{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:39:05Z","timestamp":1755221945802,"version":"3.43.0"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032006233","type":"print"},{"value":"9783032006240","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00624-0_5","type":"book-chapter","created":{"date-parts":[[2025,8,9]],"date-time":"2025-08-09T11:42:32Z","timestamp":1754739752000},"page":"95-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Feasibility of\u00a0Fingerprinting Collaborative Robot Network Traffic"],"prefix":"10.1007","author":[{"given":"Cheng","family":"Tang","sequence":"first","affiliation":[]},{"given":"Diogo","family":"Barradas","sequence":"additional","affiliation":[]},{"given":"Urs","family":"Hengartner","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,10]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Al-Naami, K., et al.: Adaptive encrypted traffic fingerprinting with bi-directional dependence. In: Proceedings of ACSAC (2016)","DOI":"10.1145\/2991079.2991123"},{"key":"5_CR2","unstructured":"Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. In: Proceedings of the DAT Workshop (2016)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bahramali, A., Bozorgi, A., Houmansadr, A.: Realistic website fingerprinting by augmenting network traces. In: Proceedings of ACM CCS (2023)","DOI":"10.1145\/3576915.3616639"},{"key":"5_CR4","unstructured":"Barradas, D., Santos, N., Rodrigues, L.: Effective detection of multimedia protocol tunneling using machine learning. In: Proceedings of USENIX Security (2018)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Cai, X., Nithyanand, R., Wang, T., Johnson, R., Goldberg, I.: A systematic approach to developing and evaluating website fingerprinting defenses. In: Proceedings of ACM CCS (2014)","DOI":"10.1145\/2660267.2660362"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Chen, N., Chen, X.S., Xiong, B., Lu, H.W.: An anomaly detection and analysis method for network traffic based on correlation coefficient matrix. In: Proceedings of SCALCOM-EMBEDDEDCOM (2009)","DOI":"10.1109\/EmbeddedCom-ScalCom.2009.50"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of ACM KDD (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Cherubin, G.: Bayes, not na\u00efve: security bounds on website fingerprinting defenses. PoPETs 4 (2017)","DOI":"10.1515\/popets-2017-0046"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Chowdhury, R.R., Aneja, S., Aneja, N., Abas, E.: Network traffic analysis based iot device identification. In: Proceedings of ACM BDIOT (2020)","DOI":"10.1145\/3421537.3421545"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Colucci, G., Tagliavini, L., Carbonari, L., Cavallone, P., Botta, A., Quaglia, G.: Paquitop. arm, a mobile manipulator for assessing emerging challenges in the covid-19 pandemic scenario. Robotics 10(3) (2021)","DOI":"10.3390\/robotics10030102"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacks and lessons. In: Proceedings of ACM UbiComp (2009)","DOI":"10.1145\/1620545.1620564"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Dong, S., Li, Z., Tang, D., Chen, J., Sun, M., Zhang, K.: Your smart home can\u2019t keep a secret: towards automated fingerprinting of IoT traffic. In: Proceedings of ACM AsiaCCS (2020)","DOI":"10.1145\/3320269.3384732"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Engelberg, A., Wool, A.: Classification of encrypted IoT traffic despite padding and shaping. In: Proceedings of WPES (2022)","DOI":"10.1145\/3559613.3563191"},{"key":"5_CR14","unstructured":"European Union Agency for Cybersecurity: Encrypted traffic analysis (2019). https:\/\/www.enisa.europa.eu\/publications\/encrypted-traffic-analysis"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Fiorini, P., Goldberg, K.Y., Liu, Y., Taylor, R.H.: Concepts and trends in autonomy for robot-assisted surgery. Proc. of the IEEE 110(7) (2022)","DOI":"10.1109\/JPROC.2022.3176828"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Fran\u00e7a, R.P., Monteiro, A., Arthu, R., Iano, Y.: The evolution of robotic systems: overview and its application in modern times. Safety , Security, and Reliability of Robotic Systems (2020)","DOI":"10.1201\/9781003031352-1"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Gillini, G., et al.: A dual-arm mobile robot system performing assistive tasks operated via p300-based brain computer interface. Ind. Robot 49(1) (2022)","DOI":"10.1108\/IR-07-2020-0137"},{"key":"5_CR18","unstructured":"Gong, J., Wang, T.: Zero-delay lightweight defenses against website fingerprinting. In: Proceedings of USENIX Security (2020)"},{"key":"5_CR19","unstructured":"Hayes, J., Danezis, G.: k-fingerprinting: a robust scalable website fingerprinting technique. In: Proceedings of USENIX Security (2016)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Holland, J.K., Hopper, N.: Regulator: a straightforward website fingerprinting defense. PoPETs 2022(2) (2022)","DOI":"10.2478\/popets-2022-0049"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Kebria, P.M., Abdi, H., Dalvand, M.M., Khosravi, A., Nahavandi, S.: Control methods for internet-based teleoperation systems: a review. IEEE Trans. Hum.