Proceedings of the 34th Annual Computer Security Applications Conference 2018
DOI: 10.1145/3274694.3274697
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-tab Website Fingerprinting Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(23 citation statements)
references
References 18 publications
0
23
0
Order By: Relevance
“…Along with feature extraction, localization and classification of all full monitored traces are jointly optimized in a single deep learning architecture, i.e., end-to-end. This is drastically different from and more elegant than all the previous WFA methods [17,18] that model the localization (i.e., trace splitting) and classification independently and hence suffer from the notorious localization error propagation problem. As a consequence, their methods are poor in tackling the realistic WFA situations (see Table 1).…”
Section: Concretely We Redefine the Problem Of Mt-wfa As Followsmentioning
confidence: 85%
See 3 more Smart Citations
“…Along with feature extraction, localization and classification of all full monitored traces are jointly optimized in a single deep learning architecture, i.e., end-to-end. This is drastically different from and more elegant than all the previous WFA methods [17,18] that model the localization (i.e., trace splitting) and classification independently and hence suffer from the notorious localization error propagation problem. As a consequence, their methods are poor in tackling the realistic WFA situations (see Table 1).…”
Section: Concretely We Redefine the Problem Of Mt-wfa As Followsmentioning
confidence: 85%
“…In the literature, there are a limited number of works [11,[16][17][18] that study the MT-WFA problem at varying degrees.…”
Section: Multi-tab Wf Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…There is also a time gap when changing from one tab to another to open or reload a different website, especially for users with a single screen. All these together allow an observer to distinguish between individual website visits, as also evident by existing techniques that can be employed to split a network trace of such multi-tab activity into individual traces [23,24,111]. Moreover, although many individual users may be located behind the same NAT network, Verde et al [105] have developed a framework that can identify different individuals behind a large metropolitan WiFi network based on NetFlow records.…”
Section: Threat Modelmentioning
confidence: 99%