skip to main content
10.1145/3460120.3484790acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

The One-Page Setting: A Higher Standard for Evaluating Website Fingerprinting Defenses

Published:13 November 2021Publication History

ABSTRACT

To defeat Website Fingerprinting (WF) attacks that threaten privacy on anonymity technologies such as Tor, defenses have been proposed and evaluated under the multi-page setting. The multi-page setting was designed as a difficult setting for the attacker and therefore gives too much of an advantage to the defense, allowing weak defenses to show success. We argue that all WF defenses should instead be evaluated under the one-page setting so that the defender needs to meet a higher standard of success.

Evaluating known WF defenses under the one-page setting, we found that Decoy, Front and Tamaraw all failed to defend against WF attacks. None of these defenses were shown to be vulnerable in previous work. In Tamaraw's case, the attacker's TPR increases 13 times from 2.9% to 37% with 4.4% FPR; he can also achieve 91% TPR and 21% FPR. We also found that these attacks were able to succeed in a wide array of newly defined WF scenarios that could not be captured by the standard laboratory scenario. In response, we create the first defense that is strong enough for the one-page setting by augmenting Tamaraw with greater randomization overhead so that its anonymity sets are more evenly dispersed.

References

  1. Sanjit Bhat, David Lu, Albert Kwon, and Srinivas Devadas. [n.d.]. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. Privacy Enhancing Technologies, Vol. 1, 19.Google ScholarGoogle Scholar
  2. Xiang Cai, Rishab Nithyanand, Tao Wang, Ian Goldberg, and Rob Johnson. 2014. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. In Proceedings of the 21st ACM Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. 2012. Touching from a Distance: Website Fingerprinting Attacks and Defenses. In Proceedings of the 19th ACM Conference on Computer and Communications Security. 605--616.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Giovanni Cherubin, Jamie Hayes, and Marc Juarez. 2017. Website Fingerprinting Defenses at the Application Layer. Proceedings on Privacy Enhancing Technologies (2017).Google ScholarGoogle ScholarCross RefCross Ref
  5. Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, and Andriy Panchenko. 2020. TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. In Proceedings of the 27th ACM Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kevin P Dyer, Scott E Coull, Thomas Ristenpart, and Thomas Shrimpton. 2012. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In Proceedings of the 2012 IEEE Symposium on Security and Privacy. 332--346.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jiajun Gong and Tao Wang. 2020. Zero-Delay Lightweight Defenses against Website Fingerprinting. In Proceedings of the 29th USENIX Security Symposium (to appear).Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jamie Hayes and George Danezis. 2016. k-Fingerprinting: A Robust Scalable Website Fingerprinting Technique. In Proceedings of the 25th USENIX Security Symposium.Google ScholarGoogle Scholar
  10. Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright. 2016. Toward an Efficient Website Fingerprinting Defense. In Computer Security--ESORICS 2016. Springer, 27--46.Google ScholarGoogle ScholarCross RefCross Ref
  11. Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle, and Thomas Engel. 2016. Website Fingerprinting at Internet Scale. In Proceedings of the 23rd Network and Distributed System Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  12. Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel. 2011. Website Fingerprinting in Onion Routing Based Anonymization Networks. In Proceedings of the 10th ACM Workshop on Privacy in the Electronic Society. 103--114.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. 2018. Automated Website Fingerprinting through Deep Learning. In Proceedings of the 25th Network and Distributed System Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  14. Vitaly Shmatikov and Ming-Hsiu Wang. 2006. Timing analysis in low-latency mix networks: Attacks and defenses. In Computer Security--ESORICS 2006. 18--33.Google ScholarGoogle Scholar
  15. Payap Sirinam, Mohsen Imani, Marc Juarez, and Matthew Wright. 2018. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. In Proceedings of the 25th ACM Conference on Computer and Communications Security. ACM, 1928--1943.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Qixiang Sun, Daniel R Simon, Yi-Min Wang, Wilf Russell, Venkata N Padmanabhan, and Lili Qiu. 2002. Statistical Identification of Encrypted Web Browsing Traffic. In Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE, 19--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Tao Wang. 2020. High Precision Open-World Website Fingerprinting. In Proceedings of the 2020 IEEE Symposium on Security and Privacy.Google ScholarGoogle ScholarCross RefCross Ref
  18. Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In Proceedings of the 23rd USENIX Security Symposium.Google ScholarGoogle Scholar
  19. Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In Proceedings of the 26th USENIX Security Symposium.Google ScholarGoogle Scholar
  20. Charles V Wright, Scott E Coull, and Fabian. Monrose. 2009. Traffic Morphing: An Efficient Defense against Statistical Traffic Analysis. In Proceedings of the 16th Network and Distributed Security Symposium. 237--250.Google ScholarGoogle Scholar

Index Terms

  1. The One-Page Setting: A Higher Standard for Evaluating Website Fingerprinting Defenses

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
        November 2021
        3558 pages
        ISBN:9781450384544
        DOI:10.1145/3460120

        Copyright © 2021 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 November 2021

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader