Evaluating practical QUIC website fingerprinting defenses for the masses
Abstract
Abstract: Website fingerprinting (WF) is a well-known threat to users' web privacy. New Internet standards, such as QUIC, include padding to support defenses against WF. Previous work on QUIC WF only analyzes the effectiveness of defenses when users are behind a VPN. Yet, this is not how most users browse the Internet. In this paper, we provide a comprehensive evaluation of QUIC-padding-based defenses against WF when users directly browse the web, i.e., without VPNs, HTTPS proxies, or other tunneling protocols. We confirm previous claims that network-layer padding cannot provide effective protection against powerful adversaries capable of observing all traffic traces. We show that the claims hold even against adversaries with constraints on traffic visibility and processing power. We then show that the current approach to web development, in which the use of third-party resources is the norm, impedes the effective use of padding-based defenses as it requires first and third parties to coordinate in order to thwart traffic analysis. We show that even when coordination is possible, in most cases, protection comes at a high cost.
Citation
Siby , S , Barman , L , Wood , C , Fayed , M , Sullivan , N & Troncoso , C 2023 , ' Evaluating practical QUIC website fingerprinting defenses for the masses ' , Proceedings on Privacy Enhancing Technologies . https://doi.org/10.56553/popets-2023-0099
Publication
Proceedings on Privacy Enhancing Technologies
Status
Peer reviewed
Type
Journal article
Rights
Copyright in PoPETs articles are held by their authors. This article is published under a Creative Commons Attribution 4.0 license.
Collections
Items in the St Andrews Research Repository are protected by copyright, with all rights reserved, unless otherwise indicated.