{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T09:52:11Z","timestamp":1756461131400,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3341478","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Realistically Fingerprinting Social Media Webpages in HTTPS Traffic"],"prefix":"10.1145","author":[{"given":"Mariano","family":"Di Martino","sequence":"first","affiliation":[{"name":"Hasselt University \/ Expertise Center for Digital Media"}]},{"given":"Peter","family":"Quax","sequence":"additional","affiliation":[{"name":"Hasselt University \/ Expertise Center for Digital Media - Flanders Make"}]},{"given":"Wim","family":"Lamotte","sequence":"additional","affiliation":[{"name":"Hasselt University \/ Expertise Center for Digital Media"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.03.008"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991123"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"M. Belshe R. Peon and M. Thomson. 2015. Hypertext Transfer Protocol Version 2 (HTTP\/2). RFC 7540. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc7540.txt.  M. Belshe R. Peon and M. Thomson. 2015. Hypertext Transfer Protocol Version 2 (HTTP\/2). RFC 7540. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc7540.txt.","DOI":"10.17487\/RFC7540"},{"key":"e_1_3_2_1_4_1","volume-title":"Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting. (02","author":"Bhat Sanjit","year":"2018","unstructured":"Sanjit Bhat , David Lu , Albert Kwon , and Srinivas Devadas . 2018. Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting. (02 2018 ). Sanjit Bhat, David Lu, Albert Kwon, and Srinivas Devadas. 2018. Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting. (02 2018)."},{"key":"e_1_3_2_1_5_1","volume-title":"Last accessed on May 6th","author":"Brant Tom","year":"2019","unstructured":"Tom Brant . {n. d.}. Government Requests for Facebook Data Still Rising. ({n. d.}). https:\/\/www.entrepreneur.com\/article\/293550 , Last accessed on May 6th 2019 . Tom Brant. {n. d.}. Government Requests for Facebook Data Still Rising. ({n. d.}). https:\/\/www.entrepreneur.com\/article\/293550, Last accessed on May 6th 2019."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_8_1","volume-title":"Traffic Analysis of SSL Encrypted Web Browsing. (11","author":"Cheng Heyning","year":"2000","unstructured":"Heyning Cheng and Ron Avnur . 2000. Traffic Analysis of SSL Encrypted Web Browsing. (11 2000 ). Heyning Cheng and Ron Avnur. 2000. Traffic Analysis of SSL Encrypted Web Browsing. (11 2000)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0023"},{"key":"e_1_3_2_1_10_1","unstructured":"George Danezis. {n. d.}. Traffic Analysis of the HTTP protocol over TLS.  George Danezis. {n. d.}. Traffic Analysis of the HTTP protocol over TLS."},{"key":"e_1_3_2_1_11_1","volume-title":"Last accessed on December 18th","author":"Deveria Alexis","year":"2018","unstructured":"Alexis Deveria . {n. d.}. Can I Use. ({n. d.}). https:\/\/caniuse.com\/#search=http2 , Last accessed on December 18th 2018 . Alexis Deveria. {n. d.}. Can I Use. ({n. d.}). https:\/\/caniuse.com\/#search=http2, Last accessed on December 18th 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_13_1","volume-title":"International Yearbook of Cartography 7","author":"George Jenks","year":"1967","unstructured":"Jenks George . 1967. The Data Model Concept in Statistical Mapping . International Yearbook of Cartography 7 ( 1967 ). Jenks George. 1967. The Data Model Concept in Statistical Mapping. International Yearbook of Cartography 7 (1967)."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium (SEC'16)","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis . 2016 . K-fingerprinting: A Robust Scalable Website Fingerprinting Technique . In Proceedings of the 25th USENIX Conference on Security Symposium (SEC'16) . USENIX Association, Berkeley, CA, USA, 1187--1203. http:\/\/dl.acm.org\/citation.cfm?id=3241094.3241186 Jamie Hayes and George Danezis. 2016. K-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In Proceedings of the 25th USENIX Conference on Security Symposium (SEC'16). USENIX Association, Berkeley, CA, USA, 1187--1203. http:\/\/dl.acm.org\/citation.cfm?id=3241094.3241186"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278493"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_18_1","first-page":"27","article-title":"Toward an Efficient Website Fingerprinting Defense","volume":"9878","author":"Juarez Marc","year":"2016","unstructured":"Marc Juarez , Mohsen Imani , Mike Perry , Claudia Diaz , and Matthew Wright . 