{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:37Z","timestamp":1763468197191},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319085050"},{"type":"electronic","value":"9783319085067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08506-7_8","type":"book-chapter","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T21:39:22Z","timestamp":1403213962000},"page":"143-163","source":"Crossref","is-referenced-by-count":59,"title":["I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis"],"prefix":"10.1007","author":[{"given":"Brad","family":"Miller","sequence":"first","affiliation":[]},{"given":"Ling","family":"Huang","sequence":"additional","affiliation":[]},{"given":"A. D.","family":"Joseph","sequence":"additional","affiliation":[]},{"given":"J. D.","family":"Tygar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-36467-6_13","volume-title":"Privacy Enhancing Technologies","author":"A. Hintz","year":"2003","unstructured":"Hintz, A.: Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 171\u2013178. Springer, Heidelberg (2003)"},{"key":"8_CR2","unstructured":"Sun, Q., Simon, D.R., Wang, Y.-M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical Identification of Encrypted Web Browsing Traffic. In: Proc. IEEE S&P (2002)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naive-Bayes Classifier. In: Proc. of ACM CCSW (2009)","DOI":"10.1145\/1655008.1655013"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching From a Distance: Website Fingerprinting Attacks and Defenses. In: Proc. of ACM CCS (2012)","DOI":"10.1145\/2382196.2382260"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In: IEEE S&P (2012)","DOI":"10.1109\/SP.2012.28"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the Source of Encrypted HTTP Connections. In: Proc. ACM CCS (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11767831_1","volume-title":"Privacy Enhancing Technologies","author":"G.D. Bissias","year":"2006","unstructured":"Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy Vulnerabilities in Encrypted HTTP Streams. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 1\u201311. Springer, Heidelberg (2006)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website Fingerprinting in Onion Routing Based Anonymization Networks. In: Proc. ACM WPES (2011)","DOI":"10.1145\/2046556.2046570"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Wang, T., Goldberg, I.: Improved Website Fingerprinting on Tor. In: Proc. of ACM WPES 2013 (2013)","DOI":"10.1145\/2517840.2517851"},{"key":"8_CR10","unstructured":"Cheng, H., Avnur, R.: Traffic Analysis of SSL Encrypted Web Browsing (1998), \n                  \n                    http:\/\/www.cs.berkeley.edu\/~daw\/teaching\/cs261-f98\/projects\/final-reports\/ronathan-heyning.ps"},{"key":"8_CR11","unstructured":"Danezis, G.: Traffic Analysis of the HTTP Protocol over TLS, \n                  \n                    http:\/\/research.microsoft.com\/en-us\/um\/people\/gdane\/papers\/TLSanon.pdf"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Chen, S., Wang, R., Wang, X., Zhang, K.: Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. In: Proc. IEEE S&P (2010)","DOI":"10.1109\/SP.2010.20"},{"key":"8_CR13","unstructured":"Coull, S.E., Collins, M.P., Wright, C.V., Monrose, F., Reiter, M.K.: On Web Browsing Privacy in Anonymized NetFlows. In: Proc. USENIX Security (2007)"},{"key":"8_CR14","unstructured":"Luo, X., Zhou, P., Chan, E.W.W., Lee, W., Chang, R.K.C., Perdisci, R.: HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. In: Proc. of NDSS (2011)"},{"key":"8_CR15","unstructured":"Wright, C.V., Coull, S.E., Monrose, F.: Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. In: NDSS (2009)"},{"key":"8_CR16","unstructured":"To infinity and beyond? No! \n                  \n                    http:\/\/googlewebmastercentral.blogspot.com\/2008\/08\/to-infinity-and-beyond-no.html"},{"key":"8_CR17","unstructured":"Miller, B., Huang, L., Joseph, A.D., Tygar, J.D.: I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis (2014), \n                  \n                    http:\/\/arxiv.org\/abs\/1403.0297"},{"key":"8_CR18","unstructured":"Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J.: LIBLINEAR: A Library for Large Linear Classification. JMLR\u00a0(9), 1871\u20131874 (2008)"},{"key":"8_CR19","unstructured":"Torbutton FAQ, \n                  \n                    https:\/\/www.torproject.org\/torbutton\/torbutton-options.html.en\n                  \n                  \n                 (accessed May 2012)"},{"key":"8_CR20","unstructured":"Scikit-learn, \n                  \n                    http:\/\/scikit-learn.org\/stable\/"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM: A Library for Support Vector Machines. ACM Transactions on TIST\u00a02(3) (2011)","DOI":"10.1145\/1961189.1961199"},{"key":"8_CR22","unstructured":"Sofia-ml, \n                  \n                    http:\/\/code.google.com\/p\/sofia-ml\/"},{"key":"8_CR23","unstructured":"Numpy, \n                  \n                    http:\/\/www.numpy.org\/"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08506-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T23:31:09Z","timestamp":1558913469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08506-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319085050","9783319085067"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08506-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}