Ethan Witwer
YOU?
Author Swipe
View article: Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic
Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic Open
Despite the clear dominance of video streaming traffic on the Internet and the significant ramifications of disclosure of which videos users are streaming, video fingerprinting has received relatively little attention compared to other tra…
View article: Maybenot: A Framework for Traffic Analysis Defenses
Maybenot: A Framework for Traffic Analysis Defenses Open
In light of the increasing ubiquity of end-to-end encryption and the use of technologies such as Tor and VPNs, analyzing communications metadata - -traffic analysis - -is a last resort for network adversaries. Traffic analysis attacks are …
View article: State Machine Frameworks for Website Fingerprinting Defenses: Maybe Not
State Machine Frameworks for Website Fingerprinting Defenses: Maybe Not Open
Tor is an anonymity network used by millions of people every day to evade censorship and protect their browsing activity from privacy threats such as mass surveillance. Unfortunately, Tor has been shown to be vulnerable to website fingerpr…
View article: Padding-only defenses add delay in Tor
Padding-only defenses add delay in Tor Open
Website fingerprinting is an attack that uses size and timing characteristics of encrypted downloads to identify targeted websites. Since this can defeat the privacy goals of anonymity networks such as Tor, many algorithms to defend agains…