{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:00:58Z","timestamp":1740099658855,"version":"3.37.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030353292"},{"type":"electronic","value":"9783030353308"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35330-8_6","type":"book-chapter","created":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T07:12:28Z","timestamp":1579158748000},"page":"99-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IUPTIS: Fingerprinting Profile Webpages in a Dynamic and Practical DPI Context"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2848-5252","authenticated-orcid":false,"given":"Mariano","family":"Di Martino","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3306-8637","authenticated-orcid":false,"given":"Pieter","family":"Robyns","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4811-0578","authenticated-orcid":false,"given":"Peter","family":"Quax","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1888-6383","authenticated-orcid":false,"given":"Wim","family":"Lamotte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,17]]},"reference":[{"key":"6_CR1","unstructured":"Pinterest (2018). \nhttps:\/\/www.pinterest.com\n\n. Accessed 13 Nov 2018"},{"key":"6_CR2","unstructured":"Brandwatch: Brandwatch Peer Index (2017). \nhttps:\/\/www.brandwatch.com\/p\/peerindex-and-brandwatch\n\n. Accessed 14 Oct 2017"},{"key":"6_CR3","unstructured":"Brissaud, P.O., Francois, J., Chrisment, I., Cholez, T., Bettan, O.: Passive monitoring of HTTPS service use. In: 14th International Conference on Network and Service Management (CNSM 2018), Rome, Italy , p. 7, November 2018. \nhttps:\/\/hal.inria.fr\/hal-01943936"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Cai, X., Nithyanand, R., Johnson, R.: CS-BuFLO: a congestion sensitive website fingerprinting defense. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, pp. 121\u2013130. ACM, New York (2014). \nhttps:\/\/doi.org\/10.1145\/2665943.2665949","DOI":"10.1145\/2665943.2665949"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Cai, X., Nithyanand, R., Wang, T., Johnson, R., Goldberg, I.: A systematic approach to developing and evaluating website fingerprinting defenses. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 227\u2013238. ACM, New York (2014). \nhttps:\/\/doi.org\/10.1145\/2660267.2660362","DOI":"10.1145\/2660267.2660362"},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 605\u2013616. ACM, New York (2012). \nhttps:\/\/doi.org\/10.1145\/2382196.2382260","DOI":"10.1145\/2382196.2382260"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Cao, Y., Li, S., Wijmans, E.: (Cross-)browser fingerprinting via OS and hardware level features. In: NDSS (2017)","DOI":"10.14722\/ndss.2017.23152"},{"key":"6_CR8","unstructured":"Cheng, H., Cheng, H., Avnur, R.: Traffic analysis of SSL encrypted web browsing (1998)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Cherubin, G.: Bayes, not Na\u00efve: security bounds on website fingerprinting defenses. In: PoPETs, pp. 215\u2013231 (2017)","DOI":"10.1515\/popets-2017-0046"},{"issue":"2","key":"6_CR10","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1515\/popets-2017-0023","volume":"2017","author":"G Cherubin","year":"2017","unstructured":"Cherubin, G., Hayes, J., Juarez, M.: Website fingerprinting defenses at the application layer. Proc. Priv. Enhanc. Technol. 2017(2), 186\u2013203 (2017)","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"6_CR11","unstructured":"Coull, S.E., Collins, M.P., Wright, C.V., Monrose, F., Reiter, M.K.: On web browsing privacy in anonymized NetFlows. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS 2007, USENIX Association, Berkeley, CA, USA, pp. 23:1\u201323:14 (2007). \nhttp:\/\/dl.acm.org\/citation.cfm?id=1362903.1362926"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Di Martino, M., Robyns, P., Quax, P., Lamotte, W.: Iuptis: a practical, cache-resistant fingerprinting technique for dynamic webpages. In: WEBIST (2018)","DOI":"10.5220\/0007226501020112"},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: why efficient traffic analysis countermeasures fail. