Skip to main content

Showing 1–2 of 2 results for author: Holland, J K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.02012  [pdf, other

    cs.CR

    DeTorrent: An Adversarial Padding-only Traffic Analysis Defense

    Authors: James K Holland, Jason Carpenter, Se Eun Oh, Nicholas Hopper

    Abstract: While anonymity networks like Tor aim to protect the privacy of their users, they are vulnerable to traffic analysis attacks such as Website Fingerprinting (WF) and Flow Correlation (FC). Recent implementations of WF and FC attacks, such as Tik-Tok and DeepCoFFEA, have shown that the attacks can be effectively carried out, threatening user privacy. Consequently, there is a need for effective traff… ▽ More

    Submitted 22 September, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Accepted to the 24th Privacy Enhancing Technologies Symposium (PETS 2024)

  2. arXiv:2012.06609  [pdf, other

    cs.CR

    RegulaTor: A Straightforward Website Fingerprinting Defense

    Authors: James K Holland, Nicholas Hopper

    Abstract: Website Fingerprinting (WF) attacks are used by local passive attackers to determine the destination of encrypted internet traffic by comparing the sequences of packets sent to and received by the user to a previously recorded data set. As a result, WF attacks are of particular concern to privacy-enhancing technologies such as Tor. In response, a variety of WF defenses have been developed, though… ▽ More

    Submitted 21 September, 2021; v1 submitted 11 December, 2020; originally announced December 2020.