Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail

作者: Kevin P. Dyer , Scott E. Coull , Thomas Ristenpart , Thomas Shrimpton

DOI: 10.1109/SP.2012.28

关键词:

摘要: … to simple attacks that exploit coarse features of traffic (eg, total … Despite the extra noise, the classifiers performed well, just … BuFLO implementation can can actually benefit an adversary. …

参考文章(21)
Fabian Monrose, Charles V. Wright, Lucas Ballard, Gerald M. Masson, Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? usenix security symposium. pp. 4- ,(2007)
Bruce Schneier, David Wagner, Analysis of the SSL 3.0 protocol WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 4- 4 ,(1996)
Liming Lu, Ee-Chien Chang, Mun Choon Chan, Website fingerprinting and identification using ordered feature sequences european symposium on research in computer security. pp. 199- 214 ,(2010) , 10.1007/978-3-642-15497-3_13
Fabian Monrose, Scott E. Coull, Charles V. Wright, Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. network and distributed system security symposium. ,(2009)
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Andrew Hintz, Fingerprinting websites using traffic analysis privacy enhancing technologies. pp. 171- 178 ,(2002) , 10.1007/3-540-36467-6_13
George Dean Bissias, Marc Liberatore, David Jensen, Brian Neil Levine, Privacy Vulnerabilities in Encrypted HTTP Streams Privacy Enhancing Technologies. ,vol. 3856, pp. 1- 11 ,(2006) , 10.1007/11767831_1
Qixiang Sun, D.R. Simon, Yi-Min Wang, W. Russell, V.N. Padmanabhan, Lili Qiu, Statistical identification of encrypted Web browsing traffic ieee symposium on security and privacy. pp. 19- 30 ,(2002) , 10.1109/SECPRI.2002.1004359
Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson, Uncovering Spoken Phrases in Encrypted Voice over IP Conversations ACM Transactions on Information and System Security. ,vol. 13, pp. 35- ,(2010) , 10.1145/1880022.1880029
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang, Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow ieee symposium on security and privacy. pp. 191- 206 ,(2010) , 10.1109/SP.2010.20