Articles with "fingerprinting attacks" as a keyword



Photo from wikipedia

Tail Time Defense Against Website Fingerprinting Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3146236

Abstract: In the past few years, many defense mechanisms have been proposed against website fingerprinting attacks. Walkie-Talkie (WT) built on top of the Tor network is known to be one of the most effective defense mechanisms.… read more here.

Keywords: tail time; time; fingerprinting attacks; website fingerprinting ... See more keywords
Photo from wikipedia

BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2019.2907240

Abstract: Network traffic analysis has been increasingly used in various applications to either protect or threaten people, information, and systems. Website fingerprinting is a passive traffic analysis attack which threatens web navigation privacy. It is a… read more here.

Keywords: fingerprinting attacks; website fingerprinting; defense; traffic ... See more keywords