|
[1]
|
Giovanni, C., Jansen, R. and Troncoso, C. (2022) Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. 2022 31st USENIX Security Symposium (USENIX Security 22), Boston, 10-12 August 2022, 753-770.
|
|
[2]
|
Liu, P., He, L. and Li, Z. (2023) A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses. IEEE Access, 11, 26033-26047. [Google Scholar] [CrossRef]
|
|
[3]
|
Zhang, X., Zhang, Z., Shen, Q., Wang, W., Gao, Y., Yang, Z., et al. (2024) Segscope: Probing Fine-Grained Interrupts via Architectural Footprints. 2024 IEEE International Symposium on High-Performance Computer Architecture, Edinburgh, 2-6 March 2024, 424-438. [Google Scholar] [CrossRef]
|
|
[4]
|
Dipta, D.R. and Gulmezoglu, B. (2022) DF-SCA: Dynamic Frequency Side Channel Attacks Are Practical. Proceedings of the 38th Annual Computer Security Applications Conference, Austin, 5-9 December 2022, 841-853. [Google Scholar] [CrossRef]
|
|
[5]
|
Zhang, Z., Liang, S., Yao, F. and Gao, X. (2021) Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, New York, 7-11 June 2021, 162-175. [Google Scholar] [CrossRef]
|
|
[6]
|
Wang, Z., Guan, J., Wang, X., Wang, W., Xing, L. and Alharbi, F. (2023) The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on Ios through Multi-Side-Channel Learning. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, New York, 26-30 November 2023, 281-295. [Google Scholar] [CrossRef] [PubMed]
|
|
[7]
|
Wagner, D., Schneier, B., et al. (1996) Analysis of the SSL 3.0 Protocol. The Second USENIX Workshop on Electronic Commerce Proceedings, California, 18-21 November 1996, 29-40.
|
|
[8]
|
Wright, C.V., Coull, S.E. and Monrose, F. (2009) Traffic Morphing: An Efficient Defense against Statistical Traffic Analysis. https://www.ndss-symposium.org/wp-content/uploads/2017/09/wright.pdf
|
|
[9]
|
邹鸿程, 苏金树, 魏子令, 等. 网站指纹识别与防御研究综述[J]. 计算机学报, 2022, 45(10): 2243-2278.
|
|
[10]
|
Yarom, Y. and Falkner, K. (2014) FLUSH + RELOAD: A High Resolution, Low Noise, 13 Cache Side-Channe Attack. 23rd USENIX Security Symposium (USENIX Security 14), San Diego, 20-22 August 2014, 719-732.
|
|
[11]
|
Lipp, M., Gruss, D., Schwarz, M., Bidner, D., Maurice, C. and Mangard, S. (2017) Practical Keystroke Timing Attacks in Sandboxed Javascript. In: Lecture Notes in Computer Science, Springer, 191-209. [Google Scholar] [CrossRef]
|
|
[12]
|
Gras, B., Razavi, K., Bosman, E., Bos, H. and Giuffrida, C. (2017) ASLR on the Line: Practical Cache Attacks on the MMU. Proceedings 2017 Network and Distributed System Security Symposium, Norway, 11-15 September 2017, 191-209. [Google Scholar] [CrossRef]
|
|
[13]
|
Clark, S.S., Mustafa, H., Ransford, B., Sorber, J., Fu, K. and Xu, W. (2013) Current Events: Identifying Webpages by Tapping the Electrical Outlet. In: Lecture Notes in Computer Science, Springer, 700-717. [Google Scholar] [CrossRef]
|
|
[14]
|
Shusterman, A., Kang, L., Haskal, Y., et al. (2019) Robust Website Fingerprinting through the Cache Occupancy Channel. 2019 USENIX Security, Santa Clara, 14-16 August 2019, 639-656.
|
|
[15]
|
Cook, J., Drean, J., Behrens, J. and Yan, M. (2022) There’s Always a Bigger Fish. Proceedings of the 49th Annual International Symposium on Computer Architecture, New York, 18-22 June 2022, 204-217. [Google Scholar] [CrossRef]
|
|
[16]
|
Zhang, R., Kim,T., Weber, D., et al. (2023) Wait for It: Bridging the Gap between Microarchitectural and Architectural Side Channels. 2023 USENIX Security, Anaheim, 9-11 August 2023, 7267-7284.
|
|
[17]
|
Intel Corporation (2020) Intel CVE-2020-8694. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html
|
|
[18]
|
AMD Corporation (2020) AMDCVE-2020-12912. https://nvd.nist.gov/vuln/detail/CVE-2020-12912
|
|
[19]
|
Cai, X., Zhang, X.C., Joshi, B. and Johnson, R. (2012) Touching from a Distance. Proceedings of the 2012 ACM Conference on Computer and Communications Security, New York, 16-18 October 2012, 605-616. [Google Scholar] [CrossRef]
|
|
[20]
|
Liberatore, M. and Levine, B.N. (2006) Inferring the Source of Encrypted HTTP Connections. Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, 30 October-3 November 2006, 255-263. [Google Scholar] [CrossRef]
|
|
[21]
|
Hintz, A. (2003) Fingerprinting Websites Using Traffic Analysis. In: Lecture Notes in Computer Science, Springer, 171-178. [Google Scholar] [CrossRef]
|
|
[22]
|
Shi, Y. and Matsuura, K. (2009) Fingerprinting Attack on the Tor Anonymity System. In: Lecture Notes in Computer Science, Springer, 425-438. [Google Scholar] [CrossRef]
|
|
[23]
|
Lu, L., Chang, E. and Chan, M.C. (2010) Website Fingerprinting and Identification Using Ordered Feature Sequences. In: Lecture Notes in Computer Science, Springer, 199-214. [Google Scholar] [CrossRef]
|
|
[24]
|
Bissias, G.D., Liberatore, M., Jensen, D. and Levine, B.N. (2006) Privacy Vulnerabilities in Encrypted HTTP Streams. In: Lecture Notes in Computer Science, Springer, 1-11. [Google Scholar] [CrossRef]
|
|
[25]
|
Qasem, A., Zhioua, S. and Makhlouf, K. (2019) Finding a Needle in a Haystack: The Traffic Analysis Version. Proceedings on Privacy Enhancing Technologies, 2019, 270-290. [Google Scholar] [CrossRef]
|
|
[26]
|
Rish, I., et al. (2001) An Empirical Study of the Naive Bayes Classifier. IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, Seattle, 4 August 2001, 41-46.
