Главная
Study mode:
on
1
Intro
2
Limitations
3
Website Fingerprinting
4
WeftD Overview
5
Challenges
6
Adaptive Kernel Density Estimation
7
Kononex Algorithm
8
Clustering
9
Features
10
Aggregate
11
OpenWorld
12
Accuracy
13
Mutual Information
14
Information Leakage
15
entropy
Description:
Explore the intricacies of Website Fingerprinting (WF) attacks and defenses in this 25-minute conference talk from the Association for Computing Machinery (ACM). Delve into the vulnerabilities of Tor's low-latency anonymous network access and understand how information leakage can be exploited by adversaries. Learn about the WeftD framework, adaptive kernel density estimation, and the Kononex algorithm for measuring information leakage. Examine clustering techniques, feature selection, and the challenges of open-world scenarios. Analyze accuracy metrics, mutual information, and entropy in the context of WF attacks. Gain insights into the limitations of current defenses and explore potential improvements for enhancing user privacy in anonymous communication networks.

Measuring Information Leakage in Website Fingerprinting Attacks and Defenses

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00