{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:04:41Z","timestamp":1775815481343,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660368","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"263-274","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":239,"title":["A Critical Evaluation of Website Fingerprinting Attacks"],"prefix":"10.1145","author":[{"given":"Marc","family":"Juarez","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Sadia","family":"Afroz","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, USA"}]},{"given":"Gunes","family":"Acar","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Rachel","family":"Greenstadt","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Alexa Top 500 Global Site.http:\/\/www.alexa.com\/topsites","year":"2014","unstructured":"Alexa. Alexa Top 500 Global Site.http:\/\/www.alexa.com\/topsites , 2014 . Alexa. Alexa Top 500 Global Site.http:\/\/www.alexa.com\/topsites, 2014."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_4_1","volume-title":"Traffic Analysis of SSL Encrypted Web Browsing. Project paper","author":"Cheng H.","year":"1998","unstructured":"H. Cheng and R. Avnur . Traffic Analysis of SSL Encrypted Web Browsing. Project paper , University of Berkeley , 1998 . Available at http:\/\/www.cs.berkeley.edu\/~daw\/teaching\/cs261-f98\/projects\/final-reports\/ronathan-heyning.ps. H. Cheng and R. Avnur. Traffic Analysis of SSL Encrypted Web Browsing. Project paper, University of Berkeley, 1998. Available at http:\/\/www.cs.berkeley.edu\/~daw\/teaching\/cs261-f98\/projects\/final-reports\/ronathan-heyning.ps."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1970.1054406"},{"key":"e_1_3_2_1_6_1","first-page":"339","volume-title":"USENIX SecuritySymposium","author":"Coull S. E.","year":"2007","unstructured":"S. E. Coull , M. P. Collins , C. V. Wright , F. Monrose , M. K. Reiter , On Web Browsing Privacy in Anonymized NetFlows . In USENIX SecuritySymposium , pages 339 -- 352 . USENIX Association , 2007 . S. E. Coull, M. P. Collins, C. V. Wright, F. Monrose, M. K. Reiter, et al. On Web Browsing Privacy in Anonymized NetFlows. In USENIX SecuritySymposium, pages 339--352. USENIX Association, 2007."},{"key":"e_1_3_2_1_7_1","volume-title":"Traffic Analysis of the HTTP Protocol over TLS. Unpublished draft","author":"Danezis G.","year":"2009","unstructured":"G. Danezis . Traffic Analysis of the HTTP Protocol over TLS. Unpublished draft , 2009 . Available at: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download? doi=10.1.1.92.3893&rep=rep1&type=pdf. G. Danezis. Traffic Analysis of the HTTP Protocol over TLS. Unpublished draft, 2009. Available at: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download? doi=10.1.1.92.3893&rep=rep1&type=pdf."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731526"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/3-540-36467-6_13","volume-title":"Privacy Enhancing Technologies (PETs)","author":"Hintz A.","year":"2003","unstructured":"A. Hintz . Fingerprinting Websites Using Traffic Analysis . In Privacy Enhancing Technologies (PETs) , pages 171 -- 178 . Springer , 2003 . A. Hintz. Fingerprinting Websites Using Traffic Analysis. In Privacy Enhancing Technologies (PETs), pages 171--178. Springer, 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_15_1","volume-title":"IFIP WG 11.9 International Conference on Digital Forensics","author":"Juola P.","year":"2013","unstructured":"P. Juola , J. I. Noecker Jr , A. Stolerman , M. V. Ryan , P. Brennan , and R. Greenstadt . A Dataset for Active Linguistic Authentication . In IFIP WG 11.9 International Conference on Digital Forensics . Springer , 2013 . P. Juola, J. I. Noecker Jr, A. Stolerman, M. V. Ryan, P. Brennan, and R. Greenstadt. A Dataset for Active Linguistic Authentication. In IFIP WG 11.9 International Conference on Digital Forensics. Springer, 2013."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_1_17_1","unstructured":"LibSVM. Multi-class classification (and probability output) via error-correcting codes. url--http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvmtools\/#multi_class_classification_and_probability_output_via_error_correcting_codes.-- 2014.  LibSVM. Multi-class classification (and probability output) via error-correcting codes. url--http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvmtools\/#multi_class_classification_and_probability_output_via_error_correcting_codes.-- 2014."},{"key":"e_1_3_2_1_18_1","first-page":"199","volume-title":"Website Fingerprinting and Identification Using Ordered Feature Sequences. In European Symposium on Research in Computer Security (ESORICS)","author":"Lu L.","year":"2010","unstructured":"L. Lu , E. Chang , and M. Chan . Website Fingerprinting and Identification Using Ordered Feature Sequences. In European Symposium on Research in Computer Security (ESORICS) , pages 199 -- 214 . Springer , 2010 . L. Lu, E. Chang, and M. Chan. Website Fingerprinting and Identification Using Ordered Feature Sequences. In European Symposium on Research in Computer Security (ESORICS), pages 199--214. Springer, 2010."},{"key":"e_1_3_2_1_19_1","volume-title":"HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. In Network & Distributed System Security Symposium (NDSS)","author":"Luo X.","year":"2011","unstructured":"X. Luo , P. Zhou , E. Chan , and W. Lee . HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. In Network & Distributed System Security Symposium (NDSS) , 2011 . X. Luo, P. Zhou, E. Chan, and W. Lee. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. In Network & Distributed System Security Symposium (NDSS), 2011."},{"key":"e_1_3_2_1_20_1","volume-title":"Quantifying Traffic Analysis of Encrypted Web-Browsing. Project paper","author":"Mistry S.","year":"1998","unstructured":"S. Mistry and B. Raman . Quantifying Traffic Analysis of Encrypted Web-Browsing. Project paper , University of Berkeley , 1998 . Available at http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.10.5823\\&rep=rep1\\&type=pdf. S. Mistry and B. Raman. Quantifying Traffic Analysis of Encrypted Web-Browsing. Project paper, University of Berkeley, 1998. Available at http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.10.5823\\&rep=rep1\\&type=pdf."},{"key":"e_1_3_2_1_21_1","volume-title":"Test Pilot: Tab Open\/Close Study: Results. https:\/\/testpilot.mozillalabs.com\/testcases\/tab-open-close\/results.html#minmax. (accessed","author":"Labs Mozilla","year":"2013","unstructured":"Mozilla Labs . Test Pilot: Tab Open\/Close Study: Results. https:\/\/testpilot.mozillalabs.com\/testcases\/tab-open-close\/results.html#minmax. (accessed : March 17, 2013 ). Mozilla Labs. Test Pilot: Tab Open\/Close Study: Results. https:\/\/testpilot.mozillalabs.com\/testcases\/tab-open-close\/results.html#minmax. (accessed: March 17, 2013)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_24_1","volume-title":"Experimental Defense for Website Traffic Fingerprinting. Tor project Blog. https:\/\/blog.torproject.org\/blog\/experimental-defense-website-traffic-fingerprinting","author":"Perry M.","year":"2011","unstructured":"M. Perry . Experimental Defense for Website Traffic Fingerprinting. Tor project Blog. https:\/\/blog.torproject.org\/blog\/experimental-defense-website-traffic-fingerprinting , 2011 . (accessed: October 10, 2013). M. Perry. Experimental Defense for Website Traffic Fingerprinting. Tor project Blog. https:\/\/blog.torproject.org\/blog\/experimental-defense-website-traffic-fingerprinting, 2011. (accessed: October 10, 2013)."},{"key":"e_1_3_2_1_25_1","volume-title":"A Critique of Website Traffic Fingerprinting Attacks. Tor project Blog. https:\/\/blog.torproject.org\/blog\/critique-website-traffic-fingerprinting-attacks","author":"Perry M.","year":"2013","unstructured":"M. Perry . A Critique of Website Traffic Fingerprinting Attacks. Tor project Blog. https:\/\/blog.torproject.org\/blog\/critique-website-traffic-fingerprinting-attacks , 2013 . (accessed: December 15, 2013). M. Perry. A Critique of Website Traffic Fingerprinting Attacks. Tor project Blog. https:\/\/blog.torproject.org\/blog\/critique-website-traffic-fingerprinting-attacks, 2013. (accessed: December 15, 2013)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11145-7_33"},{"key":"e_1_3_2_1_27_1","volume-title":"Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution","author":"Stolerman A.","year":"2014","unstructured":"A. Stolerman , R. Overdorf , S. Afroz , and R. Greenstadt . Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution . In IFIP Working Group 11.9 on Digital Forensics. IFIP, 2014 . A. Stolerman, R. Overdorf, S. Afroz, and R. Greenstadt. Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution. In IFIP Working Group 11.9 on Digital Forensics. IFIP, 2014."},{"key":"e_1_3_2_1_28_1","first-page":"19","volume-title":"Statistical Identification of Encrypted Web Browsing Traffic. In IEEE Symposium on Security and Privacy (S&P)","author":"Sun Q.","year":"2002","unstructured":"Q. Sun , D. R. Simon , and Y. M. Wang . Statistical Identification of Encrypted Web Browsing Traffic. In IEEE Symposium on Security and Privacy (S&P) , pages 19 -- 30 . IEEE, 2002 . Q. Sun, D. R. Simon, and Y. M. Wang. Statistical Identification of Encrypted Web Browsing Traffic. In IEEE Symposium on Security and Privacy (S&P), pages 19--30. IEEE, 2002."},{"key":"e_1_3_2_1_29_1","volume-title":"Users statistics. https:\/\/metrics.torproject.org\/users.html. (accessed","author":"Tor","year":"2013","unstructured":"Tor project. Users statistics. https:\/\/metrics.torproject.org\/users.html. (accessed : March 20, 2013 ). Tor project. Users statistics. https:\/\/metrics.torproject.org\/users.html. (accessed: March 20, 2013)."},{"key":"e_1_3_2_1_30_1","volume-title":"Welcome to Stem! Stem 1.1.1 Documentation. https:\/\/stem.torproject.org","author":"Tor","year":"2014","unstructured":"Tor project. Welcome to Stem! Stem 1.1.1 Documentation. https:\/\/stem.torproject.org , 2014 . Tor project. Welcome to Stem! Stem 1.1.1 Documentation. https:\/\/stem.torproject.org, 2014."},{"key":"e_1_3_2_1_31_1","volume-title":"DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of Online Users. CoRR, abs\/1307.1542","author":"von der Weth C.","year":"2013","unstructured":"C. von der Weth and M. Hauswirth . DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of Online Users. CoRR, abs\/1307.1542 , 2013 . C. von der Weth and M. Hauswirth. DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of Online Users. CoRR, abs\/1307.1542, 2013."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_1_33_1","volume-title":"Comparing Website Fingerprinting Attacks and Defenses","author":"Wang T.","year":"2014","unstructured":"T. Wang and I. Goldberg . Comparing Website Fingerprinting Attacks and Defenses . 2014 . Technical report. T. Wang and I. Goldberg. Comparing Website Fingerprinting Attacks and Defenses. 2014. Technical report."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA","acronym":"CCS'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660368","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:40Z","timestamp":1750227220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660368"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":33,"alternative-id":["10.1145\/2660267.2660368","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660368","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}