{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T06:18:26Z","timestamp":1764829106426,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["DARPA-RA-21-03- 09-YFA9-FP-003"],"award-info":[{"award-number":["DARPA-RA-21-03- 09-YFA9-FP-003"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["NS-1953786"],"award-info":[{"award-number":["NS-1953786"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3595793","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"773-784","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Investigating Traffic Analysis Attacks on Apple iCloud Private Relay"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6674-8909","authenticated-orcid":false,"given":"Ali","family":"Zohaib","sequence":"first","affiliation":[{"name":"UMass Amherst, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3994-9267","authenticated-orcid":false,"given":"Jade","family":"Sheffey","sequence":"additional","affiliation":[{"name":"UMass Amherst, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7553-6657","authenticated-orcid":false,"given":"Amir","family":"Houmansadr","sequence":"additional","affiliation":[{"name":"UMass Amherst, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. About iCloud Private Relay. https:\/\/support.apple.com\/en-us\/HT212614  2022. About iCloud Private Relay. https:\/\/support.apple.com\/en-us\/HT212614"},{"key":"e_1_3_2_1_2_1","unstructured":"2022. Extra Security With Double VPN | NordVPN. https:\/\/nordvpn.com\/features\/double-vpn\/. (Accessed on 04\/19\/2023).  2022. Extra Security With Double VPN | NordVPN. https:\/\/nordvpn.com\/features\/double-vpn\/. (Accessed on 04\/19\/2023)."},{"key":"e_1_3_2_1_3_1","unstructured":"2022. Immue discovers new exploitation of Apple\u2019s private relay | VentureBeat. https:\/\/venturebeat.com\/security\/immue-discovers-new-vulnerability-in-apples-private-relay\/. (Accessed on 08\/30\/2022).  2022. Immue discovers new exploitation of Apple\u2019s private relay | VentureBeat. https:\/\/venturebeat.com\/security\/immue-discovers-new-vulnerability-in-apples-private-relay\/. (Accessed on 08\/30\/2022)."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. List of Private Relay Egress IPs. https:\/\/mask-api.icloud.com\/egress-ip-ranges.csv  2022. List of Private Relay Egress IPs. https:\/\/mask-api.icloud.com\/egress-ip-ranges.csv"},{"key":"e_1_3_2_1_5_1","unstructured":"2022. Prepare Your Network or Web Server for iCloud Private Relay - Support - Apple Developer. https:\/\/developer.apple.com\/support\/prepare-your-network-for-icloud-private-relay\/. (Accessed on 08\/25\/2022).  2022. Prepare Your Network or Web Server for iCloud Private Relay - Support - Apple Developer. https:\/\/developer.apple.com\/support\/prepare-your-network-for-icloud-private-relay\/. (Accessed on 08\/25\/2022)."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Alexa Top Sites. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip.  2023. Alexa Top Sites. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip."},{"key":"e_1_3_2_1_7_1","unstructured":"2023. Multihop with WireGuard - Guides | Mullvad VPN. https:\/\/mullvad.net\/en\/help\/multihop-wireguard\/. (Accessed on 04\/19\/2023).  2023. Multihop with WireGuard - Guides | Mullvad VPN. https:\/\/mullvad.net\/en\/help\/multihop-wireguard\/. (Accessed on 04\/19\/2023)."},{"key":"e_1_3_2_1_8_1","unstructured":"Apple. 2021. iCloud Private Relay Overview. https:\/\/www.apple.com\/privacy\/docs\/iCloud_Private_Relay_Overview_Dec2021.PDF  Apple. 2021. iCloud Private Relay Overview. https:\/\/www.apple.com\/privacy\/docs\/iCloud_Private_Relay_Overview_Dec2021.PDF"},{"volume-title":"WWDC 2021 - Video. (2021","year":"2021","key":"e_1_3_2_1_9_1","unstructured":"Apple. 2021 . WWDC 2021 - Video. (2021 ). https:\/\/developer.apple.com\/videos\/play\/wwdc2021\/10085\/ Apple. 2021. WWDC 2021 - Video. (2021). https:\/\/developer.apple.com\/videos\/play\/wwdc2021\/10085\/"},{"key":"e_1_3_2_1_10_1","volume-title":"Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. PETS 2019","author":"Bhat Sanjit","year":"2019","unstructured":"Sanjit Bhat , David Lu , Albert\u00a0Hyukjae Kwon , and Srinivas Devadas . 