supported partially by the National Natural Science Foundation of China(Nos.62172378,61572448,and 61827810);by the National Key Research and Development Program of China(No.2020YFB1707701).
Recent advancements in deep learning(DL)have introduced new security challenges in the form of side-channel attacks.A prime example is the website fingerprinting attack(WFA),which targets anonymity networks like Tor,e...
This work was supported in part by the National Natural Science Foundation of China(Nos.62102084 and 62072103);Jiangsu Provincial Natural Science Foundation of China(No.BK20190340);Jiangsu Provincial Key R&D Program(Nos.BE2021729,BE2022680,and BE2022065-4);Jiangsu Provincial Key Laboratory of Network and Information Security(No.BM2003201);Key Laboratory of Computer Network and Information Integration of Ministry of Education of China(No.93K-9).
Website Fingerprinting(WF)attacks can extract side channel information from encrypted traffic to form a fingerprint that identifies the victim’s destination website,even if traffic is sophisticatedly anonymized by To...
partially supported by the National Key R&D Program of China(No.2017YFB1003000);the National Natural Science Foundation of China(Nos.61572130,61320106007,61632008,61502100,61532013,and 61402104);the Jiangsu Provincial Natural Science Foundation(No.BK20150637);the Jiangsu Provincial Key Technology R&D Program(No.BE2014603);the Qing Lan Project of Jiangsu Province,Jiangsu Provincial Key Laboratory of Network and Information Security(No.BM2003201);the Key Laboratory of Computer Network and Information Integration of the Ministry of Education of China(No.93K-9)
Tor is pervasively used to conceal target websites that users are visiting. A de-anonymization technique against Tor, referred to as website fingerprinting attack, aims to infer the websites accessed by Tor clients by...