2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2020
DOI: 10.1109/dsn48063.2020.00044
|View full text |Cite
|
Sign up to set email alerts
|

Depending on HTTP/2 for Privacy? Good Luck!

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…With multi-threading, packets belonging to two different resources could get interleaved within the same TCP stream (in HTTP/2 [36]) or QUIC stream (in HTTP/3 [37]). To handle such complex scenarios, Snoopy adopts the technique described in our recent work [38] for computing encrypted resource sizes in HTTP/2 websites. For HTTP/3 websites, Snoopy drops the QUIC connection establishment packets so that the communication protocol falls back to HTTP/1.1 or HTTP/2.…”
Section: Printsmentioning
confidence: 99%
See 3 more Smart Citations
“…With multi-threading, packets belonging to two different resources could get interleaved within the same TCP stream (in HTTP/2 [36]) or QUIC stream (in HTTP/3 [37]). To handle such complex scenarios, Snoopy adopts the technique described in our recent work [38] for computing encrypted resource sizes in HTTP/2 websites. For HTTP/3 websites, Snoopy drops the QUIC connection establishment packets so that the communication protocol falls back to HTTP/1.1 or HTTP/2.…”
Section: Printsmentioning
confidence: 99%
“…Also, note that out of the 55 resources in the website PS, only 11 resources were of interest to the adversary, and their download sequence was sufficient to identify all the 40323 webpages uniquely. Details about this can be found in our recent work [38].…”
Section: Resource-level Prediction Accuracy Of Snoopymentioning
confidence: 99%
See 2 more Smart Citations
“…The work in [45] showed that it is possible to break the privacy offered by HTTP/2 multiplexing. HTTP/2 allows concurrent server threads to process multiple objects, resulting in multiplexed object transmission.…”
Section: Privacy Attacksmentioning
confidence: 99%