{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:25:25Z","timestamp":1757618725756,"version":"3.44.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031976193"},{"type":"electronic","value":"9783031976209"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-97620-9_2","type":"book-chapter","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:32:55Z","timestamp":1752139975000},"page":"26-45","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a\u00a0Few Samples Using Siamese Network"],"prefix":"10.1007","author":[{"given":"Neriya","family":"Mazzuz","sequence":"first","affiliation":[]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"2_CR1","first-page":"15","volume":"42","author":"K Abe","year":"2016","unstructured":"Abe, K., Goto, S.: Fingerprinting attack on tor anonymity using deep learning. Proc. Asia-Pacific Advanced Netw. 42, 15\u201320 (2016)","journal-title":"Proc. Asia-Pacific Advanced Netw."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Bhat, S., Lu, D., Kwon, A.H., Devadas, S.: Var-cnn: a data-efficient website fingerprinting attack based on deep learning (2019)","DOI":"10.2478\/popets-2019-0070"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11767831_1","volume-title":"Privacy Enhancing Technologies","author":"GD Bissias","year":"2006","unstructured":"Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy vulnerabilities in encrypted HTTP streams. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 1\u201311. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11767831_1"},{"key":"2_CR4","unstructured":"Cheng, H., Avnur, R.: Traffic analysis of ssl encrypted web browsing. University of Berkeley, Project paper (1998)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Fuchs, C., Boersma, K., Albrechtslund, A., Sandoval, M.: Internet and surveillance: the challenges of Web 2.0 and social media, vol.\u00a016. Routledge (2013)","DOI":"10.4324\/9780203806432"},{"key":"2_CR6","unstructured":"Garc\u00eda, S., Hynek, K., Vekshin, D., \u010cejka, T., Wasicek, A.: Large scale measurement on the adoption of encrypted dns. arXiv preprint arXiv:2107.04436 (2021)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-31680-7_4","volume-title":"Privacy Enhancing Technologies","author":"X Gong","year":"2012","unstructured":"Gong, X., Borisov, N., Kiyavash, N., Schear, N.: Website detection using remote traffic analysis. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 58\u201378. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31680-7_4"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1016\/j.cose.2018.01.018","volume":"77","author":"C Grothoff","year":"2018","unstructured":"Grothoff, C., Wachs, M., Ermert, M., Appelbaum, J.: Toward secure name resolution on the internet. Comput. Sec. 77, 694\u2013708 (2018)","journal-title":"Comput. Sec."},{"key":"2_CR9","unstructured":"Hayes, J., Danezis, G.: k-fingerprinting: a robust scalable website fingerprinting technique. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 1187\u20131203 (2016)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\u00efve-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud computing Security, pp. 31\u201342 (2009)","DOI":"10.1145\/1655008.1655013"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-36467-6_13","volume-title":"Privacy Enhancing Technologies","author":"A Hintz","year":"2003","unstructured":"Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 171\u2013178. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36467-6_13"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Hoang, N.P., Akhavan\u00a0Niaki, A., Borisov, N., Gill, P., Polychronakis, M.: Assessing the privacy benefits of domain name encryption. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 290\u2013304 (2020)","DOI":"10.1145\/3320269.3384728"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Hoang, N.P., Asano, Y., Yoshikawa, M.: Your neighbors are my spies: location and other privacy concerns in glbt-focused location-based dating applications. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 851\u2013860. IEEE (2017)","DOI":"10.23919\/ICACT.2017.7890236"},{"issue":"4","key":"2_CR15","doi-asserted-by":"publisher","first-page":"420","DOI":"10.2478\/popets-2021-0078","volume":"2021","author":"NP Hoang","year":"2021","unstructured":"Hoang, N.P., Niaki, A.A., Gill, P., Polychronakis, M.: Domain name encryption is not enough: privacy leakage via ip-based website fingerprinting. Proc. Priv. Enhancing Technol. 