{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:23:29Z","timestamp":1774023809398,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583473","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:51Z","timestamp":1682551851000},"page":"2318-2328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5047-5683","authenticated-orcid":false,"given":"Sanghak","family":"Oh","sequence":"first","affiliation":[{"name":"Sungkyunkwan University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6423-1700","authenticated-orcid":false,"given":"Minwook","family":"Lee","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7490-9936","authenticated-orcid":false,"given":"Hyunwoo","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea Institute of Energy Technology, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4029-7051","authenticated-orcid":false,"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1605-3866","authenticated-orcid":false,"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Percentage of Mobile Device Website Traffic Worldwide from 1st Quarter 2015 to 2nd Quarter","year":"2022","unstructured":"2022. Percentage of Mobile Device Website Traffic Worldwide from 1st Quarter 2015 to 2nd Quarter 2022. https:\/\/www.statista.com\/statistics\/277125\/share-of-website-traffic-coming-from-mobile-devices. (Accessed on 9\/23\/2022)."},{"key":"e_1_3_2_1_2_1","volume-title":"Permutation Importance: A Corrected Feature Importance Measure. Bioinformatics","author":"Altmann Andr\u00e9","year":"2010","unstructured":"Andr\u00e9 Altmann, Laura Tolo\u015fi, Oliver Sander, and Thomas Lengauer. 2010. Permutation Importance: A Corrected Feature Importance Measure. Bioinformatics (2010)."},{"key":"e_1_3_2_1_3_1","unstructured":"Yawning Angel and Philipp Winter. 2014. Obfs4 (The Obfourscator). https:\/\/gitweb.torproject.org\/pluggable-transports\/obfs4.git\/tree\/doc. (Accessed on 10\/06\/2022)."},{"key":"e_1_3_2_1_4_1","volume-title":"Comparison of Machine-learning Algorithms for Classification of VPN Network Traffic Flow Using Time-related Features. Journal of Cyber Security Technology","author":"Bagui Sikha","year":"2017","unstructured":"Sikha Bagui, Xingang Fang, Ezhil Kalaimannan, Subhash\u00a0C. Bagui, and Joseph Sheehan. 2017. Comparison of Machine-learning Algorithms for Classification of VPN Network Traffic Flow Using Time-related Features. Journal of Cyber Security Technology (2017)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663745"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2015.7374133"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"e_1_3_2_1_9_1","volume-title":"Number of smartphone subscriptions worldwide from 2016 to","author":"Statista\u00a0Research Department","year":"2021","unstructured":"Statista\u00a0Research Department. 2022. Number of smartphone subscriptions worldwide from 2016 to 2021, with forecasts from 2022 to 2027. https:\/\/www.statista.com\/statistics\/330695\/number-of-smartphone-users-worldwide\/. (Accessed on 10\/14\/2022)."},{"key":"e_1_3_2_1_10_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23160"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"e_1_3_2_1_13_1","volume-title":"Autogluon-Tabular: Robust and Accurate AutoML for Structured Data. arXiv preprint arXiv:2003.06505","author":"Erickson Nick","year":"2020","unstructured":"Nick Erickson, Jonas Mueller, Alexander Shirkov, Hang Zhang, Pedro Larroy, Mu Li, and Alexander Smola. 2020. Autogluon-Tabular: Robust and Accurate AutoML for Structured Data. arXiv preprint arXiv:2003.06505 (2020)."},{"key":"e_1_3_2_1_14_1","volume-title":"Generic Routing Encapsulation (GRE). https:\/\/www.rfc-editor","author":"Farinacci Dino","year":"2022","unstructured":"Dino Farinacci, Tony Li, Stan Hanks, David Meyer, and Paul Traina. 2000. Generic Routing Encapsulation (GRE). https:\/\/www.rfc-editor.org\/rfc\/rfc2784. (Accessed on 10\/10\/2022)."},{"key":"e_1_3_2_1_15_1","volume-title":"Detecting Adversarial Samples from Artifacts. arXiv preprint arXiv:1703.00410","author":"Feinman Reuben","year":"2017","unstructured":"Reuben Feinman, Ryan\u00a0R. Curtin, Saurabh Shintre, and Andrew\u00a0B. Gardner. 2017. Detecting Adversarial Samples from Artifacts. arXiv preprint arXiv:1703.00410 (2017)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62005-9_31"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA51271.2020.00048"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31865-1_25"},{"key":"e_1_3_2_1_19_1","volume-title":"Point-to-Point Tunneling Protocol (PPTP). https:\/\/www.rfc-editor","author":"Hamzeh Kory","year":"2022","unstructured":"Kory Hamzeh, Grueep Pall, William Verthein, Jeff Taarud, W Little, and Glen Zorn. 1999. Point-to-Point Tunneling Protocol (PPTP). https:\/\/www.rfc-editor.org\/rfc\/rfc2637. (Accessed on 10\/10\/2022)."},{"key":"e_1_3_2_1_20_1","volume-title":"FastAI: A Layered API for Deep Learning. Information","author":"Howard Jeremy","year":"2020","unstructured":"Jeremy Howard and Sylvain Gugger. 2020. FastAI: A Layered API for Deep Learning. Information (2020)."},{"key":"e_1_3_2_1_21_1","volume-title":"TCP Extensions for High Performance. https:\/\/www.rfc-editor","author":"Jacobson Van","year":"2022","unstructured":"Van Jacobson, Robert Braden, and David Borman. 1992. TCP Extensions for High Performance. https:\/\/www.rfc-editor.org\/rfc\/rfc1323. (Accessed on 10\/06\/2022)."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of the USENIX Security Symposium (USENIX Security).","author":"Kang Qiao","year":"2020","unstructured":"Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, and Xiapu Luo. 2020. Programmable In-Network Security for Context-aware BYOD Policies. In Proc. of the USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_23_1","volume-title":"Internet Key Exchange Protocol Version 2 (IKEv2). https:\/\/www.rfc-editor","author":"Kaufman Charlie","year":"2022","unstructured":"Charlie Kaufman, Paul Hoffman, Yoav Nir, Pasi Eronen, and Tero Kivinen. 