[tor-dev] Two new tech reports on website fingerprinting
gk at torproject.org
Wed Jul 1 08:00:41 UTC 2015
t55wang at cs.uwaterloo.ca:
> I'd like to introduce two new works on website fingerprinting I've
> written with my supervisor, Ian Goldberg.
Thanks! I am looking forward to study your new work and hope we can
include it into Tor Browser.
> The first is titled ``On Realistically Attacking Tor with Website
> Fingerprinting''. We talk about methods to allow website fingerprinting
> to perform under realistically difficult scenarios. We have a tech
> report here:
On https://crysp.uwaterloo.ca/software/webfingerprint/ the link to this
report just points to https://crysp.uwaterloo.ca/software/webfingerprint/
> The second is titled ``Walkie-Talkie: An Effective and Efficient Defense
> against Website Fingerprinting''. We propose a new website
> fingerprinting defense that is practically efficient and provably
> effective. We have a tech report here:
> Our code for both of those works are here:
> In the code we have an implementation of a website fingerprinting attack
> that can take a long series of web page accesses (as one packet
> sequence) as input, and output if it has recognized any page in the
> sequence. We also have an implementation of half-duplex communication
> for Tor Firefox as the core of Walkie-Talkie.
> Tao Wang
> tor-dev mailing list
> tor-dev at lists.torproject.org
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 801 bytes
Desc: OpenPGP digital signature
More information about the tor-dev