2021(4), 420\u2013440 (2021)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-319-24261-3_7","volume-title":"Similarity-Based Pattern Recognition","author":"E Hoffer","year":"2015","unstructured":"Hoffer, E., Ailon, N.: Deep metric learning using triplet network. In: Feragen, A., Pelillo, M., Loog, M. (eds.) Similarity-Based Pattern Recognition, pp. 84\u201392. Springer International Publishing, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24261-3_7"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Holz, R., et al.: Tracking the deployment of tls 1.3 on the web: a story of experimentation and centralization. ACM SIGCOMM Comput. Commun. Rev. 50(3), 3\u201315 (2020)","DOI":"10.1145\/3411740.3411742"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Houser, R., Li, Z., Cotton, C., Wang, H.: An investigation on information leakage of dns over tls. In: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, pp. 123\u2013137 (2019)","DOI":"10.1145\/3359989.3365429"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K.G., Vallina-Rodriguez, N., Caballero, J.: Coming of age: a longitudinal study of tls deployment. In: Proceedings of the Internet Measurement Conference 2018, pp. 415\u2013428 (2018)","DOI":"10.1145\/3278532.3278568"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-030-57043-9_25","volume-title":"Security Protocols XXVII","author":"L Kraus","year":"2020","unstructured":"Kraus, L., Ukrop, M., Matyas, V., Fiebig, T.: Evolution of SSL\/TLS indicators and\u00a0warnings in web browsers. In: Anderson, J., Stajano, F., Christianson, B., Maty\u00e1\u0161, V. (eds.) Security Protocols 2019. LNCS, vol. 12287, pp. 267\u2013280. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57043-9_25"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted http connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 255\u2013263 (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-15497-3_13","volume-title":"Computer Security \u2013 ESORICS 2010","author":"L Lu","year":"2010","unstructured":"Lu, L., Chang, E.-C., Chan, M.C.: Website fingerprinting and identification using ordered feature sequences. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 199\u2013214. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_13"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Panchenko, A., et al.: Website fingerprinting at internet scale. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23477"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Patil, S., Borisov, N.: What can you learn from an ip? In: Proceedings of the Applied Networking Research Workshop, pp. 45\u201351 (2019)","DOI":"10.1145\/3340301.3341133"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Penney, J.: Internet surveillance, regulation, and chilling effects online: a comparative case study. Regulat. Chilling Effects Online: Comparative Case Study 6(2) (2017)","DOI":"10.14763\/2017.2.692"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Rimmer, V., Preuveneers, D., Juarez, M., Van\u00a0Goethem, T., Joosen, W.: Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376 (2017)","DOI":"10.14722\/ndss.2018.23105"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Siby, S., Juarez, M., Diaz, C., Vallina-Rodriguez, N., Troncoso, C.: Encrypted dns\u2013> privacy? a traffic analysis perspective. arXiv preprint arXiv:1906.09682 (2019)","DOI":"10.14722\/ndss.2020.24301"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Sirinam, P., Imani, M., Juarez, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1928\u20131943 (2018)","DOI":"10.1145\/3243734.3243768"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Sirinam, P., Mathews, N., Rahman, M.S., Wright, M.: Triplet fingerprinting: more practical and portable website fingerprinting with n-shot learning. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1131\u20131148 (2019)","DOI":"10.1145\/3319535.3354217"},{"key":"2_CR30","unstructured":"Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 19\u201330. IEEE (2002)"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.\u00a01\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2014)","DOI":"10.1109\/CVPR.2014.220"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Trevisan, M., Drago, I., Mellia, M., Munafo, M.M.: Towards web service classification using addresses and dns. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 38\u201343. IEEE (2016)","DOI":"10.1109\/IWCMC.2016.7577030"},{"issue":"3","key":"2_CR34","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/3411740.3411743","volume":"50","author":"M Trevisan","year":"2020","unstructured":"Trevisan, M., Soro, F., Mellia, M., Drago, I., Morla, R.: Does domain name encryption increase users\u2019 privacy? ACM SIGCOMM Comput. Commun. Rev. 50(3), 16\u201322 (2020)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"2_CR35","unstructured":"Wang, T., Cai, X., Nithyanand, R., Johnson, R., Goldberg, I.: Effective attacks and provable defenses for website fingerprinting. In: 23rd USENIX Security Symposium (USENIX Security 2014), pp. 143\u2013157 (2014)"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 201\u2013212 (2013)","DOI":"10.1145\/2517840.2517851"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted voip conversations. In: 2008 IEEE Symposium on Security and Privacy (sp 2008), pp. 35\u201349. IEEE (2008)","DOI":"10.1109\/SP.2008.21"},{"key":"2_CR38","unstructured":"Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob? In: USENIX Security Symposium, vol.\u00a03, pp. 43\u201354 (2007)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97620-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T01:55:16Z","timestamp":1757210116000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97620-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031976193","9783031976209"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97620-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva.org\/dimva2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}