2020
DOI: 10.1109/tdsc.2020.2988369
|View full text |Cite
|
Sign up to set email alerts
|

Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality

Abstract: Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user's computer and the secure network.In this work we investigate these attacks under a different attack model, in which the adversary is cap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
87
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 53 publications
(89 citation statements)
references
References 84 publications
(118 reference statements)
2
87
0
Order By: Relevance
“…One reason for these differences is that we incorporated the results by Prouff et al [41] in addition to conducting preliminary experiments. The classification rates for Google Chrome in [44] are comparable to the ones we achieve. In summary, both Shusterman et al and this work propose inference attacks that share a common goal, but differ regarding approach and attack environment.…”
Section: Comparison With Shusterman Et Alsupporting
confidence: 74%
See 4 more Smart Citations
“…One reason for these differences is that we incorporated the results by Prouff et al [41] in addition to conducting preliminary experiments. The classification rates for Google Chrome in [44] are comparable to the ones we achieve. In summary, both Shusterman et al and this work propose inference attacks that share a common goal, but differ regarding approach and attack environment.…”
Section: Comparison With Shusterman Et Alsupporting
confidence: 74%
“…Compared to the LLC-based attack in [39], our success rates are higher, even though we classify significantly more websites. Compared to the results by Shusterman et al [44], we achieve similar classification rates. At the same time, we relax the attacker model by not only compensating imprecise timing sources but also random cache replacement policies.…”
Section: Website and Application Inferencesupporting
confidence: 72%
See 3 more Smart Citations