{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:19Z","timestamp":1763507719661,"version":"3.41.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T00:00:00Z","timestamp":1532995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10586-018-2817-4","type":"journal-article","created":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T21:59:10Z","timestamp":1533074350000},"page":"1917-1931","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["An empirical study of web browsers\u2019 resistance to traffic analysis and website fingerprinting attacks"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9783-919X","authenticated-orcid":false,"given":"Taher","family":"Al-Shehari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2029-175X","authenticated-orcid":false,"given":"Sami","family":"Zhioua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,31]]},"reference":[{"key":"2817_CR1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464","volume-title":"Tor: the second-generation onion router","author":"R Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Naval Research Lab, Washington DC (2004)"},{"key":"2817_CR2","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"Oliver Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: a system for anonymous and unobservable Internet access. In: Designing privacy enhancing technologies, pp. 115\u2013129. Springer, New York (2001)"},{"key":"2817_CR3","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4, 193\u2013220 (1890)","journal-title":"Harvard Law Rev."},{"issue":"2","key":"2817_CR4","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/293411.293475","volume":"42","author":"R Clarke","year":"1999","unstructured":"Clarke, R.: Internet privacy concerns confirm the case for intervention. Commun. ACM 42(2), 60\u201367 (1999)","journal-title":"Commun. ACM"},{"issue":"3","key":"2817_CR5","doi-asserted-by":"publisher","first-page":"341","DOI":"10.2307\/249775","volume":"17","author":"Mary J. Culnan","year":"1993","unstructured":"Culnan, M.J.: \u201cHow Did They Get My Name?\u201d: an exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 341\u2013363 (1993)","journal-title":"MIS Quarterly"},{"key":"2817_CR6","doi-asserted-by":"crossref","unstructured":"Chung, W., Paynter, J.: Privacy issues on the Internet. In: System Sciences. HICSS. Proceedings of the 35th Annual Hawaii International Conference on 2002, p. 9\u00a0pp. IEEE (2002)","DOI":"10.1109\/HICSS.2002.994191"},{"key":"2817_CR7","doi-asserted-by":"crossref","unstructured":"Hintz, A.: Fingerprinting websites using traffic analysis. In: International Workshop on Privacy Enhancing Technologies, pp. 171\u2013178. Springer (2002)","DOI":"10.1007\/3-540-36467-6_13"},{"key":"2817_CR8","unstructured":"Tor: The Second-Generation Onion Router. http:\/\/oai.dtic.mil\/oai\/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA465464 (2017)"},{"key":"2817_CR9","doi-asserted-by":"crossref","unstructured":"Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy vulnerabilities in encrypted HTTP streams. In: International Workshop on Privacy Enhancing Technologies, pp. 1\u201311. Springer (2005)","DOI":"10.1007\/11767831_1"},{"key":"2817_CR10","doi-asserted-by":"crossref","unstructured":"Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, pp. 103\u2013114. ACM (2011)","DOI":"10.1145\/2046556.2046570"},{"issue":"1","key":"2817_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.7763\/IJCTE.2014.V6.837","volume":"6","author":"T Al-Shehari","year":"2014","unstructured":"Al-Shehari, T., Shahzad, F.: Improving Operating system fingerprinting using machine learning techniques. Int. J. Comput. Theor. Eng. 6(1), 57 (2014)","journal-title":"Int. J. Comput. Theor. Eng."},{"key":"2817_CR12","doi-asserted-by":"crossref","unstructured":"Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\u00efve-bayes classifier. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 31\u201342. ACM (2009)","DOI":"10.1145\/1655008.1655013"},{"key":"2817_CR13","doi-asserted-by":"crossref","unstructured":"Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: Website fingerprinting attacks and defenses. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp. 605\u2013616. ACM (2012)","DOI":"10.1145\/2382196.2382260"},{"key":"2817_CR14","volume-title":"Traffic analysis of anonymity systems","author":"RM Craven","year":"2010","unstructured":"Craven, R.M.: Traffic analysis of anonymity systems. Clemson University, Clemson (2010)"},{"key":"2817_CR15","unstructured":"Tor project: Anonymity Online. https:\/\/www.torproject.org . (2017)"},{"key":"2817_CR16","first-page":"1","volume-title":"Designing Privacy Enhancing Technologies","author":"Andreas Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability, and pseudonymity\u2014a proposal for terminology. In: Designing privacy enhancing technologies, pp. 1\u20139. Springer, New York (2001)"},{"issue":"2","key":"2817_CR17","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"2817_CR18","unstructured":"M\u00f6ller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster protocol\u2014version 2. Draft, July 154, 28 (2003)"},{"key":"2817_CR19","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11423409_2","volume-title":"Privacy Enhancing Technologies","author":"Nick Mathewson","year":"2005","unstructured":"Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Privacy Enhancing Technologies, pp. 17\u201334. Springer, New York (2004)"},{"key":"2817_CR20","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"Oliver Berthold","year":"2001","unstructured":"Berthold, O., Hannes, F., Stefan, K.: Web MIXes: A system for anonymous and unobservable Internet access.\u00a0In: Designing privacy enhancing technologies. Springer, Berlin, Heidelberg (2001)"},{"key":"2817_CR21","unstructured":"Zantout, B., Haraty, R.: I2P data communication system. In: Proceedings of ICN, pp. 401\u2013409 (2011)"},{"issue":"8","key":"2817_CR22","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.jlap.2013.05.001","volume":"82","author":"N Bielova","year":"2013","unstructured":"Bielova, N.: Survey on JavaScript security policies and their enforcement mechanisms in a web browser. J. Logic Algebr. Progr. 82(8), 243\u2013262 (2013)","journal-title":"J. Logic Algebr. Progr."},{"key":"2817_CR23","unstructured":"Garsiel, T., Irish, P.: How browsers work: Behind the scenes of modern web browsers. Google Project, August (2011)"},{"key":"2817_CR24","doi-asserted-by":"crossref","unstructured":"Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 255\u2013263. ACM (2006)","DOI":"10.1145\/1180405.1180437"},{"key":"2817_CR25","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-642-11145-7_33","volume-title":"Information and Communications Security","author":"Yi Shi","year":"2009","unstructured":"Shi, Y., Matsuura, K.: Fingerprinting Attack on the Tor Anonymity System. In: ICICS, pp. 425\u2013438. Springer, New York (2009)"},{"key":"2817_CR26","doi-asserted-by":"crossref","unstructured":"Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, pp. 201\u2013212. ACM (2013)","DOI":"10.1145\/2517840.2517851"},{"issue":"18","key":"2817_CR27","doi-asserted-by":"publisher","first-page":"4227","DOI":"10.1002\/sec.1338","volume":"8","author":"S Zhioua","year":"2015","unstructured":"Zhioua, S.: The web browser factor in traffic analysis attacks. Secur. Commun. Netw. 8(18), 4227\u20134241 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"2817_CR28","doi-asserted-by":"crossref","unstructured":"Fuchs, C., Boersma, K., Albrechtslund, A., Sandoval, M.: Internet and surveillance: The challenges of Web 2.0 and social media, vol. 16. Routledge, (2013)","DOI":"10.4324\/9780203806432"},{"issue":"11","key":"2817_CR29","doi-asserted-by":"publisher","first-page":"2078","DOI":"10.1002\/sec.920","volume":"7","author":"M Abu-Amara","year":"2014","unstructured":"Abu-Amara, M.: A combined solution for the Internet access denial caused by malicious Internet service providers. Secur. Commun. Netw. 7(11), 2078\u20132093 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"2817_CR30","unstructured":"Lyon, D.: Surveillance after September 11, vol. 11. Polity, (2003)"},{"issue":"11","key":"2817_CR31","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1002\/sec.907","volume":"7","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Su, S., Wang, Y., Chen, W., Yang, F.: Privacy-assured substructure similarity query over encrypted graph-structured data in cloud. Secur. Commun. Netw. 7(11), 1933\u20131944 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"2817_CR32","doi-asserted-by":"crossref","unstructured":"Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.: Users get routed: Traffic correlation on Tor by realistic adversaries. