{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:44:43Z","timestamp":1759333483441,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Commission","award":["H2020-DS-2014-653497","H2020-ICT-2014-644371"],"award-info":[{"award-number":["H2020-DS-2014-653497","H2020-ICT-2014-644371"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1253418"],"award-info":[{"award-number":["1253418"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134005","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2021-2036","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["How Unique is Your .onion?"],"prefix":"10.1145","author":[{"given":"Rebekah","family":"Overdorf","sequence":"first","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Marc","family":"Juarez","sequence":"additional","affiliation":[{"name":"imec-COSIC KU Leuven, Leuven, Belgium"}]},{"given":"Gunes","family":"Acar","sequence":"additional","affiliation":[{"name":"imec-COSIC KU Leuven, Leuven, Belgium"}]},{"given":"Rachel","family":"Greenstadt","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[{"name":"imec-COSIC KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Xiang Cai Rishab Nithyanand Tao Wang Rob Johnson and Ian Goldberg 2014. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses ACM Conference on Computer and Communications Security (CCS). ACM 227--238.","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"volume-title":"Traffic Analysis of SSL Encrypted Web Browsing. Project paper","author":"Cheng Heyning","key":"e_1_3_2_2_6_1","unstructured":"Heyning Cheng and Ron Avnur 1998. Traffic Analysis of SSL Encrypted Web Browsing. Project paper, University of Berkeley (1998). Available at http:\/\/www.cs.berkeley.edu\/ daw\/teaching\/cs261-f98\/projects\/final-reports\/ronathan-heyning.ps."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Giovanni Cherubin Jamie Hayes and Marc Juarez. 2017. \"Website Fingerprinting Defenses at the Application Layer\" Privacy Enhancing Technologies Symposium (PETS). De Gruyter 168--185. Issue 2.","DOI":"10.1515\/popets-2017-0023"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"volume-title":"I Still See You: Why Efficient Traffic Analysis Countermeasures Fail IEEE Symposium on Security and Privacy (S&P)","author":"Dyer Kevin P.","key":"e_1_3_2_2_9_1","unstructured":"Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, and Thomas Shrimpton 2012. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail IEEE Symposium on Security and Privacy (S&P). IEEE, 332--346."},{"volume-title":"k-fingerprinting: a Robust Scalable Website Fingerprinting Technique USENIX Security Symposium","author":"Hayes Jamie","key":"e_1_3_2_2_10_1","unstructured":"Jamie Hayes and George Danezis 2016. k-fingerprinting: a Robust Scalable Website Fingerprinting Technique USENIX Security Symposium. USENIX Association, 1--17."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_13"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and Rachel Greenstadt 2014. A Critical Evaluation of Website Fingerprinting Attacks ACM Conference on Computer and Communications Security (CCS). ACM 263--274.","DOI":"10.1145\/2660267.2660368"},{"volume-title":"Toward an Efficient Website Fingerprinting Defense European Symposium on Research in Computer Security (ESORICS)","author":"Juarez Marc","key":"e_1_3_2_2_15_1","unstructured":"Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright 2016. Toward an Efficient Website Fingerprinting Defense European Symposium on Research in Computer Security (ESORICS). Springer, 27--46."},{"volume-title":"Circuit fingerprinting attacks: passive deanonymization of tor hidden services USENIX Security Symposium","author":"Kwon Albert","key":"e_1_3_2_2_16_1","unstructured":"Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas 2015. Circuit fingerprinting attacks: passive deanonymization of tor hidden services USENIX Security Symposium. USENIX Association, 287--302."},{"key":"e_1_3_2_2_17_1","volume-title":"A New Map and a New Direction. \"https:\/\/mascherari","author":"Lewis Sarah Jamie","year":"2017","unstructured":"Sarah Jamie Lewis. 2017. OnionScan Report: Freedom Hosting II, A New Map and a New Direction. \"https:\/\/mascherari.press\/onionscan-report-fhii-a-new-map-and-the-future\/\". (6 March 2017). (accessed: May, 2017)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","unstructured":"Marc Liberatore and Brian Neil Levine 2006. \"Inferring the source of encrypted HTTP connections\" ACM Conference on Computer and Communications Security (CCS). ACM 255--263. 10.1145\/1180405.1180437","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_2_19_1","volume-title":"HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows Network & Distributed System Security Symposium (NDSS). IEEE Computer Society.","author":"Luo Xiapu","year":"2011","unstructured":"Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci 2011. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows Network & Distributed System Security Symposium (NDSS). IEEE Computer Society."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_2_21_1","volume-title":"Website Fingerprinting in Onion Routing Based Anonymization Networks ACM Workshop on Privacy in the Electronic Society (WPES). ACM, 103--114","author":"Panchenko Andriy","year":"2011","unstructured":"Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel 2011. Website Fingerprinting in Onion Routing Based Anonymization Networks ACM Workshop on Privacy in the Electronic Society (WPES). ACM, 103--114."},{"key":"e_1_3_2_2_22_1","volume-title":"Experimental Defense for Website Traffic Fingerprinting. Tor project Blog. \"https:\/\/blog.torproject.org\/blog\/experimental-defense-website-traffic-fingerprinting\". (2011). (accessed","author":"Perry Mike","year":"2013","unstructured":"Mike Perry. 2011. Experimental Defense for Website Traffic Fingerprinting. Tor project Blog. \"https:\/\/blog.torproject.org\/blog\/experimental-defense-website-traffic-fingerprinting\". (2011). (accessed: October 10, 2013)."},{"key":"e_1_3_2_2_23_1","volume-title":"HOnions: Towards Detection and Identification of Misbehaving Tor HSdirs Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).","author":"Sanatinia Amirali","year":"2016","unstructured":"Amirali Sanatinia and Guevara Noubir 2016. HOnions: Towards Detection and Identification of Misbehaving Tor HSdirs Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs)."},{"key":"e_1_3_2_2_24_1","volume-title":"Statistical Identification of Encrypted Web Browsing Traffic IEEE Symposium on Security and Privacy (S&P). IEEE, 19--30","author":"Sun Q","year":"2002","unstructured":"Q Sun, DR R Simon, and YM M Wang 2002. Statistical Identification of Encrypted Web Browsing Traffic IEEE Symposium on Security and Privacy (S&P). IEEE, 19--30."},{"key":"e_1_3_2_2_25_1","volume-title":"Effective Attacks and Provable Defenses for Website Fingerprinting USENIX Security Symposium. USENIX Association, 143--157","author":"Wang Tao","year":"2014","unstructured":"Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg 2014. Effective Attacks and Provable Defenses for Website Fingerprinting USENIX Security Symposium. USENIX Association, 143--157."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_2_27_1","volume-title":"On Realistically Attacking Tor with Website Fingerprinting Proceedings on Privacy Enhancing Technologies (PoPETs). De Gruyter Open, 21--36","author":"Wang Tao","year":"2016","unstructured":"Tao Wang and Ian Goldberg 2016. On Realistically Attacking Tor with Website Fingerprinting Proceedings on Privacy Enhancing Technologies (PoPETs). De Gruyter Open, 21--36."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Davis Yoshida and Jordan Boyd-Graber 2016. \"Using Confusion Graphs to Understand Classifier Error\" Proceedings of the NAACL Human-Computer Question Answering Workshop. Association for Computational Linguistics 48--52. Issue 2.","DOI":"10.18653\/v1\/W16-0108"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134005","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134005"}},"subtitle":["An Analysis of the Fingerprintability of Tor Onion Services"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":28,"alternative-id":["10.1145\/3133956.3134005","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134005","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}