2019 . Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. PETS 2019 (2019). Sanjit Bhat, David Lu, Albert\u00a0Hyukjae Kwon, and Srinivas Devadas. 2019. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. PETS 2019 (2019)."},{"key":"e_1_3_2_1_11_1","volume-title":"International Workshop on Recent Advances in Intrusion Detection. Springer.","author":"Blum Avrim","year":"2004","unstructured":"Avrim Blum , Dawn Song , and Shobha Venkataraman . 2004 . Detection of interactive stepping stones: Algorithms and confidence bounds . In International Workshop on Recent Advances in Intrusion Detection. Springer. Avrim Blum, Dawn Song, and Shobha Venkataraman. 2004. Detection of interactive stepping stones: Algorithms and confidence bounds. In International Workshop on Recent Advances in Intrusion Detection. Springer."},{"key":"e_1_3_2_1_12_1","volume-title":"ACM CCS","author":"Borisov Nikita","year":"2007","unstructured":"Nikita Borisov , George Danezis , Prateek Mittal , and Parisa Tabriz . 2007 . Denial of service or denial of security? . In ACM CCS 2007. Nikita Borisov, George Danezis, Prateek Mittal, and Parisa Tabriz. 2007. Denial of service or denial of security?. In ACM CCS 2007."},{"key":"e_1_3_2_1_13_1","volume-title":"CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In WPES","author":"Cai Xiang","year":"2014","unstructured":"Xiang Cai , Rishab Nithyanand , and Rob Johnson . 2014 . CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In WPES 2014. Xiang Cai, Rishab Nithyanand, and Rob Johnson. 2014. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In WPES 2014."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_3_2_1_15_1","volume-title":"Anonymized Internet Traces","author":"CAIDA.","year":"2016","unstructured":"CAIDA. 2016. Anonymized Internet Traces 2016 . https:\/\/catalog.caida.org\/dataset\/passive_2016_pcap. ( Accessed on 08\/29\/2022). CAIDA. 2016. Anonymized Internet Traces 2016. https:\/\/catalog.caida.org\/dataset\/passive_2016_pcap. (Accessed on 08\/29\/2022)."},{"key":"e_1_3_2_1_16_1","volume-title":"Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM","author":"Chaum L","year":"1981","unstructured":"David\u00a0 L Chaum . 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM ( 1981 ). David\u00a0L Chaum. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM (1981)."},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security","author":"Cherubin Giovanni","year":"2022","unstructured":"Giovanni Cherubin , Rob Jansen , and Carmela Troncoso . 2022. Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World . In USENIX Security 2022 . Giovanni Cherubin, Rob Jansen, and Carmela Troncoso. 2022. Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. In USENIX Security 2022."},{"key":"e_1_3_2_1_18_1","volume-title":"Freenet: A distributed anonymous information storage and retrieval system. In Designing privacy enhancing technologies","author":"Clarke Ian","year":"2001","unstructured":"Ian Clarke , Oskar Sandberg , Brandon Wiley , and Theodore\u00a0 W Hong . 2001 . Freenet: A distributed anonymous information storage and retrieval system. In Designing privacy enhancing technologies . Springer . Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore\u00a0W Hong. 2001. Freenet: A distributed anonymous information storage and retrieval system. In Designing privacy enhancing technologies. Springer."},{"key":"e_1_3_2_1_19_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer.","author":"Danezis George","year":"2004","unstructured":"George Danezis . 2004 . The traffic analysis of continuous-time mixes . In International Workshop on Privacy Enhancing Technologies. Springer. George Danezis. 2004. The traffic analysis of continuous-time mixes. In International Workshop on Privacy Enhancing Technologies. Springer."},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE NCA","author":"Cadena Wladimir De\u00a0la","year":"2020","unstructured":"Wladimir De\u00a0la Cadena , Daniel Kaiser , Andriy Panchenko , and Thomas Engel . 