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & communications security, pp. 337\u2013348. ACM (2013)","DOI":"10.1145\/2508859.2516651"},{"issue":"1","key":"2817_CR33","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/375360.375365","volume":"33","author":"G Navarro","year":"2001","unstructured":"Navarro, G.: A guided tour to approximate string matching. ACM Comput. Surv. (CSUR) 33(1), 31\u201388 (2001)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2817_CR34","unstructured":"Gehrig, A.P.: Detection of spoofing of remote client system information. In. Google Patents, (2015)"},{"key":"2817_CR35","unstructured":"Browserscope: How Does Your Browser Compare? http:\/\/www.browserscope.org\/ . (2017)"},{"key":"2817_CR36","unstructured":"Browser testing on BrowserStack. https:\/\/www.caniuse.com\/ . (2017)"},{"key":"2817_CR37","unstructured":"Internet Explorer Dev. Center: Asynchronous script execution. http:\/\/msdn.microsoft.com\/en-us\/library\/ie\/hh673524 . (2017)"},{"key":"2817_CR38","unstructured":"Ihrig, C.: Profiling Page Loads with the Navigation Timing API. (1 September 2012). (2017)"},{"key":"2817_CR39","volume-title":"Pro Internet Explorer 8 & 9 Development: Developing Powerful Applications for the Next Generation of IE","author":"M Crowley","year":"2011","unstructured":"Crowley, M.: Pro Internet Explorer 8 & 9 Development: Developing Powerful Applications for the Next Generation of IE. Apress, New York (2011)"},{"key":"2817_CR40","doi-asserted-by":"crossref","unstructured":"Wang, W., Motani, M., Srinivasan, V.: Dependent link padding algorithms for low latency anonymity systems. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 323\u2013332. ACM (2008)","DOI":"10.1145\/1455770.1455812"},{"key":"2817_CR41","doi-asserted-by":"crossref","unstructured":"Butkiewicz, M., Madhyastha, H.V., Sekar, V.: Understanding website complexity: measurements, metrics, and implications. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pp. 313\u2013328. ACM (2011)","DOI":"10.1145\/2068816.2068846"},{"key":"2817_CR42","unstructured":"Akhawe, D., Felt, A.P.: Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In: USENIX security symposium (2013)"},{"key":"2817_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4302-4750-0","volume-title":"Pro JavaScript Performance","author":"Tom Barker","year":"2012","unstructured":"Barker, T.: What is Performance. In: Pro JavaScript Performance. pp. 1\u201312. Springer, New York (2012)"},{"key":"2817_CR44","doi-asserted-by":"crossref","unstructured":"Guha, A., Fredrikson, M., Livshits, B., Swamy, N.: Verified security for browser extensions. In: Security and Privacy (SP), IEEE Symposium on 2011, pp. 115\u2013130. IEEE (2011)","DOI":"10.1109\/SP.2011.36"},{"key":"2817_CR45","unstructured":"Holland, M.C.: Assessment of content delivery services using performance measurements from within an end user client application. In. Google Patents, (2017)"},{"key":"2817_CR46","unstructured":"Dutton, S.: \u201cMeasuring Page Load Speed with Navigation Timing - HTML5 Rocks.\u201d\u00a0HTML5 Rocks - A Resource for Open Web HTML5 Developers, Creative Commons Attribution 3.0 License (2011). https:\/\/www.html5rocks.com\/en\/tutorials\/webperformance\/basics\/"},{"key":"2817_CR47","unstructured":"Rainie, L., et al:. \u201cAnonymity, Privacy, and Security Online.\u201d\u00a0Pew Research Center: Internet, Science & Tech. (2013). https:\/\/www.pewinternet.org\/2013\/09\/05\/anonymity-privacy-and-security-online\/"},{"key":"2817_CR48","unstructured":"StatCounter Global Stats. http:\/\/gs.statcounter.com\/ . (2017)"},{"issue":"12","key":"2817_CR49","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1587\/comex.2015XBL0131","volume":"4","author":"N Okazaki","year":"2015","unstructured":"Okazaki, N., Toyoda, K., Yokoyama, E., So, H., Katayama, T., Park, M.: Countermeasure against fingerprinting attack in Tor by separated contents retrieval. IEICE Commun. Express 4(12), 370\u2013375 (2015)","journal-title":"IEICE Commun. Express"},{"issue":"5","key":"2817_CR50","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/TIFS.2016.2639446","volume":"12","author":"Q Yang","year":"2017","unstructured":"Yang, Q., Gasti, P., Zhou, G., Farajidavar, A., Balagani, K.S.: On inferring browsing activity on smartphones via USB power analysis side-channel. IEEE Trans. Inf. Forensics Secur. 12(5), 1056\u20131066 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2817_CR51","doi-asserted-by":"crossref","unstructured":"Gu, X., Yang, M., Luo, J.: A novel website fingerprinting attack against multi-tab browsing behavior. In: Computer Supported Cooperative Work in Design (CSCWD), IEEE 19th International Conference on 2015, pp. 234\u2013239. IEEE (2015)","DOI":"10.1109\/CSCWD.2015.7230964"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2817-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2817-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2817-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T04:11:49Z","timestamp":1751775109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2817-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,31]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["2817"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2817-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2018,7,31]]},"assertion":[{"value":"3 August 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}