Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134005
|View full text |Cite
|
Sign up to set email alerts
|

How Unique is Your .onion?

Abstract: Recent studies have shown that Tor onion (hidden) service websites are particularly vulnerable to website fingerprinting attacks due to their limited number and sensitive nature. In this work we present a multi-level feature analysis of onion site fingerprintability, considering three state-of-the-art website fingerprinting methods and 482 Tor onion services, making this the largest analysis of this kind completed on onion services to date.Prior studies typically report average performance results for a given … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…Crawls are a standard way of collecting data for Web measurements. Many crawl-based studies focus on security and privacy issues, such as online tracking [2,17], detecting the use of browser fingerprinting [3,26,40], detecting the use of sensitive APIs [13], the tracking ecosystem of internet-enabled devices [34], dark patterns on shopping websites [28], content security violations [55], the effectiveness of tracker blockers [30], GDPR compliance [8], and many others [43,57]. The OpenWPM framework has been used in over 47 such crawl-based studies [59].…”
Section: Web Measurement Studiesmentioning
confidence: 99%
“…Crawls are a standard way of collecting data for Web measurements. Many crawl-based studies focus on security and privacy issues, such as online tracking [2,17], detecting the use of browser fingerprinting [3,26,40], detecting the use of sensitive APIs [13], the tracking ecosystem of internet-enabled devices [34], dark patterns on shopping websites [28], content security violations [55], the effectiveness of tracker blockers [30], GDPR compliance [8], and many others [43,57]. The OpenWPM framework has been used in over 47 such crawl-based studies [59].…”
Section: Web Measurement Studiesmentioning
confidence: 99%
“…It makes the generated flow indistinguishable from the target flow, so as to achieve the purpose of privacy protection and review avoidance. In addition, GAN is developing to a more dynamic adaptive flow camouflage direction by combining with other supervised learning methods [36][37][38][39].…”
Section: Gan and Its Application In Trafficmentioning
confidence: 99%
“…Security [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [21], [58], [59], [60], [61], [62], [63], [64], [19] 28…”
Section: Research Fieldmentioning
confidence: 99%
“…Research papers N. of papers Attacks to THS [40], [41], [42], [43], [44], [45], [47], [48], [50], [51], [52], [53], [54], [56], [57], [21], [58], [63], [49], [19] 20…”
Section: Focus Of the Researchmentioning
confidence: 99%
See 1 more Smart Citation