-Mach. Syst. 49(1) (2018)","DOI":"10.1109\/THMS.2018.2878815"},{"key":"5_CR22","unstructured":"Kinova Robotics: Kinova gen3 robotic arm (2023). https:\/\/www.kinovarobotics.com\/product\/gen3-robots"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Li, H., Niu, B., Wang, B.: Smartswitch: efficient traffic obfuscation against stream fingerprinting. In: Proceedings of SecureComm (2020)","DOI":"10.1007\/978-3-030-63086-7_15"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Li, S., Guo, H., Hopper, N.: Measuring information leakage in website fingerprinting attacks and defenses. In: Proceedings of ACM CCS (2018)","DOI":"10.1145\/3243734.3243832"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Mathews, N., Holland, J.K., Oh, S.E., Rahman, M.S., Hopper, N., Wright, M.: SOK: a critical evaluation of efficient website fingerprinting defenses. In: Proceedings of IEEE S &P (2023)","DOI":"10.1109\/SP46215.2023.10179289"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Mihelj, M., et\u00a0al.: Collaborative robots. Robotics (2019)","DOI":"10.1007\/978-3-319-72911-4"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Msadek, N., Soua, R., Engel, T.: IoT device fingerprinting: Machine learning based encrypted traffic analysis. In: Proceedings of the IEEE WCNC (2019)","DOI":"10.1109\/WCNC.2019.8885429"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Nasr, M., Houmansadr, A., Mazumdar, A.: Compressive traffic analysis: a new paradigm for scalable traffic analysis. In: Proceedings of ACM CCS (2017)","DOI":"10.1145\/3133956.3134074"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Lanze, F.: Website fingerprinting at Internet scale. In: Proceedings of NDSS (2016)","DOI":"10.14722\/ndss.2016.23477"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Pulikottil, T.B., Caimmi, M., D\u2019Angelo, M.G., Biffi, E., Pellegrinelli, S., Tosatti, L.M.: A voice control system for assistive robotic arms: preliminary usability tests on patients. In: Proceedings of IEEE BioRob (2018)","DOI":"10.1109\/BIOROB.2018.8487200"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Rahman, M.S., Sirinam, P., Mathews, N., Gangadhara, K.G., Wright, M.: Tik-tok: the utility of packet timing in website fingerprinting attacks. In: PoPETs (2020)","DOI":"10.2478\/popets-2020-0043"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Reed, A., Kranch, M.: Identifying HTTPS-protected Netflix videos in real-time. In: Proceedings of ACM CODASPY (2017)","DOI":"10.1145\/3029806.3029821"},{"key":"5_CR33","unstructured":"Schuster, R., Shmatikov, V., Tromer, E.: Beauty and the burst: Remote identification of encrypted video streams. In: Proceedings of USENIX Security (2017)"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Shah, R., Ahmed, C.M., Nagaraja, S.: Can you still see me?: identifying robot operations over end-to-end encrypted channels. In: Proceedings of ACM WiSec (2022)","DOI":"10.1145\/3507657.3529659"},{"key":"5_CR35","unstructured":"Shen, M., Ji, K., Gao, Z., Li, Q., Zhu, L., Xu, K.: Subverting website fingerprinting defenses with robust traffic representation. In: Proceedings of USENIX Security (2023)"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Shenoi, A., Karthik, P., Sabharwal, K., Jialin, L., Divakaran, D.M.: ipet: privacy enhancing traffic perturbations for IoT communications. PoPETs 2 (2023)","DOI":"10.56553\/popets-2023-0048"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Sirinam, P., Imani, M., Juarez, M., Wright, M.: Deep fingerprinting: Undermining website fingerprinting defenses with deep learning. In: Proceedings of ACM CCS (2018)","DOI":"10.1145\/3243734.3243768"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Vaskevich, A., Dahanayaka, T., Jourjon, G., Seneviratne, S.: Smaug: streaming media augmentation using CGANs as a defence against video fingerprinting. In: Proceedings of IEEE NCA (2021)","DOI":"10.1109\/NCA53618.2021.9685579"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Veicht, A., Renggli, C., Barradas, D.: Deepse-WF: unified security estimation for website fingerprinting defenses. PoPETs 2 (2023)","DOI":"10.56553\/popets-2023-0047"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Wang, T.: High precision open-world website fingerprinting. In: Proceedings of IEEE S &P (2020)","DOI":"10.1109\/SP40000.2020.00015"},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Wilson, G., et al.: Robot-enabled support of daily activities in smart home environments. Cogn. Syst. Res. 54 (2019)","DOI":"10.1016\/j.cogsys.2018.10.032"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Yin, Y., Lin, Z., Jin, M., Fanti, G., Sekar, V.: Practical GAN-based synthetic IP header trace generation using netshare. In: Proceedings of ACM SIGCOMM (2022)","DOI":"10.1145\/3544216.3544251"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00624-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,9]],"date-time":"2025-08-09T11:42:42Z","timestamp":1754739762000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00624-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006233","9783032006240"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00624-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}