Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Nate Mathews"'
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 2, Pp 305-322 (2021)
We introduce Generative Adversarial Networks for Data-Limited Fingerprinting (GANDaLF), a new deep-learning-based technique to perform Website Fingerprinting (WF) on Tor traffic. In contrast to most earlier work on deep-learning for WF, GANDaLF is in
Autor:
Se Eun Oh, Taiji Yang, Nate Mathews, James K Holland, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Autor:
Mohammad Saidur Rahman, Kantha Girish Gangadhara, Payap Sirinam, Matthew Wright, Nate Mathews
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 3, Pp 5-24 (2020)
A passive local eavesdropper can leverage Website Fingerprinting (WF) to deanonymize the web browsing activity of Tor users. The value of timing information to WF has often been discounted in recent works due to the volatility of low-level timing inf
Publikováno v:
WPES@CCS
It is estimated that by the year 2024, the total number of systems equipped with voice assistant software will exceed 8.4 billion devices globally. While these devices provide convenience to consumers, they suffer from a myriad of security issues. Th
Publikováno v:
CCS
The website fingerprinting attack allows a low-resource attacker to compromise the privacy guarantees provided by privacy enhancing tools such as Tor. In response, researchers have proposed defenses aimed at confusing the classification tools used by
Website Fingerprinting (WF) is a type of traffic analysis attack that enables a local passive eavesdropper to infer the victim's activity, even when the traffic is protected by a VPN or an anonymity system like Tor. Leveraging a deep-learning classif
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::db09679800652a8b2549dd4257b50c01
Publikováno v:
2018 IEEE Western New York Image and Signal Processing Workshop (WNYISPW).
The Tor anonymity system is vulnerable to website fingerprinting attacks that can reveal users Internet browsing behavior. The state-of-the-art website fingerprinting attacks use convolutional neural networks to automatically extract features from pa