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP 2012, pp. 332\u2013346. IEEE Computer Society, Washington (2012). \nhttps:\/\/doi.org\/10.1109\/SP.2012.28","DOI":"10.1109\/SP.2012.28"},{"key":"6_CR14","unstructured":"The Economist: Very personal finance (2012). \nhttp:\/\/www.economist.com\/node\/21556263\n\n. Accessed 10 Sept 2017"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-319-64185-0_4","volume-title":"Digital Forensics and Watermarking","author":"TG Ejeta","year":"2017","unstructured":"Ejeta, T.G., Kim, H.J.: Website fingerprinting attack on psiphon and its forensic analysis. In: Kraetzer, C., Shi, Y.-Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 42\u201351. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-64185-0_4"},{"key":"6_CR16","unstructured":"Est\u00eav\u00e3o, F.P.C.: Fingerprinting HTTP\/2 web pages (2017)"},{"key":"6_CR17","unstructured":"European Commission: Data protection (2018). \nhttps:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection_en\n\n. Accessed 17 June 2018"},{"key":"6_CR18","unstructured":"Council of the European Union: Common challenges in combating cybercrime, p. 5 (2017). \nhttp:\/\/data.consilium.europa.eu\/doc\/document\/ST-7021-2017-INIT\/en\/pdf"},{"key":"6_CR19","unstructured":"Gallagher, S.: Chinese government launches man-in-middle attack against icloud [updated]. Ars Technica (2014). \nhttps:\/\/arstechnica.com\/information-technology\/2014\/10\/chinese-government-launches-man-in-middle-attack-against-icloud\/"},{"key":"6_CR20","unstructured":"Hayes, J., Danezis, G.: k-fingerprinting: a robust scalable website fingerprinting technique. In: 25th USENIX Security Symposium (USENIX Security 16), USENIX Association, Austin, TX, pp. 1187\u20131203 (2016)"},{"key":"6_CR21","doi-asserted-by":"publisher","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial Na\u00efVe-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, pp. 31\u201342. ACM, New York (2009). \nhttps:\/\/doi.org\/10.1145\/1655008.1655013","DOI":"10.1145\/1655008.1655013"},{"issue":"1","key":"6_CR22","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s13635-016-0030-7","volume":"2016","author":"M Hus\u00e1k","year":"2016","unstructured":"Hus\u00e1k, M., \u010cerm\u00e1k, M., Jirs\u00edk, T., \u010celeda, P.: HTTPS traffic analysis and client identification using passive SSL\/TLS fingerprinting. EURASIP J. Inf. Secur. 2016(1), 6 (2016). \nhttps:\/\/doi.org\/10.1186\/s13635-016-0030-7","journal-title":"EURASIP J. Inf. Secur."},{"key":"6_CR23","unstructured":"InformAction: Noscript. \nhttps:\/\/noscript.net\/\n\n. Accessed 18 Oct 2018"},{"key":"6_CR24","doi-asserted-by":"publisher","unstructured":"Juarez, M., Afroz, S., Acar, G., Diaz, C., Greenstadt, R.: A critical evaluation of website fingerprinting attacks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 263\u2013274. ACM, New York (2014). \nhttps:\/\/doi.org\/10.1145\/2660267.2660368","DOI":"10.1145\/2660267.2660368"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-45744-4_2","volume-title":"Computer Security \u2013 ESORICS 2016","author":"M Juarez","year":"2016","unstructured":"Juarez, M., Imani, M., Perry, M., Diaz, C., Wright, M.: Toward an efficient website fingerprinting defense. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 27\u201346. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-45744-4_2"},{"key":"6_CR26","unstructured":"Kwon, A., AlSabah, M., Lazar, D., Dacier, M., Devadas, S.: Circuit fingerprinting attacks: passive deanonymization of tor hidden services. In: 24th USENIX Security Symposium (USENIX Security 15), USENIX Association, Washington, D.C., pp. 287\u2013302 (2015). \nhttps:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/kwon"},{"key":"6_CR27","doi-asserted-by":"publisher","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 255\u2013263. ACM, New York (2006). \nhttps:\/\/doi.org\/10.1145\/1180405.1180437","DOI":"10.1145\/1180405.1180437"},{"key":"6_CR28","unstructured":"Liu, L., Preo\u0163iuc-Pietro, D., Riahi, Z., Moghaddam, M.E., Ungar, L.: Analyzing personality through social media profile picture choice. In: ICWSM (2016)"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-15497-3_13","volume-title":"Computer Security \u2013 ESORICS 2010","author":"L Lu","year":"2010","unstructured":"Lu, L., Chang, E.-C., Chan, M.C.: Website fingerprinting and identification using ordered feature sequences. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 199\u2013214. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-15497-3_13"},{"key":"6_CR30","unstructured":"Luo, X., Zhou, P., Chan, E.W.W., Lee, W., Chang, R.K.C., Perdisci, R.: HTTPOS: sealing information leaks with browser-side obfuscation of encrypted flows. In: Proceedings of the Network and Distributed Systems Symposium (NDSS). The Internet Society (2011). \nhttp:\/\/hdl.handle.net\/10397\/50561"},{"key":"6_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-319-08506-7_8","volume-title":"Privacy Enhancing Technologies","author":"B Miller","year":"2014","unstructured":"Miller, B., Huang, L., Joseph, A.D., Tygar, J.D.: I know why you went to the clinic: risks and realization of HTTPS traffic analysis. In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 143\u2013163. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-08506-7_8"},{"key":"6_CR32","unstructured":"Morla, R.: Effect of pipelining and multiplexing in estimating HTTP\/2.0 web object sizes. ArXiv e-prints (2017)"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Panchenko, A., et al.: Website fingerprinting at internet scale. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23477"},{"key":"6_CR34","doi-asserted-by":"publisher","unstructured":"Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011, pp. 103\u2013114. ACM, New York, (2011). \nhttps:\/\/doi.org\/10.1145\/2046556.2046570","DOI":"10.1145\/2046556.2046570"},{"key":"6_CR35","unstructured":"Perez, S.: Facebook starts pushing its data tracking onavo vpn within its main mobile app (2018). \nhttps:\/\/techcrunch.com\/2018\/02\/12\/facebook-starts-pushing-its-data-tracking-onavo-vpn-within-its-main-mobile-app\/"},{"key":"6_CR36","unstructured":"Project, T.T.: Tor. \nhttps:\/\/www.torproject.org\n\n. Accessed 17 June 2018"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Rao, A., Spasojevic, N., Li, Z., Dsouza, T.: Klout score: measuring influence across multiple social networks. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 2282\u20132289 (2015)","DOI":"10.1109\/BigData.2015.7364017"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Rimmer, V., Preuveneers, D., Juarez, M., Van Goethem, T., Joosen, W.: Automated feature extraction for website fingerprinting through deep learning (2017, to appear)","DOI":"10.14722\/ndss.2018.23105"},{"key":"6_CR39","unstructured":"Statcounter: Statcounter Global Stats (2018). \nhttp:\/\/gs.statcounter.com\/\n\n. Accessed 06 Nov 2018"},{"key":"6_CR40","unstructured":"Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, SP 2002, pp. 19\u201330. IEEE Computer Society, Washington, (2002). \nhttp:\/\/dl.acm.org\/citation.cfm?id=829514.830535"},{"key":"6_CR41","unstructured":"Wang, T.: Website fingerprinting: attacks and defenses (Doctoral dissertation), university of Waterloo, Canada (2015)"},{"key":"6_CR42","unstructured":"Wang, T., Goldberg, I.: Walkie-talkie: an efficient defense against passive website fingerprinting attacks. In: 26th USENIX Security Symposium (USENIX Security 17), USENIX Association, Vancouver, BC, pp. 1375\u20131390 (2017). \nhttps:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/wang-tao"},{"key":"6_CR43","unstructured":"WiFi4EU: Free wi-fi for europeans (2016). \nhttps:\/\/ec.europa.eu\/digital-single-market\/en\/policies\/wifi4eu-free-wi-fi-europeans"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Wijnants, M., Marx, R., Quax, P., Lamotte, W.: HTTP\/2 Prioritization and its Impact on Web Performance. In: The Web Conference WWW 2018 (2018)","DOI":"10.1145\/3178876.3186181"},{"key":"6_CR45","unstructured":"Wright, C.V., Coull, S.E., Monrose, F.: traffic morphing: an efficient defense against statistical traffic analysis. In: Proceedings of the 16th Network and Distributed Security Symposium, pp. 237\u2013250. IEEE (2009)"}],"container-title":["Lecture Notes in Business Information Processing","Web Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35330-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T07:18:40Z","timestamp":1579159120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35330-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030353292","9783030353308"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35330-8_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"17 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WEBIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"webist2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.webist.org\/?y=2018","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}