2020 . Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications . In IEEE NCA 2020. Wladimir De\u00a0la Cadena, Daniel Kaiser, Andriy Panchenko, and Thomas Engel. 2020. Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications. In IEEE NCA 2020."},{"key":"e_1_3_2_1_21_1","volume-title":"Thomas Engel, Klaus Wehrle, and Andriy Panchenko.","author":"Cadena Wladimir De\u00a0la","year":"2020","unstructured":"Wladimir De\u00a0la Cadena , Asya Mitseva , Jens Hiller , Jan Pennekamp , Sebastian Reuter , Julian Filter , Thomas Engel, Klaus Wehrle, and Andriy Panchenko. 2020 . TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. In ACM CCS 2020. Wladimir De\u00a0la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, and Andriy Panchenko. 2020. TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. In ACM CCS 2020."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA465464","volume-title":"Tor: The Second-Generation Onion Router. In USENIX Security","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine , Nick Mathewson , and Paul Syverson . 2004 . Tor: The Second-Generation Onion Router. In USENIX Security 2004. Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The Second-Generation Onion Router. In USENIX Security 2004."},{"key":"e_1_3_2_1_23_1","volume-title":"I still see you: Why efficient traffic analysis countermeasures fail","author":"Dyer P","year":"2012","unstructured":"Kevin\u00a0 P Dyer , Scott\u00a0 E Coull , Thomas Ristenpart , and Thomas Shrimpton . 2012. Peek-a-boo , I still see you: Why efficient traffic analysis countermeasures fail . In IEEE S &P 2012 . Kevin\u00a0P Dyer, Scott\u00a0E Coull, Thomas Ristenpart, and Thomas Shrimpton. 2012. Peek-a-boo, I still see you: Why efficient traffic analysis countermeasures fail. In IEEE S&P 2012."},{"key":"e_1_3_2_1_24_1","volume-title":"On inferring autonomous system relationships in the Internet","author":"Gao Lixin","year":"2001","unstructured":"Lixin Gao . 2001. On inferring autonomous system relationships in the Internet . IEEE\/ACM Transactions on Networking ( 2001 ). Lixin Gao. 2001. On inferring autonomous system relationships in the Internet. IEEE\/ACM Transactions on Networking (2001)."},{"key":"e_1_3_2_1_25_1","volume-title":"Stable Internet routing without global coordination","author":"Gao Lixin","year":"2001","unstructured":"Lixin Gao and Jennifer Rexford . 2001. Stable Internet routing without global coordination . IEEE\/ACM Transactions on networking ( 2001 ). Lixin Gao and Jennifer Rexford. 2001. Stable Internet routing without global coordination. IEEE\/ACM Transactions on networking (2001)."},{"key":"e_1_3_2_1_26_1","volume-title":"Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data. ACM SIGCOMM CCR","author":"Gill Phillipa","year":"2012","unstructured":"Phillipa Gill , Michael Schapira , and Sharon Goldberg . 2012. Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data. ACM SIGCOMM CCR ( 2012 ). Phillipa Gill, Michael Schapira, and Sharon Goldberg. 2012. Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data. ACM SIGCOMM CCR (2012)."},{"key":"e_1_3_2_1_27_1","volume-title":"IMC","author":"Giotsas Vasileios","year":"2014","unstructured":"Vasileios Giotsas , Matthew Luckie , Bradley Huffaker , and KC Claffy . 2014 . Inferring complex AS relationships . In IMC 2014. Vasileios Giotsas, Matthew Luckie, Bradley Huffaker, and KC Claffy. 2014. Inferring complex AS relationships. In IMC 2014."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security","author":"Gong Jiajun","year":"2020","unstructured":"Jiajun Gong and Tao Wang . 2020. Zero-delay lightweight defenses against website fingerprinting . In USENIX Security 2020 . Jiajun Gong and Tao Wang. 2020. Zero-delay lightweight defenses against website fingerprinting. In USENIX Security 2020."},{"key":"e_1_3_2_1_29_1","volume-title":"PETS 2019","author":"Hanley Hans","year":"2019","unstructured":"Hans Hanley , Yixin Sun , Sameer Wagh , and Prateek Mittal . 2019 . DPSelect: a differential privacy based guard relay selection algorithm for Tor . PETS 2019 (2019). Hans Hanley, Yixin Sun, Sameer Wagh, and Prateek Mittal. 