{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:26Z","timestamp":1750220246499,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3487553.3524244","type":"proceedings-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T22:41:30Z","timestamp":1660689690000},"page":"201-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis"],"prefix":"10.1145","author":[{"given":"Chun-Ming","family":"Chang","sequence":"first","affiliation":[{"name":"National Taiwan University, Taiwan"}]},{"given":"Hsu-Chun","family":"Hsiao","sequence":"additional","affiliation":[{"name":"National Taiwan University, Taiwan"}]},{"given":"Timothy","family":"Lynar","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]},{"given":"Tatsuya","family":"Mori","sequence":"additional","affiliation":[{"name":"Waseda University, Japan and NICT\/RIKEN AIP, Japan"}]}],"member":"320","published-online":{"date-parts":[[2022,8,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Attacks on Tor. https:\/\/github.com\/Attacks-on-Tor\/Attacks-on-Tor.  2020. Attacks on Tor. https:\/\/github.com\/Attacks-on-Tor\/Attacks-on-Tor."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. How to shut firefox up about updates. https:\/\/support.mozilla.org\/en-US\/questions\/1289766.  2020. How to shut firefox up about updates. https:\/\/support.mozilla.org\/en-US\/questions\/1289766."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of Usenix Security Symposium.","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis . 2016 . k-fingerprinting: a Robust ScalableWebsite Fingerprinting Technique . In Proceedings of Usenix Security Symposium. Jamie Hayes and George Danezis. 2016. k-fingerprinting: a Robust ScalableWebsite Fingerprinting Technique. In Proceedings of Usenix Security Symposium."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of Network and Distributed System Security Symposium.","author":"Michael\u00a0Schwarz Daniel\u00a0Gruss","year":"2019","unstructured":"Daniel\u00a0Gruss Michael\u00a0Schwarz , Florian\u00a0Lackner. 2019 . JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits . In Proceedings of Network and Distributed System Security Symposium. Daniel\u00a0Gruss Michael\u00a0Schwarz, Florian\u00a0Lackner. 2019. JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. In Proceedings of Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the ACM SIGSAC CCS.","author":"Acar Gunes","year":"2017","unstructured":"Overdorf, Rebekah, Juarez, Marc, Gunes Acar , Rachel Greenstadt , and Claudia Diaz . 2017 . How Unique is Your.Onion? An Analysis of the Fingerprintability of Tor Onion Services . In Proceedings of the ACM SIGSAC CCS. Overdorf, Rebekah, Juarez, Marc, Gunes Acar, Rachel Greenstadt, and Claudia Diaz. 2017. How Unique is Your.Onion? An Analysis of the Fingerprintability of Tor Onion Services. In Proceedings of the ACM SIGSAC CCS."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings on ACM CCS.","author":"Shuai\u00a0Li Nicholas\u00a0Hopper","year":"2018","unstructured":"Nicholas\u00a0Hopper Shuai\u00a0Li , Huajun\u00a0Guo. 2018 . Measuring Information Leakage in Website Fingerprinting Attacks and Defenses . In Proceedings on ACM CCS. Nicholas\u00a0Hopper Shuai\u00a0Li, Huajun\u00a0Guo. 2018. Measuring Information Leakage in Website Fingerprinting Attacks and Defenses. In Proceedings on ACM CCS."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of Network and Distributed System Security Symposium.","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , and Rob Johnson . 2014 . Effective Attacks and Provable Defenses for Website Fingerprinting . In Proceedings of Network and Distributed System Security Symposium. Tao Wang, Xiang Cai, Rishab Nithyanand, and Rob Johnson. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In Proceedings of Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"}],"event":{"name":"WWW '22: The ACM Web Conference 2022","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Virtual Event, Lyon France","acronym":"WWW '22"},"container-title":["Companion Proceedings of the Web Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487553.3524244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487553.3524244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:34Z","timestamp":1750188634000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487553.3524244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":10,"alternative-id":["10.1145\/3487553.3524244","10.1145\/3487553"],"URL":"https:\/\/doi.org\/10.1145\/3487553.3524244","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}