{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T04:50:52Z","timestamp":1770267052672,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323416","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"249-260","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Lost traffic encryption"],"prefix":"10.1145","author":[{"given":"Katharina","family":"Kohls","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"David","family":"Rupprecht","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[{"name":"NYU Abu Dhabi, United Arab Emirates"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"36321","volume-title":"Evolved Universal Terrestrial Radio Access (E-UTRA)","author":"GPP.","unstructured":"3 GPP. 2009. Evolved Universal Terrestrial Radio Access (E-UTRA) ; Medium Access Control (MAC) protocol specification. TR TR36.321. 3rd Generation Partnership Project ( 3GPP). http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/ 36321 .htm 3GPP. 2009. Evolved Universal Terrestrial Radio Access (E-UTRA); Medium Access Control (MAC) protocol specification. TR TR36.321. 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/36321.htm"},{"key":"e_1_3_2_1_2_1","volume-title":"3rd Generation Partnership Project (3GPP)","author":"GPP.","unstructured":"3 GPP. 2009. Rationale and track of security decisions in Long Term Evolution (LTE) RAN \/ 3GPP System Architecture Evolution (SAE). TRTR33.821 . 3rd Generation Partnership Project (3GPP) . http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33821.htm 3GPP. 2009. Rationale and track of security decisions in Long Term Evolution (LTE) RAN \/ 3GPP System Architecture Evolution (SAE). TRTR33.821. 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33821.htm"},{"key":"e_1_3_2_1_3_1","volume-title":"Resilience of LTE Networks Against Smart Jamming Attacks: Wideband Model. In Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '15)","author":"Aziz Farhan F M.","unstructured":"Farhan F M. Aziz , Jeff S. Shamma , and Gordon L. St\u00fcber . 2015 . Resilience of LTE Networks Against Smart Jamming Attacks: Wideband Model. In Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '15) . IEEE, Hong Kong, China, 1344--1348. Farhan F M. Aziz, Jeff S. Shamma, and Gordon L. St\u00fcber. 2015. Resilience of LTE Networks Against Smart Jamming Attacks: Wideband Model. In Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '15). IEEE, Hong Kong, China, 1344--1348."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_3_2_1_5_1","volume-title":"IMDEA's Online Watcher for LTE (OWL) control channel. https:\/\/git.networks.imdea.org\/nicola_bui\/imdeaowl. (2017). {Online","author":"Bui Nicola","year":"2018","unstructured":"Nicola Bui . 2017. IMDEA's Online Watcher for LTE (OWL) control channel. https:\/\/git.networks.imdea.org\/nicola_bui\/imdeaowl. (2017). {Online ; accessed 15- Nov- 2018 }. Nicola Bui. 2017. IMDEA's Online Watcher for LTE (OWL) control channel. https:\/\/git.networks.imdea.org\/nicola_bui\/imdeaowl. (2017). {Online; accessed 15-Nov-2018}."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980055.2980057"},{"key":"e_1_3_2_1_7_1","unstructured":"Heyning Cheng and Ron Avnur. 1998. Traffic Analysis of SSL Encrypted Web Browsing. (1998).  Heyning Cheng and Ron Avnur. 1998. Traffic Analysis of SSL Encrypted Web Browsing. (1998)."},{"key":"e_1_3_2_1_8_1","volume-title":"d.}. LimeSDR Mini. https:\/\/www.crowdsupply.com\/lime-micro\/limesdr-mini. ({n. d.}). {Online","author":"Supply Crowd","year":"2018","unstructured":"Crowd Supply . {n. d.}. LimeSDR Mini. https:\/\/www.crowdsupply.com\/lime-micro\/limesdr-mini. ({n. d.}). {Online ; accessed 15- Nov- 2018 }. Crowd Supply. {n. d.}. LimeSDR Mini. https:\/\/www.crowdsupply.com\/lime-micro\/limesdr-mini. ({n. d.}). {Online; accessed 15-Nov-2018}."},{"key":"e_1_3_2_1_9_1","volume-title":"Statistical Disclosure Attacks: Traffic Confirmation in Open Environments. In Security and Privacy in the Age of Uncertainty: IFIP TC11 International Conference on Information Security (SEC '03)","author":"Danezis George","year":"2003","unstructured":"George Danezis . 