Adaptive Webpage Fingerprinting from TLS Traces
- URL: http://arxiv.org/abs/2010.10294v2
- Date: Fri, 27 Oct 2023 15:26:02 GMT
- Title: Adaptive Webpage Fingerprinting from TLS Traces
- Authors: Vasilios Mavroudis, Jamie Hayes
- Abstract summary: In webpage fingerprinting, an adversary infers the specific webpage loaded by a victim user by analysing the patterns in the encrypted TLS traffic exchanged between the user's browser and the website's servers.
This work studies modern webpage fingerprinting adversaries against the TLS protocol.
We introduce a TLS-specific model that: 1) scales to an unprecedented number of target webpages, 2) can accurately classify thousands of classes it never encountered during training, and 3) has low operational costs even in scenarios of frequent page updates.
- Score: 13.009834690757614
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In webpage fingerprinting, an on-path adversary infers the specific webpage
loaded by a victim user by analysing the patterns in the encrypted TLS traffic
exchanged between the user's browser and the website's servers. This work
studies modern webpage fingerprinting adversaries against the TLS protocol;
aiming to shed light on their capabilities and inform potential defences.
Despite the importance of this research area (the majority of global Internet
users rely on standard web browsing with TLS) and the potential real-life
impact, most past works have focused on attacks specific to anonymity networks
(e.g., Tor). We introduce a TLS-specific model that: 1) scales to an
unprecedented number of target webpages, 2) can accurately classify thousands
of classes it never encountered during training, and 3) has low operational
costs even in scenarios of frequent page updates. Based on these findings, we
then discuss TLS-specific countermeasures and evaluate the effectiveness of the
existing padding capabilities provided by TLS 1.3.
Related papers
- AgentOccam: A Simple Yet Strong Baseline for LLM-Based Web Agents [52.13695464678006]
This study enhances an LLM-based web agent by simply refining its observation and action space.
AgentOccam surpasses the previous state-of-the-art and concurrent work by 9.8 (+29.4%) and 5.9 (+15.8%) absolute points respectively.
arXiv Detail & Related papers (2024-10-17T17:50:38Z) - Generative Pre-trained Ranking Model with Over-parameterization at Web-Scale (Extended Abstract) [73.57710917145212]
Learning to rank is widely employed in web searches to prioritize pertinent webpages based on input queries.
We propose a emphulineGenerative ulineSemi-ulineSupervised ulinePre-trained (GS2P) model to address these challenges.
We conduct extensive offline experiments on both a publicly available dataset and a real-world dataset collected from a large-scale search engine.
arXiv Detail & Related papers (2024-09-25T03:39:14Z) - ParTEETor: A System for Partial Deployments of TEEs within Tor [6.668496876628325]
ParTEETor is a Tor-variant system that uses partial deployments of trusted execution environments to thwart known attacks.
We evaluate ParTEETor for security, performance, and privacy.
arXiv Detail & Related papers (2024-08-26T21:23:19Z) - Seamless Website Fingerprinting in Multiple Environments [4.226243782049956]
Website fingerprinting (WF) attacks identify the websites visited over anonymized connections.
We introduce a new approach that classifies entire websites rather than individual web pages.
Our Convolutional Neural Network (CNN) uses only the jitter and size of 500 contiguous packets from any point in a TCP stream.
arXiv Detail & Related papers (2024-07-28T02:18:30Z) - EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection [53.25863925815954]
Federated self-supervised learning (FSSL) has emerged as a promising paradigm that enables the exploitation of clients' vast amounts of unlabeled data.
While FSSL offers advantages, its susceptibility to backdoor attacks has not been investigated.
We propose the Embedding Inspector (EmInspector) that detects malicious clients by inspecting the embedding space of local models.
arXiv Detail & Related papers (2024-05-21T06:14:49Z) - Ask for Alice: Online Covert Distress Signal in the Presence of a Strong Adversary [1.433758865948252]
This allows a user to call for help even when they are in the same physical space as their adversaries.
Our model fits into scenarios where a user is under surveillance and wishes to inform a trusted party of the situation.
arXiv Detail & Related papers (2023-10-05T01:07:06Z) - Efficient and Low Overhead Website Fingerprinting Attacks and Defenses
based on TCP/IP Traffic [16.6602652644935]
Website fingerprinting attacks based on machine learning and deep learning tend to use the most typical features to achieve a satisfactory performance of attacking rate.
To defend against such attacks, random packet defense (RPD) with a high cost of excessive network overhead is usually applied.
We propose a filter-assisted attack against RPD, which can filter out the injected noises using the statistical characteristics of TCP/IP traffic.
We further improve the list-based defense by a traffic splitting mechanism, which can combat the mentioned attacks as well as save a considerable amount of network overhead.
arXiv Detail & Related papers (2023-02-27T13:45:15Z) - An Embarrassingly Simple Backdoor Attack on Self-supervised Learning [52.28670953101126]
Self-supervised learning (SSL) is capable of learning high-quality representations of complex data without relying on labels.
We study the inherent vulnerability of SSL to backdoor attacks.
arXiv Detail & Related papers (2022-10-13T20:39:21Z) - Few-Shot Backdoor Attacks on Visual Object Tracking [80.13936562708426]
Visual object tracking (VOT) has been widely adopted in mission-critical applications, such as autonomous driving and intelligent surveillance systems.
We show that an adversary can easily implant hidden backdoors into VOT models by tempering with the training process.
We show that our attack is resistant to potential defenses, highlighting the vulnerability of VOT models to potential backdoor attacks.
arXiv Detail & Related papers (2022-01-31T12:38:58Z) - Machine Learning Interpretability Meets TLS Fingerprinting [5.179808182296037]
We propose a framework to systematically find the most vulnerable information fields in a network protocol.
focusing on the transport layer security (TLS) protocol, we perform different machine-learning-based fingerprinting attacks on the collected data.
By employing the interpretation techniques developed in the machine learning community and applying our framework, we find the most vulnerable information fields in the TLS protocol.
arXiv Detail & Related papers (2020-11-12T10:37:45Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.