2019. DPSelect: a differential privacy based guard relay selection algorithm for Tor. PETS 2019 (2019)."},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis . 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique . In USENIX Security 2016 . Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In USENIX Security 2016."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.890881"},{"key":"e_1_3_2_1_32_1","volume-title":"PETS 2020","author":"Henri S\u00e9bastien","year":"2020","unstructured":"S\u00e9bastien Henri , Gines Garcia-Aviles , Pablo Serrano , Albert Banchs , and Patrick Thiran . 2020 . Protecting against Website Fingerprinting with Multihoming . PETS 2020 (2020). S\u00e9bastien Henri, Gines Garcia-Aviles, Pablo Serrano, Albert Banchs, and Patrick Thiran. 2020. Protecting against Website Fingerprinting with Multihoming. PETS 2020 (2020)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_34_1","volume-title":"Hoffman and Patrick McManus","author":"E.","year":"2018","unstructured":"Paul\u00a0 E. Hoffman and Patrick McManus . 2018 . DNS Queries over HTTPS (DoH). RFC 8484. https:\/\/doi.org\/10.17487\/RFC8484 10.17487\/RFC8484 Paul\u00a0E. Hoffman and Patrick McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484. https:\/\/doi.org\/10.17487\/RFC8484"},{"key":"e_1_3_2_1_35_1","volume-title":"NDSS","author":"Houmansadr Amir","year":"2011","unstructured":"Amir Houmansadr and Nikita Borisov . 2011 . SWIRL: A Scalable Watermark to Detect Correlated Network Flows . In NDSS 2011. Amir Houmansadr and Nikita Borisov. 2011. SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In NDSS 2011."},{"key":"e_1_3_2_1_36_1","volume-title":"IEEE ICASSP","author":"Houmansadr Amir","year":"2011","unstructured":"Amir Houmansadr and Nikita Borisov . 2011 . Towards improving network flow watermarks using the repeat-accumulate codes . In IEEE ICASSP 2011. Amir Houmansadr and Nikita Borisov. 2011. Towards improving network flow watermarks using the repeat-accumulate codes. In IEEE ICASSP 2011."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23261"},{"key":"e_1_3_2_1_38_1","volume-title":"ACM CCS","author":"Johnson Aaron","year":"2013","unstructured":"Aaron Johnson , Chris Wacek , Rob Jansen , Micah Sherr , and Paul Syverson . 2013 . Users get routed: Traffic correlation on Tor by realistic adversaries . In ACM CCS 2013. Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. 2013. Users get routed: Traffic correlation on Tor by realistic adversaries. In ACM CCS 2013."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"#cr-split#-e_1_3_2_1_40_1.1","doi-asserted-by":"crossref","unstructured":"Eric Kinnear Patrick McManus Tommy Pauly Tanya Verma and Christopher\u00a0A. Wood. 2022. Oblivious DNS over HTTPS. RFC 9230. https:\/\/doi.org\/10.17487\/RFC9230 10.17487\/RFC9230","DOI":"10.17487\/RFC9230"},{"key":"#cr-split#-e_1_3_2_1_40_1.2","doi-asserted-by":"crossref","unstructured":"Eric Kinnear Patrick McManus Tommy Pauly Tanya Verma and Christopher\u00a0A. Wood. 2022. Oblivious DNS over HTTPS. RFC 9230. https:\/\/doi.org\/10.17487\/RFC9230","DOI":"10.17487\/RFC9230"},{"key":"e_1_3_2_1_41_1","volume-title":"ACM COMPASS","author":"Leyba G","year":"2019","unstructured":"Kirtus\u00a0 G Leyba , Benjamin Edwards , Cynthia Freeman , Jedidiah\u00a0 R Crandall , and Stephanie Forrest . 2019 . Borders and Gateways: Measuring and Analyzing National as Chokepoints . In ACM COMPASS 2019. Kirtus\u00a0G Leyba, Benjamin Edwards, Cynthia Freeman, Jedidiah\u00a0R Crandall, and Stephanie Forrest. 2019. Borders and Gateways: Measuring and Analyzing National as Chokepoints. In ACM COMPASS 2019."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243832"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653732"},{"key":"e_1_3_2_1_44_1","unstructured":"Ben Lovejoy. 2022. iPhone US market share hits all-time high overtaking Android. https:\/\/9to5mac.com\/2022\/09\/02\/iphone-us-market-share\/. (Accessed on 12\/15\/2022).  Ben Lovejoy. 