2003 . Statistical Disclosure Attacks: Traffic Confirmation in Open Environments. In Security and Privacy in the Age of Uncertainty: IFIP TC11 International Conference on Information Security (SEC '03) . Kluwer, Athens, Greece, 421--426. George Danezis. 2003. Statistical Disclosure Attacks: Traffic Confirmation in Open Environments. In Security and Privacy in the Age of Uncertainty: IFIP TC11 International Conference on Information Security (SEC '03). Kluwer, Athens, Greece, 421--426."},{"key":"e_1_3_2_1_10_1","volume-title":"Two-Sided Statistical Disclosure Attack. In International Workshop on Privacy Enhancing Technologies (PET '07)","author":"Danezis George","year":"2007","unstructured":"George Danezis , Claudia Diaz , and Carmela Troncoso . 2007 . Two-Sided Statistical Disclosure Attack. In International Workshop on Privacy Enhancing Technologies (PET '07) . Springer, Ottawa, ON, Canada, 30--44. George Danezis, Claudia Diaz, and Carmela Troncoso. 2007. Two-Sided Statistical Disclosure Attack. In International Workshop on Privacy Enhancing Technologies (PET '07). Springer, Ottawa, ON, Canada, 30--44."},{"key":"e_1_3_2_1_11_1","volume-title":"SCAT: Signaling Collection and Analysis Tool. https:\/\/github.com\/fgsect\/scat.","year":"2018","unstructured":"fgsect. 2018 . SCAT: Signaling Collection and Analysis Tool. https:\/\/github.com\/fgsect\/scat. (2018). {Online; accessed 15-Nov-2018}. fgsect. 2018. SCAT: Signaling Collection and Analysis Tool. https:\/\/github.com\/fgsect\/scat. (2018). {Online; accessed 15-Nov-2018}."},{"key":"e_1_3_2_1_13_1","volume-title":"d.}. Orbot: Tor for Android. https:\/\/guardianproject.info\/apps\/orbot\/. ({n. d.}). {Online","author":"Project Guardian","year":"2018","unstructured":"Guardian Project . {n. d.}. Orbot: Tor for Android. https:\/\/guardianproject.info\/apps\/orbot\/. ({n. d.}). {Online ; accessed 15- Nov- 2018 }. Guardian Project. {n. d.}. Orbot: Tor for Android. https:\/\/guardianproject.info\/apps\/orbot\/. ({n. d.}). {Online; accessed 15-Nov-2018}."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_15_1","volume-title":"Fingerprinting Websites Using Traffic Analysis. In International Workshop on Privacy Enhancing Technologies (PET '02)","author":"Hintz Andrew","year":"2002","unstructured":"Andrew Hintz . 2002 . Fingerprinting Websites Using Traffic Analysis. In International Workshop on Privacy Enhancing Technologies (PET '02) . Springer, San Francisco, CA, USA, 171--178. Andrew Hintz. 2002. Fingerprinting Websites Using Traffic Analysis. In International Workshop on Privacy Enhancing Technologies (PET '02). Springer, San Francisco, CA, USA, 171--178."},{"key":"e_1_3_2_1_16_1","volume-title":"GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. In Network and Distributed System Security Symposium (NDSS '18)","author":"Hong Byeongdo","year":"2018","unstructured":"Byeongdo Hong , Sangwook Bae , and Yongdae Kim . 2018 . GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. In Network and Distributed System Security Symposium (NDSS '18) . Internet Society, San Diego, CA, USA. Byeongdo Hong, Sangwook Bae, and Yongdae Kim. 2018. GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. In Network and Distributed System Security Symposium (NDSS '18). Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_1_17_1","volume-title":"Network and Distributed System Security Symposium (NDSS '11)","author":"Houmansadr Amir","year":"2011","unstructured":"Amir Houmansadr and Nikita Borisov . 2011 . SWIRL: A Scalable Watermark to Detect Correlated Network Flows . In Network and Distributed System Security Symposium (NDSS '11) . Internet Society, San Diego, CA, USA. Amir Houmansadr and Nikita Borisov. 2011. SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In Network and Distributed System Security Symposium (NDSS '11). Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_11"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Syed Rafiul Hussain Mitziu Echeverria Omar Chowdhury Ninghui Li and Elisa Bertino. 2019. Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. (2019).  