共 20 条
- [1] DINGLEDINE R, MATHEWSON N, SYVERSON P., Tor: The second-generation onion router[C], Proceedings of the 13th USENIX Security Symposium, pp. 9-13, (2004)
- [2] WANG T, CAI X, NITHYANAND R, Et al., Effective attacks and provable defenses for website fingerprinting[C], Proceedings of the 23rd USENIX Security Symposium, pp. 20-22, (2014)
- [3] HAYES J, DANEZIS G., K-fingerprinting: a robust scalable website fingerprinting technique[C], Proceedings of the 25th USENIX Security Symposium, pp. 10-12, (2016)
- [4] PANCHENKO A, LANZE F, ZINNEN A, Et al., Website fingerprinting at internet scale[C], Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS), pp. 21-24, (2016)
- [5] RIMMER V, PREUVENEERS D, JUAREZ M, Et al., Automated website fingerprinting through deep learning [C], Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS), pp. 18-21, (2018)
- [6] SIRINAM P, IMANI M, JUAREZ M, Et al., Deep fingerprinting: undermining website fingerprinting defenses with deep learning[C], Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 15-19, (2018)
- [7] BHAT S, LU D, KWON A, Et al., Var-CNN: a data-efficient website fingerprinting attack based on deep learning, Proceedings of the Proceedings on Privacy Enhancing Technologies, (2019)
- [8] RAHMAN M S, SIRINAM P, MATHEWS N, Et al., Tik-Tok: the utility of packet timing in website fingerprinting attacks[C], Proceedings of the Proceedings on Privacy Enhancing Technologies, (2020)
- [9] SHEN M, JI K, GAO Z, Et al., Subverting website fingerprinting defenses with robust traffic representation [C], Proceedings of the 32nd USENIX Security Symposium, (2023)
- [10] YER K P, COULL S E, RISTENPART T, Et al., Peek-a-Boo, I still see you: why efficient traffic analysis countermeasures fail[C], Proceedings of the 33rd IEEE Symposium on Security and Privacy (SP), pp. 20-23, (2012)