2022. iPhone US market share hits all-time high overtaking Android. https:\/\/9to5mac.com\/2022\/09\/02\/iphone-us-market-share\/. (Accessed on 12\/15\/2022)."},{"key":"e_1_3_2_1_45_1","unstructured":"Sergey Mostsevenko. 2021. iCloud Private Relay Vulnerability Identified. https:\/\/fingerprintjs.com\/blog\/ios15-icloud-private-relay-vulnerability\/  Sergey Mostsevenko. 2021. iCloud Private Relay Vulnerability Identified. https:\/\/fingerprintjs.com\/blog\/ios15-icloud-private-relay-vulnerability\/"},{"key":"e_1_3_2_1_46_1","unstructured":"S.J. Murdoch and G. Danezis. 2005. Low-cost traffic analysis of Tor. In IEEE S&P 2005.  S.J. Murdoch and G. Danezis. 2005. Low-cost traffic analysis of Tor. In IEEE S&P 2005."},{"key":"e_1_3_2_1_47_1","volume-title":"DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. In ACM CCS","author":"Nasr Milad","year":"2018","unstructured":"Milad Nasr , Alireza Bahramali , and Amir Houmansadr . 2018 . DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. In ACM CCS 2018. Milad Nasr, Alireza Bahramali, and Amir Houmansadr. 2018. DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. In ACM CCS 2018."},{"key":"e_1_3_2_1_48_1","volume-title":"Measuring and Mitigating AS-level Adversaries Against Tor. In NDSS","author":"Nithyanand Rishab","year":"2016","unstructured":"Rishab Nithyanand , Oleksii Starov , Adva Zair , Phillipa Gill , and Michael Schapira . 2016 . Measuring and Mitigating AS-level Adversaries Against Tor. In NDSS 2016. Rishab Nithyanand, Oleksii Starov, Adva Zair, Phillipa Gill, and Michael Schapira. 2016. Measuring and Mitigating AS-level Adversaries Against Tor. In NDSS 2016."},{"key":"e_1_3_2_1_49_1","volume-title":"PETS 2019 2019","author":"Oh Se","year":"2019","unstructured":"Se Oh , Saikrishna Sunkam , and Nicholas Hopper . 2019 . p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning . PETS 2019 2019 (2019). Se Oh, Saikrishna Sunkam, and Nicholas Hopper. 2019. p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning. PETS 2019 2019 (2019)."},{"key":"e_1_3_2_1_50_1","volume-title":"DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification","author":"Oh Se\u00a0Eun","year":"2022","unstructured":"Se\u00a0Eun Oh , Taiji Yang , Nate Mathews , James\u00a0 K Holland , Mohammad\u00a0Saidur Rahman , Nicholas Hopper , and Matthew Wright . 2022. DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification . In IEEE S &P 2022 . Se\u00a0Eun Oh, Taiji Yang, Nate Mathews, James\u00a0K Holland, Mohammad\u00a0Saidur Rahman, Nicholas Hopper, and Matthew Wright. 2022. DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification. In IEEE S&P 2022."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_52_1","unstructured":"Tommy Pauly Eric Rosenberg and David Schinazi. 2023. QUIC-Aware Proxying Using HTTP. Internet-Draft draft-pauly-masque-quic-proxy-06. IETF. https:\/\/datatracker.ietf.org\/doc\/draft-pauly-masque-quic-proxy\/06\/ Work in Progress.  Tommy Pauly Eric Rosenberg and David Schinazi. 2023. QUIC-Aware Proxying Using HTTP. Internet-Draft draft-pauly-masque-quic-proxy-06. IETF. https:\/\/datatracker.ietf.org\/doc\/draft-pauly-masque-quic-proxy\/06\/ Work in Progress."},{"key":"e_1_3_2_1_53_1","volume-title":"USENIX Security","author":"Piotrowska M","year":"2017","unstructured":"Ania\u00a0 M Piotrowska , Jamie Hayes , Tariq Elahi , Sebastian Meiser , and George Danezis . 2017. The loopix anonymity system . In USENIX Security 2017 . Ania\u00a0M Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The loopix anonymity system. In USENIX Security 2017."},{"key":"e_1_3_2_1_54_1","volume-title":"Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. PETS 2020","author":"Rahman Mohammad\u00a0Saidur","year":"2020","unstructured":"Mohammad\u00a0Saidur Rahman , Payap Sirinam , Nate Mathews , Kantha\u00a0Girish Gangadhara , and Matthew Wright . 2020 . Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. PETS 2020 (2020). Mohammad\u00a0Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha\u00a0Girish Gangadhara, and Matthew Wright. 2020. Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. PETS 2020 (2020)."