Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660368
|View full text |Cite
|
Sign up to set email alerts
|

A Critical Evaluation of Website Fingerprinting Attacks

Abstract: Recent studies on Website Fingerprinting (WF) claim to have found highly effective attacks on Tor. However, these studies make assumptions about user settings, adversary capabilities, and the nature of the Web that do not necessarily hold in practical scenarios. The following study critically evaluates these assumptions by conducting the attack where the assumptions do not hold. We show that certain variables, for example, user's browsing habits, differences in location and version of Tor Browser Bundle, that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
233
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 248 publications
(236 citation statements)
references
References 22 publications
3
233
0
Order By: Relevance
“…Even with the challenges of open-world and multi-tab browsing [11], some websites may exhibit especially unique traffic patterns and be prone to high-confidence attacks. Attacks may observe visits to the same site over multiple sessions and gain confidence in a result.…”
Section: Discussion and Future Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Even with the challenges of open-world and multi-tab browsing [11], some websites may exhibit especially unique traffic patterns and be prone to high-confidence attacks. Attacks may observe visits to the same site over multiple sessions and gain confidence in a result.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…HTTPOS modifies HTTP headers and injects HTTP requests strategically [13], while Randomized Pipelining, a WF countermeasure currently implemented in the Tor Browser, randomizes the pipeline of HTTP requests. Both defenses have been shown to be ineffective in several evaluations [5,24,23,11].…”
Section: Defensesmentioning
confidence: 99%
See 2 more Smart Citations
“…We therefore implement a simple client-side WF defense, dubbed Lightweight application-Layer Masquerading Add-on (LLaMA), that works at the application layer by adding extra delays to the HTTP requests. These delays alter the order of the requests in a similar way to randomized pipelining (RP) [23], a WF countermeasure implemented in the Tor browser that has been shown to fail in several evaluations [5,14,31]. Besides delaying HTTP requests, our defense sends redundant requests to the server.…”
Section: Introductionmentioning
confidence: 99%