Syed Rafiul Hussain Mitziu Echeverria Omar Chowdhury Ninghui Li and Elisa Bertino. 2019. Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. (2019).","DOI":"10.14722\/ndss.2019.23442"},{"key":"e_1_3_2_1_21_1","volume-title":"Network and Distributed System Security Symposium (NDSS '17)","author":"Jansen Rob","year":"2017","unstructured":"Rob Jansen , Marc Juarez , Rafael Galvez , Tariq Elahi , and Claudia Diaz . 2017 . Inside Job: Applying Traffic Analysis to Measure Tor from Within . In Network and Distributed System Security Symposium (NDSS '17) . Internet Society, San Diego, CA, USA. Rob Jansen, Marc Juarez, Rafael Galvez, Tariq Elahi, and Claudia Diaz. 2017. Inside Job: Applying Traffic Analysis to Measure Tor from Within. In Network and Distributed System Security Symposium (NDSS '17). Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_1_22_1","volume-title":"Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions. In International Symposium on Wireless Personal Multimedia Communications (WPMC '13)","author":"Jover Roger Piqueras","year":"2013","unstructured":"Roger Piqueras Jover . 2013 . Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions. In International Symposium on Wireless Personal Multimedia Communications (WPMC '13) . IEEE, Atlantic City, NJ, USA. Roger Piqueras Jover. 2013. Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions. In International Symposium on Wireless Personal Multimedia Communications (WPMC '13). IEEE, Atlantic City, NJ, USA."},{"key":"e_1_3_2_1_23_1","unstructured":"Roger Piqueras Jover. 2016. LTE Security and Protocol Exploits. http:\/\/rogerpiquerasjover.net\/ShmooCon_talk_final_01162016.pdf. (Jan. 2016).  Roger Piqueras Jover. 2016. LTE Security and Protocol Exploits. http:\/\/rogerpiquerasjover.net\/ShmooCon_talk_final_01162016.pdf. (Jan. 2016)."},{"key":"e_1_3_2_1_24_1","volume-title":"Protocol Exploits and Location Tracking Experimentation with Low-Cost Software Radio. arXiv (1607.05171)","author":"Jover Roger Piqueras","year":"2016","unstructured":"Roger Piqueras Jover . 2016. LTE Security , Protocol Exploits and Location Tracking Experimentation with Low-Cost Software Radio. arXiv (1607.05171) ( 2016 ). arXiv:1607.05171 http:\/\/arxiv.org\/abs\/1607.05171 Roger Piqueras Jover. 2016. LTE Security, Protocol Exploits and Location Tracking Experimentation with Low-Cost Software Radio. arXiv (1607.05171) (2016). arXiv:1607.05171 http:\/\/arxiv.org\/abs\/1607.05171"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_26_1","volume-title":"Network and Distributed System Security Symposium (NDSS '12)","author":"Kune Denis Foo","year":"2012","unstructured":"Denis Foo Kune , John Koelndorfer , Nicholas Hopper , and Yongdae Kim . 2012 . Location leaks on the GSM air interface . In Network and Distributed System Security Symposium (NDSS '12) . Internet Society, San Diego, CA, USA. Denis Foo Kune, John Koelndorfer, Nicholas Hopper, and Yongdae Kim. 2012. Location leaks on the GSM air interface. In Network and Distributed System Security Symposium (NDSS '12). Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_1_27_1","volume-title":"Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. In USENIX Security Symposium (USENIX '15)","author":"Kwon Albert","year":"2015","unstructured":"Albert Kwon , Mashael AlSabah , David Lazar , Marc Dacier , and Srinivas Devadas . 2015 . Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. In USENIX Security Symposium (USENIX '15) . USENIX Association, Washington, D.C., USA, 287--302. Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas. 2015. Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. In USENIX Security Symposium (USENIX '15). USENIX Association, Washington, D.C., USA, 287--302."},{"key":"e_1_3_2_1_28_1","volume-title":"Timing Attacks in Low-Latency Mix Systems. In International Conference on Financial Cryptography (FC '04)","author":"Levine Brian N.","year":"2004","unstructured":"Brian N. Levine , Michael K. Reiter , Chenxi Wang , and Matthew Wright . 2004 . Timing Attacks in Low-Latency Mix Systems. In International Conference on Financial Cryptography (FC '04) . Springer, Key West, FL, USA, 251--265. Brian N. Levine, Michael K. Reiter, Chenxi Wang, and Matthew Wright. 