2014. Internet Key Exchange Protocol Version 2 (IKEv2). https:\/\/www.rfc-editor.org\/rfc\/rfc7296. (Accessed on 09\/23\/2022)."},{"key":"e_1_3_2_1_24_1","volume-title":"LightGBM: A Highly Efficient Gradient Boosting Decision Tree. Advances in Neural Information Processing Systems","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. LightGBM: A Highly Efficient Gradient Boosting Decision Tree. Advances in Neural Information Processing Systems (2017)."},{"key":"e_1_3_2_1_25_1","volume-title":"IP Encapsulating Security Payload (ESP). https:\/\/www.rfc-editor","author":"Kent Stephen","year":"2022","unstructured":"Stephen Kent. 2005. IP Encapsulating Security Payload (ESP). https:\/\/www.rfc-editor.org\/rfc\/rfc4303. (Accessed on 10\/10\/2022)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"S. Kent and K. Seo. 2005. Security Architecture for the Internet Protocol. https:\/\/www.rfc-editor.org\/rfc\/rfc4301. (Accessed on 09\/23\/2022).","DOI":"10.17487\/rfc4301"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517425"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. of the ACM Web Conference (WWW).","author":"Lee Hyunwoo","year":"2021","unstructured":"Hyunwoo Lee, Doowon Kim, and Yonghwi Kwon. 2021. TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet. In Proc. of the ACM Web Conference (WWW)."},{"key":"e_1_3_2_1_31_1","volume-title":"TSCRNN: A Novel Classification Scheme of Encrypted Traffic Based on Flow Spatiotemporal Features for Efficient Management of IIoT. Computer Networks","author":"Lin Kunda","year":"2021","unstructured":"Kunda Lin, Xiaolong Xu, and Honghao Gao. 2021. TSCRNN: A Novel Classification Scheme of Encrypted Traffic Based on Flow Spatiotemporal Features for Efficient Management of IIoT. Computer Networks (2021)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"e_1_3_2_1_33_1","volume-title":"Ramin Shirali\u00a0Hossein Zade, and Mohammdsadegh Saberian","author":"Lotfollahi Mohammad","year":"2020","unstructured":"Mohammad Lotfollahi, Mahdi\u00a0Jafari Siavoshani, Ramin Shirali\u00a0Hossein Zade, and Mohammdsadegh Saberian. 2020. Deep Packet: A Novel Approach for Encrypted Traffic Classification Using Deep Learning. Soft Computing (2020)."},{"key":"e_1_3_2_1_34_1","volume-title":"Adversarial Learning. In Proc. of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).","author":"Lowd Daniel","year":"2005","unstructured":"Daniel Lowd and Christopher Meek. 2005. Adversarial Learning. In Proc. of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)."},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. of the EAI International Conference on Digital Forensics and Cyber Crime (ICDF2C).","author":"Matou\u0161ek Petr","year":"2020","unstructured":"Petr Matou\u0161ek, Ivana Burgetov\u00e1, Ond\u0159ej Ry\u0161av\u1ef3, and Malombe Victor. 2020. On Reliability of JA3 Hashes for Fingerprinting Mobile Applications. In Proc. of the EAI International Conference on Digital Forensics and Cyber Crime (ICDF2C)."},{"key":"e_1_3_2_1_36_1","volume-title":"On Detecting Adversarial Perturbations. arXiv preprint arXiv:1702.04267","author":"Metzen Jan\u00a0Hendrik","year":"2017","unstructured":"Jan\u00a0Hendrik Metzen, Tim Genewein, Volker Fischer, and Bastian Bischoff. 2017. On Detecting Adversarial Perturbations. arXiv preprint arXiv:1702.04267 (2017)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_5"},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. of the USENIX Security Symposium (USENIX Security).","author":"Nasr Milad","year":"2021","unstructured":"Milad Nasr, Alireza Bahramali, and Amir Houmansadr. 2021. Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. In Proc. of the USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_39_1","volume-title":"Microsoft Point-To-Point Compression (MPPC) Protocol. https:\/\/www.rfc-editor","author":"Pall G.","year":"2022","unstructured":"G. Pall. 1997. Microsoft Point-To-Point Compression (MPPC) Protocol. https:\/\/www.rfc-editor.org\/rfc\/rfc3078. (Accessed on 10\/10\/2022)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398814"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485925"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. https:\/\/www.rfc-editor.org\/rfc\/rfc8446.","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"e_1_3_2_1_44_1","volume-title":"The Point-to-Point Protocol (PPP). https:\/\/www.rfc-editor","author":"Simpson William","year":"2022","unstructured":"William Simpson. 1993. The Point-to-Point Protocol (PPP). https:\/\/www.rfc-editor.org\/rfc\/rfc1548. (Accessed on 10\/10\/2022)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77961-0_5"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. of the USENIX Security Symposium (USENIX Security).","author":"Xue Diwen","year":"2022","unstructured":"Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J.\u00a0Alex Halderman, Jedidiah\u00a0R. Crandall, and Roya Ensafi. 2022. OpenVPN is Open to VPN Fingerprinting. In Proc. of the USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631415"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583473","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:53Z","timestamp":1750178873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":51,"alternative-id":["10.1145\/3543507.3583473","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583473","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}