Measuring information leakage in website fingerprinting attacks and defenses

Shuai Li, Huajun Guo, Nick Hopper

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

Tor provides low-latency anonymous and uncensored network access against a local or network adversary. Due to the design choice to minimize traffic overhead (and increase the pool of potential users) Tor allows some information about the client’s connections to leak. Attacks using (features extracted from) this information to infer the website a user visits are called Website Fingerprinting (WF) attacks. We develop a methodology and tools to measure the amount of leaked information about a website. We apply this tool to a comprehensive set of features extracted from a large set of websites and WF defense mechanisms, allowing us to make more fine-grained observations about WF attacks and defenses.

Original languageEnglish (US)
Title of host publicationCCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1977-1992
Number of pages16
ISBN (Electronic)9781450356930
DOIs
StatePublished - Oct 15 2018
Event25th ACM Conference on Computer and Communications Security, CCS 2018 - Toronto, Canada
Duration: Oct 15 2018 → …

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other25th ACM Conference on Computer and Communications Security, CCS 2018
Country/TerritoryCanada
CityToronto
Period10/15/18 → …

Bibliographical note

Funding Information:
We would like to thank Tao Wang, Marc Juarez, Michael Carl Tschantz, Vern Paxson, George Karypis, Sheng Chen for the helpful discussions which improved this paper. We thank Marc Juarez et al. for helping us on Tor Browser Crawler. Shuai specially thanks his wife Wen Xing for her support and valued encouragement in this work. This paper is supported by NSF 1314637 and NSF 1815757.

Publisher Copyright:
© 2018 Association for Computing Machinery.

Keywords

  • Anonymity
  • Tor
  • Website fingerprinting

Fingerprint

Dive into the research topics of 'Measuring information leakage in website fingerprinting attacks and defenses'. Together they form a unique fingerprint.

Cite this