Conference proceeding
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
Proceedings of the 13th Workshop on privacy in the electronic society, pp.121-130
WPES '14
11/03/2014
DOI: 10.1145/2665943.2665949
Abstract
Website fingerprinting attacks enable an adversary to infer which website a victim is visiting, even if the victim uses an encrypting proxy, such as Tor. Previous work has shown that all proposed defenses against website fingerprinting attacks are ineffective. This paper advances the study of website fingerprinting defenses by first laying out the complete specifications of the CS-BuFlo scheme outlined by Cai, et al. CS-BuFlo, which is based on the BuFlo defense proposed by Dyer, et al., was not fully-specified by Cai, et al, but has nonetheless attracted the attention of the Tor developers. Next, a full working implementation of CS-BuFlo is provided. Finally, a thorough evaluation of CS-BuFlo is performed using empirical data (rather than data from simulations). Our experiments find that CS-BuFlo has high overhead (around 2.3-2.8x) but can get 6times closer to the bandwidth/security trade-off lower bound than Tor or SSH.
Details
- Title: Subtitle
- CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
- Creators
- Xiang CaiRishab NithyanandRob Johnson
- Resource Type
- Conference proceeding
- Publication Details
- Proceedings of the 13th Workshop on privacy in the electronic society, pp.121-130
- Publisher
- ACM
- Series
- WPES '14
- DOI
- 10.1145/2665943.2665949
- ISSN
- 1543-7221
- Language
- English
- Date published
- 11/03/2014
- Academic Unit
- Computer Science; Public Policy Center (Archive); Center for Social Science Innovation
- Record Identifier
- 9984002354902771
Metrics
118 Record Views