
-
Shui Yu, Wanlei Zhou, Weijia Jia, and Jiankun Hu. Attacking anonymous web browsing at local area networks through browsing dynamics. The Computer Journal, 2011.
-
(2011)
The Computer Journal
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Hu, J.4
|