I'd like to introduce two new works on website fingerprinting I've written with my supervisor, Ian Goldberg.
The first is titled ``On Realistically Attacking Tor with Website Fingerprinting''. We talk about methods to allow website fingerprinting to perform under realistically difficult scenarios. We have a tech report here:
http://cacr.uwaterloo.ca/techreports/2015/cacr2015-09.pdf
The second is titled ``Walkie-Talkie: An Effective and Efficient Defense against Website Fingerprinting''. We propose a new website fingerprinting defense that is practically efficient and provably effective. We have a tech report here:
http://cacr.uwaterloo.ca/techreports/2015/cacr2015-08.pdf
Our code for both of those works are here:
https://crysp.uwaterloo.ca/software/webfingerprint/
In the code we have an implementation of a website fingerprinting attack that can take a long series of web page accesses (as one packet sequence) as input, and output if it has recognized any page in the sequence. We also have an implementation of half-duplex communication for Tor Firefox as the core of Walkie-Talkie.
Tao Wang
t55wang@cs.uwaterloo.ca:
I'd like to introduce two new works on website fingerprinting I've written with my supervisor, Ian Goldberg.
Thanks! I am looking forward to study your new work and hope we can include it into Tor Browser.
The first is titled ``On Realistically Attacking Tor with Website Fingerprinting''. We talk about methods to allow website fingerprinting to perform under realistically difficult scenarios. We have a tech report here:
On https://crysp.uwaterloo.ca/software/webfingerprint/ the link to this report just points to https://crysp.uwaterloo.ca/software/webfingerprint/
Georg
The second is titled ``Walkie-Talkie: An Effective and Efficient Defense against Website Fingerprinting''. We propose a new website fingerprinting defense that is practically efficient and provably effective. We have a tech report here:
http://cacr.uwaterloo.ca/techreports/2015/cacr2015-08.pdf
Our code for both of those works are here:
https://crysp.uwaterloo.ca/software/webfingerprint/
In the code we have an implementation of a website fingerprinting attack that can take a long series of web page accesses (as one packet sequence) as input, and output if it has recognized any page in the sequence. We also have an implementation of half-duplex communication for Tor Firefox as the core of Walkie-Talkie.
Tao Wang
tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Tue, Jun 30, 2015 at 9:01 PM, t55wang@cs.uwaterloo.ca wrote:
I'd like to introduce two new works on website fingerprinting I've written with my supervisor, Ian Goldberg.
The first is titled ``On Realistically Attacking Tor with Website Fingerprinting''. We talk about methods to allow website fingerprinting to perform under realistically difficult scenarios. We have a tech report here:
http://cacr.uwaterloo.ca/techreports/2015/cacr2015-09.pdf
The second is titled ``Walkie-Talkie: An Effective and Efficient Defense against Website Fingerprinting''. We propose a new website fingerprinting defense that is practically efficient and provably effective. We have a tech report here:
http://cacr.uwaterloo.ca/techreports/2015/cacr2015-08.pdf
Our code for both of those works are here:
https://crysp.uwaterloo.ca/software/webfingerprint/
In the code we have an implementation of a website fingerprinting attack that can take a long series of web page accesses (as one packet sequence) as input, and output if it has recognized any page in the sequence. We also have an implementation of half-duplex communication for Tor Firefox as the core of Walkie-Talkie.
Looks interesting! Could I ask you to send a couple of bibtex blobs to anonbib@freehaven.net so I can put them on http://freehaven.net/anonbib ?