Traffic Analysis Countermeasures Fail. In Procee-
dings of the 2012 IEEE Symposium on Security and
Privacy, SP ’12, pages 332–346, Washington, DC,
USA. IEEE Computer Society.
Economist, T. (2012). Very personal finance.
Ejeta, T. G. and Kim, H. J. (2017). Website Fingerprinting
Attack on Psiphon and Its Forensic Analysis. In Kra-
etzer, C., Shi, Y.-Q., Dittmann, J., and Kim, H. J., edi-
tors, Digital Forensics and Watermarking, pages 42–
51, Cham. Springer International Publishing.
European Commission (2018). Data protection.
Gallagher, S. (2014). Chinese government launches man-in-
middle attack against icloud [updated]. Ars Technica.
Hayes, J. and Danezis, G. (2016). k-fingerprinting: A Ro-
bust Scalable Website Fingerprinting Technique. In
25th USENIX Security Symposium (USENIX Security
16), pages 1187–1203, Austin, TX. USENIX Associ-
ation.
Herrmann, D., Wendolsky, R., and Federrath, H. (2009).
Website Fingerprinting: Attacking Popular Privacy
Enhancing Technologies with the Multinomial Na
¨
ıVe-
bayes Classifier. In Proceedings of the 2009 ACM
Workshop on Cloud Computing Security, CCSW ’09,
pages 31–42, New York, NY, USA. ACM.
Hus
´
ak, M.,
ˇ
Cerm
´
ak, M., Jirs
´
ık, T., and
ˇ
Celeda, P. (2016).
HTTPS traffic analysis and client identification using
passive SSL/TLS fingerprinting. EURASIP Journal
on Information Security.
Juarez, M., Afroz, S., Acar, G., Diaz, C., and Greenstadt,
R. (2014). A Critical Evaluation of Website Finger-
printing Attacks. In Proceedings of the 2014 ACM
SIGSAC Conference on Computer and Communica-
tions Security, CCS ’14, pages 263–274, New York,
NY, USA. ACM.
Juarez, M., Imani, M., Perry, M., Diaz, C., and Wright, M.
(2016). Toward an Efficient Website Fingerprinting
Defense. In Askoxylakis, I., Ioannidis, S., Katsikas,
S., and Meadows, C., editors, Computer Security –
ESORICS 2016, pages 27–46, Cham. Springer Inter-
national Publishing.
Kwon, A., AlSabah, M., Lazar, D., Dacier, M., and De-
vadas, S. (2015). Circuit Fingerprinting Attacks: Pas-
sive Deanonymization of Tor Hidden Services. In 24th
USENIX Security Symposium (USENIX Security 15),
pages 287–302, Washington, D.C. USENIX Associa-
tion.
Liberatore, M. and Levine, B. N. (2006). Inferring the
Source of Encrypted HTTP Connections. In Procee-
dings of the 13th ACM Conference on Computer and
Communications Security, CCS ’06, pages 255–263,
New York, NY, USA. ACM.
Liu, L., Preoiuc-Pietro, D., Riahi, Z., Moghaddam, M. E.,
and Ungar, L. (2016). Analyzing Personality through
Social Media Profile Picture Choice. In ICWSM.
Lu, L., Chang, E.-C., and Chan, M. C. (2010). Web-
site Fingerprinting and Identification Using Ordered
Feature Sequences. In Proceedings of the 15th Eu-
ropean Conference on Research in Computer Secu-
rity, ESORICS’10, pages 199–214, Berlin, Heidel-
berg. Springer-Verlag.
Luo, X., Zhou, P., Chan, E. W. W., Lee, W., Chang, R.
K. C., and Perdisci, R. (2011). HTTPOS: Sealing
information leaks with browser-side obfuscation of
encrypted flows. In In Proc. Network and Distribu-
ted Systems Symposium (NDSS). The Internet Society.
10.1.1.300.1748.
Miller, B., Huang, L., Joseph, A. D., and Tygar, J. D.
(2014). I Know Why You Went to the Clinic:
Risks and Realization of HTTPS Traffic Analysis. In
De Cristofaro, E. and Murdoch, S. J., editors, Pri-
vacy Enhancing Technologies, pages 143–163, Cham.
Springer International Publishing.
Morla, R. (2017). Effect of Pipelining and Multiplexing
in Estimating HTTP/2.0 Web Object Sizes. ArXiv e-
prints.
Panchenko, A., Lanze, F., Pennekamp, J., Engel, T., Zin-
nen, A., Henze, M., and Wehrle, K. (2016). Website
Fingerprinting at Internet Scale. In NDSS.
Panchenko, A., Niessen, L., Zinnen, A., and Engel, T.
(2011). Website Fingerprinting in Onion Routing Ba-
sed Anonymization Networks. In Proceedings of the
10th Annual ACM Workshop on Privacy in the Elec-
tronic Society, WPES ’11, pages 103–114, New York,
NY, USA. ACM.
Perez, S. (2018). Facebook starts pushing its data tracking
onavo vpn within its main mobile app.
Rao, A., Spasojevic, N., Li, Z., and Dsouza, T. (2015).
Klout Score: Measuring Influence Across Multiple
Social Networks. Conference: 2015 IEEE Internatio-
nal Conference on Big Data (Big Data), pages 2282–
2289.
Rimmer, V., Preuveneers, D., Juarez, M., Van Goethem,
T., and Joosen, W. (2017). Automated Feature Ex-
traction for Website Fingerprinting through Deep Le-
arning. (to appear).
Sun, Q., Simon, D. R., Wang, Y.-M., Russell, W., Padmana-
bhan, V. N., and Qiu, L. (2002). Statistical Identifica-
tion of Encrypted Web Browsing Traffic. In Procee-
dings of the 2002 IEEE Symposium on Security and
Privacy, SP ’02, pages 19–, Washington, DC, USA.
IEEE Computer Society.
Wang, T. (2015). Website Fingerprinting: Attacks and De-
fenses (Doctoral dissertation). University of Waterloo,
Canada.
Wang, T. and Goldberg, I. (2017). Walkie-Talkie: An Effi-
cient Defense Against Passive Website Fingerprinting
Attacks. In 26th USENIX Security Symposium (USE-
NIX Security 17), pages 1375–1390, Vancouver, BC.
USENIX Association.
WiFi4EU (2016). Free wi-fi for europeans.
Wijnants, M., Marx, R., Quax, P., and Lamotte, W. (2018).
HTTP/2 Prioritization and its Impact on Web Perfor-
mance. In The Web Conference, WWW 2018.
Wright, C. V., Coull, S. E., and Monrose, F. (2009). Traf-
fic Morphing: An Efficient Defense Against Statisti-
cal Traffic Analysis. In In Proceedings of the 16th
Network and Distributed Security Symposium, pages
237–250. IEEE.
WEBIST 2018 - 14th International Conference on Web Information Systems and Technologies
112