Show simple item record

Files in this item

Thumbnail

Item metadata

dc.contributor.authorSiby, Sandra
dc.contributor.authorBarman, Ludovic
dc.contributor.authorWood, Christopher
dc.contributor.authorFayed, Marwan
dc.contributor.authorSullivan, Nick
dc.contributor.authorTroncoso, Carmela
dc.date.accessioned2024-04-17T10:30:01Z
dc.date.available2024-04-17T10:30:01Z
dc.date.issued2023
dc.identifier299376876
dc.identifier540fe4bf-4c3c-4cab-93c6-3a5ff9fa8c67
dc.identifier.citationSiby , S , Barman , L , Wood , C , Fayed , M , Sullivan , N & Troncoso , C 2023 , ' Evaluating practical QUIC website fingerprinting defenses for the masses ' , Proceedings on Privacy Enhancing Technologies . https://doi.org/10.56553/popets-2023-0099en
dc.identifier.otherBibtex: siby2023evaluating
dc.identifier.otherORCID: /0000-0002-0970-7972/work/153451592
dc.identifier.urihttps://hdl.handle.net/10023/29688
dc.description.abstractAbstract: Website fingerprinting (WF) is a well-known threat to users' web privacy. New Internet standards, such as QUIC, include padding to support defenses against WF. Previous work on QUIC WF only analyzes the effectiveness of defenses when users are behind a VPN. Yet, this is not how most users browse the Internet. In this paper, we provide a comprehensive evaluation of QUIC-padding-based defenses against WF when users directly browse the web, i.e., without VPNs, HTTPS proxies, or other tunneling protocols. We confirm previous claims that network-layer padding cannot provide effective protection against powerful adversaries capable of observing all traffic traces. We show that the claims hold even against adversaries with constraints on traffic visibility and processing power. We then show that the current approach to web development, in which the use of third-party resources is the norm, impedes the effective use of padding-based defenses as it requires first and third parties to coordinate in order to thwart traffic analysis. We show that even when coordination is possible, in most cases, protection comes at a high cost.
dc.format.extent823328
dc.language.isoeng
dc.relation.ispartofProceedings on Privacy Enhancing Technologiesen
dc.subjectATC-NDASen
dc.titleEvaluating practical QUIC website fingerprinting defenses for the massesen
dc.typeJournal articleen
dc.contributor.institutionUniversity of St Andrews. School of Computer Scienceen
dc.identifier.doi10.56553/popets-2023-0099
dc.description.statusPeer revieweden


This item appears in the following Collection(s)

Show simple item record