2016 . Toward an Efficient Website Fingerprinting Defense . In ESORICS , Vol. 9878. 27 -- 46 . Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright. 2016. Toward an Efficient Website Fingerprinting Defense. In ESORICS, Vol. 9878. 27--46.","journal-title":"ESORICS"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940136.2940140"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888898"},{"key":"e_1_3_2_1_22_1","volume-title":"In Proc. Network and Distributed Systems Symposium (NDSS). The Internet Society.","author":"Luo Xiapu","year":"2011","unstructured":"Xiapu Luo , Peng Zhou , Edmond W. W. Chan , Wenke Lee , Rocky K. C. Chang , and Roberto Perdisci . 2011 . HTTPOS: Sealing information leaks with browserside obfuscation of encrypted flows . In In Proc. Network and Distributed Systems Symposium (NDSS). The Internet Society. Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci. 2011. HTTPOS: Sealing information leaks with browserside obfuscation of encrypted flows. In In Proc. Network and Distributed Systems Symposium (NDSS). The Internet Society."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007226501020112"},{"key":"e_1_3_2_1_24_1","volume-title":"Last accessed on December 22th","author":"Merchant Briant","year":"2018","unstructured":"Briant Merchant . 2015. Your Porn is Watching You. (2015). https:\/\/motherboard.vice.com\/en_us\/article\/539485\/your-porn-is-watching-you , Last accessed on December 22th 2018 . Briant Merchant. 2015. Your Porn is Watching You. (2015). https:\/\/motherboard.vice.com\/en_us\/article\/539485\/your-porn-is-watching-you, Last accessed on December 22th 2018."},{"key":"e_1_3_2_1_25_1","volume-title":"Clinic: Risks and Realization of HTTPS Traffic Analysis. In Privacy Enhancing Technologies, Emiliano De Cristofaro and Steven J","author":"Miller Brad","year":"2014","unstructured":"Brad Miller , Ling Huang , A. D. Joseph , and J. D. Tygar . 2014 . I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. In Privacy Enhancing Technologies, Emiliano De Cristofaro and Steven J . Murdoch (Eds.). Springer International Publishing , Cham, 143--163. Brad Miller, Ling Huang, A. D. Joseph, and J. D. Tygar. 2014. I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis. In Privacy Enhancing Technologies, Emiliano De Cristofaro and Steven J. Murdoch (Eds.). Springer International Publishing, Cham, 143--163."},{"key":"e_1_3_2_1_26_1","unstructured":"Ricardo Morla. 2017. Effect of Pipelining and Multiplexing in Estimating HTTP\/2.0 Web Object Size. (2017). https:\/\/arxiv.org\/abs\/1707.00641.  Ricardo Morla. 2017. Effect of Pipelining and Multiplexing in Estimating HTTP\/2.0 Web Object Size. (2017). https:\/\/arxiv.org\/abs\/1707.00641."},{"key":"e_1_3_2_1_27_1","volume-title":"(03","author":"Nottingham Mark","year":"2017","unstructured":"Mark Nottingham . 2017. The State of Browser Caching , Revisited. (03 2017 ). https:\/\/www.mnot.net\/blog\/2017\/03\/16\/browser-caching, Last accessed on December 18th 2018. Mark Nottingham. 2017. The State of Browser Caching, Revisited. (03 2017). https:\/\/www.mnot.net\/blog\/2017\/03\/16\/browser-caching, Last accessed on December 18th 2018."},{"key":"e_1_3_2_1_28_1","volume-title":"Last accessed on December 22th","author":"Online CSO","year":"2018","unstructured":"CSO Online . 2018. Mobile carriers sell users' personal information to third parties. (2018). https:\/\/www.csoonline.com\/article\/3233211\/security\/mobile-carriers-sell-users-personal-information-to-third-parties.html , Last accessed on December 22th 2018 . CSO Online. 2018. Mobile carriers sell users' personal information to third parties. (2018). https:\/\/www.csoonline.com\/article\/3233211\/security\/mobile-carriers-sell-users-personal-information-to-third-parties.html, Last accessed on December 22th 2018."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_31_1","volume-title":"Last accessed on December 22th","author":"Peachey Kevin","year":"2018","unstructured":"Kevin Peachey . 2018. Why banks will share your financial secrets. (2018). https:\/\/www.bbc.com\/news\/business-42253051 , Last accessed on December 22th 2018 . Kevin Peachey. 2018. Why banks will share your financial secrets. (2018). https:\/\/www.bbc.com\/news\/business-42253051, Last accessed on December 22th 2018."},{"key":"e_1_3_2_1_33_1","unstructured":"The Tor Project. 