|
|
[27]
|
Chang, C. and Lin, C. (2011) LIBSVM: A Library for Support Vector Machines. ACM Transactions on Intelligent Systems and Technology, 2, 1-27. [Google Scholar] [CrossRef]
|
|
[28]
|
Cai, X. (2014) Website Fingerprinting Attacks and Defenses on Anonymity Networks. State University of New York at Stony Brook.
|
|
[29]
|
Hinton, G.E., Osindero, S. and Teh, Y. (2006) A Fast Learning Algorithm for Deep Belief Nets. Neural Computation, 18, 1527-1554. [Google Scholar] [CrossRef] [PubMed]
|
|
[30]
|
Rimmer, V., Preuveneers, D., Juarez, M., Goethem, T.V. and Joosen, W. (2018) Automated Website Fingerprinting through Deep Learning. Proceedings 2018 Network and Distributed System Security Symposium, San Diego, 18-21 February 2018, Article 23150. [Google Scholar] [CrossRef]
|
|
[31]
|
Sirinam, P., Imani, M., Juarez, M. and Wright, M. (2018) Deep Fingerprinting. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, New York, 15-19 October 2018, 1928-1943. [Google Scholar] [CrossRef]
|
|
[32]
|
Pan, T., Tang, Z. and Xu, D. (2023) A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning. Mathematics, 11, Article 4078. [Google Scholar] [CrossRef]
|
|
[33]
|
Zou, H., Wei, Z., Su, J., Chen, S. and Qin, Z. (2024) Relation-CNN: Enhancing Website Fingerprinting Attack with Relation Features and NFS-CNN. Expert Systems with Applications, 247, Article 123236. [Google Scholar] [CrossRef]
|
|
[34]
|
Qiao, L., Wu, B., Yin, S., Li, H., Yuan, W. and Luo, X. (2023) Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training. IEEE Transactions on Information Forensics and Security, 18, 5375-5386. [Google Scholar] [CrossRef]
|
|
[35]
|
Deng, X., Yin, Q., Liu, Z., Zhao, X., Li, Q., Xu, M., et al. (2023) Robust Multi-Tab Website Fingerprinting Attacks in the Wild. 2023 IEEE Symposium on Security and Privacy, San Francisco, 21-25 May 2023, 1005-1022. [Google Scholar] [CrossRef]
|
|
[36]
|
Chen, G., Chen, S., Xiao, Y., Zhang, Y., Lin, Z. and Lai, T. (2020) Sgxpectre: Stealing Intel Secrets from SGX Enclaves via Speculative Execution. IEEE Security & Privacy, 18, 28-37. [Google Scholar] [CrossRef]
|
|
[37]
|
Shusterman, A., Agarwal, A., O’Connell, S., et al. (2021) Prime+Probe 1, JavaScript 0: Overcoming Browser-Based Side-Channel Defenses. 2021 USENIX Security, Online, 11-13 August 2021, 2863-2880.
|
|
[38]
|
Cronin, P., Gao, X., Wang, H. and Cotton, C. (2021) An Exploration of ARM System-Level Cache and GPU Side Channels. Annual Computer Security Applications Conference, New York, 6-10 December 2021, 784-795. [Google Scholar] [CrossRef]
|
|
[39]
|
Taneja, H., Kim, J., Xu, J.J., et al. (2023) Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs. 2023 USENIX Security, Anaheim, 9-11 August 2023, 6275-6292.
|
|
[40]
|
Rauscher, F., Kogler, A., Juffinger, J. and Gruss, D. (2024) Idleleak: Exploiting Idle State Side Effects for Information Leakage. Proceedings 2024 Network and Distributed System Security Symposium, San Diego, 26 February-1 March 2024. [Google Scholar] [CrossRef]
|
|
[41]
|
Agarwal, A., O’Connell, S., Kim, J., Yehezkel, S., Genkin, D., Ronen, E., et al. (2022). Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution. 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, 22-26 May 2022, 699-715. [CrossRef]
|
|
[42]
|
Paccagnella, R., Luo, L. and Fletcher, C.W. (2021) Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical.
|
|
[43]
|
Gulmezoglu, B. (2022) Xai-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses. IEEE Transactions on Dependable and Secure Computing, 19, 4039-4051. [Google Scholar] [CrossRef]
|
|
[44]
|
Ge, Q., Yarom, Y., Chothia, T. and Heiser, G. (2019) Time Protection. Proceedings of the Fourteenth EuroSys Conference 2019, New York, 25-28 March 2019, 1-17. [Google Scholar] [CrossRef]
|