2004. Timing Attacks in Low-Latency Mix Systems. In International Conference on Financial Cryptography (FC '04). Springer, Key West, FL, USA, 251--265."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452266"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736871"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653732"},{"key":"e_1_3_2_1_33_1","volume-title":"Olimid","author":"Mj\u00f8lsnes Stig F.","year":"2017","unstructured":"Stig F. Mj\u00f8lsnes and Ruxandra F . Olimid . 2017 . Easy 4G\/LTE IMSI Catchers for Non-Programmers. In Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS '17). Springer , Warsaw, Poland, 235--246. Stig F. Mj\u00f8lsnes and Ruxandra F. Olimid. 2017. Easy 4G\/LTE IMSI Catchers for Non-Programmers. In Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS '17). Springer, Warsaw, Poland, 235--246."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_35_1","volume-title":"International Workshop on Privacy Enhancing Technologies (PET '07)","author":"Steven","unstructured":"Steven J. Murdoch and Piotr Zielinski. 2007. Sampled Traffic Analysis by Internet Exchange-Level Adversaries . In International Workshop on Privacy Enhancing Technologies (PET '07) . Springer, Ottawa, ON, Canada, 167--183. Steven J. Murdoch and Piotr Zielinski. 2007. Sampled Traffic Analysis by Internet Exchange-Level Adversaries. In International Workshop on Privacy Enhancing Technologies (PET '07). Springer, Ottawa, ON, Canada, 167--183."},{"key":"e_1_3_2_1_36_1","volume-title":"Network and Distributed System Security Symposium (NDSS '16)","author":"Panchenko Andriy","year":"2018","unstructured":"Andriy Panchenko , Fabian Lanze , Andreas Zinnen , Martin Henze , Jan Pennekamp , Klaus Wehrle , and Thomas Engel . 2018 . Website Fingerprinting at Internet Scale . In Network and Distributed System Security Symposium (NDSS '16) . Internet Society, San Diego, CA, USA. Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle, and Thomas Engel. 2018. Website Fingerprinting at Internet Scale. In Network and Distributed System Security Symposium (NDSS '16). Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_1_38_1","volume-title":"Breaking LTE on Layer Two. In IEEE Symposium on Security and Privacy (SP '19)","author":"Rupprecht David","year":"2019","unstructured":"David Rupprecht , Katharina Kohls , Thorsten Holz , and Christina P\u00f6pper . 2019 . Breaking LTE on Layer Two. In IEEE Symposium on Security and Privacy (SP '19) . IEEE, San Francisco, CA, USA. David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper. 2019. Breaking LTE on Layer Two. In IEEE Symposium on Security and Privacy (SP '19). IEEE, San Francisco, CA, USA."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"e_1_3_2_1_41_1","volume-title":"Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. In European Symposium on Research in Computer Security (ESORICS '06)","author":"Shmatikov Vitaly","year":"2006","unstructured":"Vitaly Shmatikov and Ming-Hsiu Wang . 2006 . Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. In European Symposium on Research in Computer Security (ESORICS '06) . Springer, Hamburg, Germany, 18--33. Vitaly Shmatikov and Ming-Hsiu Wang. 2006. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. In European Symposium on Research in Computer Security (ESORICS '06). Springer, Hamburg, Germany, 18--33."},{"key":"e_1_3_2_1_42_1","unstructured":"Software Radio Systems. {n. d.}. AirScope. http:\/\/www.softwareradiosystems.com\/products\/. ({n. d.}). {Online; accessed 15-Nov-2018}.  Software Radio Systems. {n. d.}. AirScope. http:\/\/www.softwareradiosystems.com\/products\/. ({n. d.}). {Online; accessed 15-Nov-2018}."},{"key":"e_1_3_2_1_43_1","volume-title":"Open source SDR LTE software suite. https:\/\/github.com\/srsLTE\/srsLTE. (2018). {Online","author":"LTE.","year":"2018","unstructured":"srs LTE. 2018. Open source SDR LTE software suite. https:\/\/github.com\/srsLTE\/srsLTE. (2018). {Online ; accessed 15- Nov- 2018 }. srsLTE. 