2013. A Critique of Website Traffic Fingerprinting Attacks. (2013). https:\/\/blog.torproject.org\/critique-website-traffic-fingerprinting-attacks.  The Tor Project. 2013. A Critique of Website Traffic Fingerprinting Attacks. (2013). https:\/\/blog.torproject.org\/critique-website-traffic-fingerprinting-attacks."},{"key":"e_1_3_2_1_34_1","volume-title":"https:\/\/trac.torproject.org\/projects\/tor\/ticket\/14952","author":"Project The Tor","year":"2015","unstructured":"The Tor Project . 2015. Audit HTTP\/2 and SPDY if needed. ( 2015 ). https:\/\/trac.torproject.org\/projects\/tor\/ticket\/14952 . The Tor Project. 2015. Audit HTTP\/2 and SPDY if needed. (2015). https:\/\/trac.torproject.org\/projects\/tor\/ticket\/14952."},{"key":"e_1_3_2_1_35_1","unstructured":"The Tor Project. 2018. The Design and Implementation of the Tor Browser. (2018). https:\/\/www.torproject.org\/projects\/torbrowser\/design\/.  The Tor Project. 2018. The Design and Implementation of the Tor Browser. (2018). https:\/\/www.torproject.org\/projects\/torbrowser\/design\/."},{"key":"e_1_3_2_1_36_1","volume-title":"Tom Van Goethem, and Wouter Joosen","author":"Rimmer Vera","year":"2018","unstructured":"Vera Rimmer , Davy Preuveneers , Marc Juarez , Tom Van Goethem, and Wouter Joosen . 2018 . Automated Website Fingerprinting through Deep Learning. In NDSS. Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. 2018. Automated Website Fingerprinting through Deep Learning. In NDSS."},{"key":"e_1_3_2_1_37_1","first-page":"318","article-title":"Method for performing user profiling from encrypted network traffic flows","volume":"15","author":"Sanchez Roberto Gonzalez","year":"2017","unstructured":"Roberto Gonzalez Sanchez , Claudio Soriente , and Nikolaos Laoutaris . 2017 . Method for performing user profiling from encrypted network traffic flows . US Patent App. 15\/486 , 318 . Roberto Gonzalez Sanchez, Claudio Soriente, and Nikolaos Laoutaris. 2017. Method for performing user profiling from encrypted network traffic flows. US Patent App. 15\/486,318.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_39_1","volume-title":"Digital Report","author":"Social We Are","year":"2018","unstructured":"We Are Social . 2018. Global Digital Report 2018 . (2018). https:\/\/wearesocial.com\/uk\/blog\/2018\/01\/global-digital-report-2018. We Are Social. 2018. Global Digital Report 2018. (2018). https:\/\/wearesocial.com\/uk\/blog\/2018\/01\/global-digital-report-2018."},{"key":"e_1_3_2_1_40_1","volume-title":"Last accessed on December 18th","author":"Social WIFI Sp.","year":"2018","unstructured":"Social WIFI Sp. {n. d.}. Social Wifi. ({n. d.}). https:\/\/socialwifi.com\/ , Last accessed on December 18th 2018 . Social WIFI Sp. {n. d.}. Social Wifi. ({n. d.}). https:\/\/socialwifi.com\/, Last accessed on December 18th 2018."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830535"},{"volume-title":"Last accessed on January 9th","year":"2019","key":"e_1_3_2_1_42_1","unstructured":"W3Techs. {n. d.}. Usage of HTTP\/2 for websites. ({n. d.}). https:\/\/w3techs.com\/technologies\/details\/ce-http2\/all\/all , Last accessed on January 9th 2019 . W3Techs. {n. d.}. Usage of HTTP\/2 for websites. ({n. d.}). https:\/\/w3techs.com\/technologies\/details\/ce-http2\/all\/all, Last accessed on January 9th 2019."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (SEC'14)","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , Rob Johnson , and Ian Goldberg . 2014 . Effective Attacks and Provable Defenses for Website Fingerprinting . In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC'14) . USENIX Association, Berkeley, CA, USA, 143--157. Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC'14). USENIX Association, Berkeley, CA, USA, 143--157."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_2_1_46_1","volume-title":"Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg . 2017 . Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association, Vancouver, BC, 1375--1390. Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1375--1390."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0039"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341478","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3341478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:29Z","timestamp":1750204469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":46,"alternative-id":["10.1145\/3339252.3341478","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3341478","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}