{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:31:00Z","timestamp":1766136660585},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319256443"},{"type":"electronic","value":"9783319256450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25645-0_4","type":"book-chapter","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T12:24:45Z","timestamp":1448281485000},"page":"46-59","source":"Crossref","is-referenced-by-count":9,"title":["No Place to Hide that Bytes Won\u2019t Reveal: Sniffing Location-Based Encrypted Traffic to Track a User\u2019s Position"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Ateniese","sequence":"first","affiliation":[]},{"given":"Briland","family":"Hitaj","sequence":"additional","affiliation":[]},{"given":"Luigi Vincenzo","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"Nino Vincenzo","family":"Verde","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Villani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"4_CR1","unstructured":"Man in the middle proxy. \n                      https:\/\/mitmproxy.org\/"},{"key":"4_CR2","unstructured":"Protocol buffers - google\u2019s data interchange format (2008). \n                      https:\/\/github.com\/google\/protobuf"},{"key":"4_CR3","unstructured":"Meet the machines that steal your phone\u2019s data \u2014 ars technica (2013). \n                      http:\/\/tinyurl.com\/o9vd4u9"},{"key":"4_CR4","unstructured":"Schneier on security: How the nsa attacks tor\/firefox users with quantum and foxacid (2013). \n                      http:\/\/tinyurl.com\/n84axpz"},{"key":"4_CR5","unstructured":"For sale: Systems that can secretly track where cellphone users go around the globe - the washington post (2014). \n                      http:\/\/tinyurl.com\/kuazdjs"},{"key":"4_CR6","unstructured":"Your location has been shared 5398 times (2015). \n                      http:\/\/tinyurl.com\/nuh6w4e"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proc. of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 901\u2013914. ACM, New York (2013)","DOI":"10.1145\/2508859.2516735"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/TDSC.2009.25","volume":"8","author":"CA Ardagna","year":"2011","unstructured":"Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: An obfuscation-based approach for protecting location privacy. IEEE Transactions on Dependable and Secure Computing 8(1), 13\u201327 (2011)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Berthold, O., Federrath, H., K\u00f6hntopp, M.: Project anonymity and unobservability in the internet. In: Proc. of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000, pp. 57\u201365. ACM, New York (2000)","DOI":"10.1145\/332186.332211"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Chow, C.-Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proc. of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, GIS 2006, pp. 171\u2013178. ACM, New York (2006)","DOI":"10.1145\/1183471.1183500"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Conti, M., Mancini, L.V., Spolaor, R., Verde, N.V.: Can\u2019t you hear me knocking: Identification of user actions on android apps via traffic analysis. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, pp. 297\u2013304. ACM, New York (2015)","DOI":"10.1145\/2699026.2699119"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In: Proc. of the 2012 IEEE Symposium on Security and Privacy, SP 2012, pp. 332\u2013346. IEEE Computer Society, Washington (2012)","DOI":"10.1109\/SP.2012.28"},{"key":"4_CR13","unstructured":"Google.com. Add or remove now cards (2015). \n                      http:\/\/tinyurl.com\/ppy4svc"},{"key":"4_CR14","unstructured":"Google.com. Google now (2015). \n                      https:\/\/www.google.com\/landing\/now"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys 2003, pp. 31\u201342. ACM, New York (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier. In: Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, pp. 31\u201342. ACM, New York (2009)","DOI":"10.1145\/1655008.1655013"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted http connections. In: Proc. of the 13th ACM Conference on Computer and Communications Security. ACM, New York (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"4_CR18","unstructured":"Luo, X., Zhou, P., Chan, E.W.W., Lee, W., Chang, R.K.C., Perdisci, R.: Httpos: Sealing information leaks with browser-side obfuscation of encrypted flows. In: Proc. Network and Distributed Systems Symposium (NDSS). The Internet Society (2011)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proc. of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011, pp. 103\u2013114. ACM, New York (2011)","DOI":"10.1145\/2046556.2046570"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","volume-title":"Designing Privacy Enhancing Technologies","author":"J-F Raymond","year":"2001","unstructured":"Raymond, J.-F.: Traffic analysis: protocols, attacks, design issues, and open problems. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 10\u201329. Springer, Heidelberg (2001)"},{"issue":"2","key":"4_CR21","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1109\/TNET.2014.2309011","volume":"23","author":"D Riboni","year":"2015","unstructured":"Riboni, D., Villani, A., Vitali, D., Bettini, C., Mancini, L.V.: Obfuscation of sensitive data for incremental release of network flows. IEEE\/ACM Transactions on Networking 23(2), 672\u2013686 (2015)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"St\u00f6ber, T., Frank, M., Schmitt, J., Martinovic, I.: Who do you sync you are?: smartphone fingerprinting via application behaviour. In: Proc. of ACM WiSec (2013)","DOI":"10.1145\/2462096.2462099"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Verde, N.V., Ateniese, G., Gabrielli, E., Mancini, L.V., Spognardi, A.: No nat\u2019d user left behind: fingerprinting users behind nat from netflow records alone. In: Proc. of the 2014 IEEE 34th International Conference on Distributed Computing Systems, ICDCS 2014, pp. 218\u2013227. IEEE Computer Society, Madrid (2014)","DOI":"10.1109\/ICDCS.2014.30"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: Uncovering spoken phrases in encrypted voip conversations. In: Proc. of the 2008 IEEE Symposium on Security and Privacy, SP 2008, pp. 35\u201349. IEEE Computer Society, Washington (2008)","DOI":"10.1109\/SP.2008.21"},{"key":"4_CR25","unstructured":"Wright, C.V., Coull, S.E., Monrose, F.: Traffic morphing: an efficient defense against statistical traffic analysis. In: Proc. of the 16th Network and Distributed Security Symposium, pp. 237\u2013250. IEEE (2009)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25645-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T17:01:15Z","timestamp":1559322075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25645-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319256443","9783319256450"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25645-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}