2018. Open source SDR LTE software suite. https:\/\/github.com\/srsLTE\/srsLTE. (2018). {Online; accessed 15-Nov-2018}."},{"key":"e_1_3_2_1_44_1","volume-title":"Statistical Identification of Encrypted Web Browsing Traffic. In IEEE Symposium on Security and Privacy (SP '02)","author":"Sun Qixiang","year":"2002","unstructured":"Qixiang Sun , Daniel R. Simon , Yi-Min Wang , Wilf Russell , Venkata N. Padmanabhan , and Lili Qiu . 2002 . Statistical Identification of Encrypted Web Browsing Traffic. In IEEE Symposium on Security and Privacy (SP '02) . IEEE, Berkeley, CA, USA, 19--30. Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, and Lili Qiu. 2002. Statistical Identification of Encrypted Web Browsing Traffic. In IEEE Symposium on Security and Privacy (SP '02). IEEE, Berkeley, CA, USA, 19--30."},{"key":"e_1_3_2_1_45_1","first-page":"10","article-title":"Cell Coverage Evaluation for LTE and WiMAX in Wireless Communication System","volume":"22","author":"Talukder Z.H.","year":"2013","unstructured":"Z.H. Talukder , S.S. Islam , D. Mahjabeen , A. Ahmed , S. Rafique , and M.A. Rashid . 2013 . Cell Coverage Evaluation for LTE and WiMAX in Wireless Communication System . World Applied Sciences Journal 22 , 10 (Jan. 2013), 1486--1491. Z.H. Talukder, S.S. Islam, D. Mahjabeen, A. Ahmed, S. Rafique, and M.A. Rashid. 2013. Cell Coverage Evaluation for LTE and WiMAX in Wireless Communication System. World Applied Sciences Journal 22, 10 (Jan. 2013), 1486--1491.","journal-title":"World Applied Sciences Journal"},{"key":"e_1_3_2_1_46_1","volume-title":"d.}. The Onion Router. https:\/\/www.torproject.org. ({n. d.}). {Online","author":"Project The Tor","year":"2018","unstructured":"The Tor Project . {n. d.}. The Onion Router. https:\/\/www.torproject.org. ({n. d.}). {Online ; accessed 15- Nov- 2018 }. The Tor Project. {n. d.}. The Onion Router. https:\/\/www.torproject.org. ({n. d.}). {Online; accessed 15-Nov-2018}."},{"key":"e_1_3_2_1_47_1","volume-title":"USENIX Security Symposium (USENIX '14)","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , Rob Johnson , and Ian Goldberg . 2014 . Effective Attacks and Provable Defenses for Website Fingerprinting .. In USENIX Security Symposium (USENIX '14) . USENIX Association, Washington, D.C., USA, 271--286. Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting.. In USENIX Security Symposium (USENIX '14). USENIX Association, Washington, D.C., USA, 271--286."},{"key":"e_1_3_2_1_48_1","volume-title":"Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In USENIX Security Symposium (USENIX '17)","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg . 2017 . Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In USENIX Security Symposium (USENIX '17) . USENIX Association, Washington, D.C., USA, 1375--1390. Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In USENIX Security Symposium (USENIX '17). USENIX Association, Washington, D.C., USA, 1375--1390."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102133"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.30"},{"key":"e_1_3_2_1_52_1","volume-title":"Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. In Network and Distributed System Security Symposium (NDSS '09)","author":"Wright Charles V.","year":"2009","unstructured":"Charles V. Wright , Scott E. Coull , and Fabian Monrose . 2009 . Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. In Network and Distributed System Security Symposium (NDSS '09) . Internet Society, San Diego, CA, USA. Charles V. Wright, Scott E. Coull, and Fabian Monrose. 2009. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. In Network and Distributed System Security Symposium (NDSS '09). Internet Society, San Diego, CA, USA."}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323416","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323416"}},"subtitle":["fingerprinting LTE\/4G traffic on layer two"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":49,"alternative-id":["10.1145\/3317549.3323416","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323416","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}