Robust Website Fingerprinting Through the Cache Occupancy Channel
Venue: 28th USENIX Security Symposium, 2019
Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assumes an on-path adversary, who can observe all traffic traveling between the user’s computer and the secure network.
Note: An extended version of this work appears in IEEE Transactions on Dependable and Secure Computing, which adds a real-world evaluation.
The dataset used in this paper is publicly available under a CC-BY license on IEEE DataPort.