},{"key":"e_1_3_2_1_55_1","volume-title":"Crowds: Anonymity for web transactions. ACM TISSEC","author":"Reiter K","year":"1998","unstructured":"Michael\u00a0 K Reiter and Aviel\u00a0 D Rubin . 1998 . Crowds: Anonymity for web transactions. ACM TISSEC (1998). Michael\u00a0K Reiter and Aviel\u00a0D Rubin. 1998. Crowds: Anonymity for web transactions. ACM TISSEC (1998)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Vera Rimmer Davy Preuveneers Marc Juarez Tom Van\u00a0Goethem and Wouter Joosen. 2018. Automated Website Fingerprinting through Deep Learning. In NDSS.  Vera Rimmer Davy Preuveneers Marc Juarez Tom Van\u00a0Goethem and Wouter Joosen. 2018. Automated Website Fingerprinting through Deep Learning. In NDSS.","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_1_57_1","volume-title":"ACM IMC","author":"Sattler Patrick","year":"2022","unstructured":"Patrick Sattler , Juliane Aulbach , Johannes Zirngibl , and Georg Carle . 2022 . Towards a tectonic traffic shift? . In ACM IMC 2022. Patrick Sattler, Juliane Aulbach, Johannes Zirngibl, and Georg Carle. 2022. Towards a tectonic traffic shift?. In ACM IMC 2022."},{"key":"#cr-split#-e_1_3_2_1_58_1.1","doi-asserted-by":"crossref","unstructured":"David Schinazi. 2022. Proxying UDP in HTTP. RFC 9298. https:\/\/doi.org\/10.17487\/RFC9298 10.17487\/RFC9298","DOI":"10.17487\/RFC9298"},{"key":"#cr-split#-e_1_3_2_1_58_1.2","doi-asserted-by":"crossref","unstructured":"David Schinazi. 2022. Proxying UDP in HTTP. RFC 9298. https:\/\/doi.org\/10.17487\/RFC9298","DOI":"10.17487\/RFC9298"},{"key":"e_1_3_2_1_59_1","volume-title":"Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. In ACM CCS","author":"Sirinam Payap","year":"2018","unstructured":"Payap Sirinam , Mohsen Imani , Marc Juarez , and Matthew Wright . 2018 . Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. In ACM CCS 2018. Payap Sirinam, Mohsen Imani, Marc Juarez, and Matthew Wright. 2018. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. In ACM CCS 2018."},{"key":"e_1_3_2_1_60_1","volume-title":"ACM CCS","author":"Sirinam Payap","year":"2019","unstructured":"Payap Sirinam , Nate Mathews , Mohammad\u00a0Saidur Rahman , and Matthew Wright . 2019 . Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning . In ACM CCS 2019. Payap Sirinam, Nate Mathews, Mohammad\u00a0Saidur Rahman, and Matthew Wright. 2019. Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning. In ACM CCS 2019."},{"key":"e_1_3_2_1_61_1","volume-title":"Website Fingerprinting in the Age of QUIC. In PETS","author":"Smith Jean-Pierre","year":"2021","unstructured":"Jean-Pierre Smith , Prateek Mittal , and Adrian Perrig . 2021 . Website Fingerprinting in the Age of QUIC. In PETS 2021. Jean-Pierre Smith, Prateek Mittal, and Adrian Perrig. 2021. Website Fingerprinting in the Age of QUIC. In PETS 2021."},{"key":"e_1_3_2_1_62_1","volume-title":"Counter-RAPTOR: Safeguarding Tor against active routing attacks","author":"Sun Yixin","year":"2017","unstructured":"Yixin Sun , Anne Edmundson , Nick Feamster , Mung Chiang , and Prateek Mittal . 2017. Counter-RAPTOR: Safeguarding Tor against active routing attacks . In IEEE S &P 2017 . Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, and Prateek Mittal. 2017. Counter-RAPTOR: Safeguarding Tor against active routing attacks. In IEEE S&P 2017."},{"key":"e_1_3_2_1_63_1","volume-title":"RAPTOR: Routing attacks on privacy in Tor. In USENIX Security","author":"Sun Yixin","year":"2015","unstructured":"Yixin Sun , Anne Edmundson , Laurent Vanbever , Oscar Li , Jennifer Rexford , Mung Chiang , and Prateek Mittal . 2015 . RAPTOR: Routing attacks on privacy in Tor. In USENIX Security 2015. Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, and Prateek Mittal. 2015. RAPTOR: Routing attacks on privacy in Tor. In USENIX Security 2015."},{"key":"e_1_3_2_1_64_1","unstructured":"TunnelBear. 2021. TunnelBear implements OpenVPN3 with Pluggable Transports. https:\/\/www.tunnelbear.com\/blog\/tunnelbear-implements-pluggable-transports-with-openvpn3\/. (Accessed on 04\/19\/2023).  TunnelBear. 2021. TunnelBear implements OpenVPN3 with Pluggable Transports. https:\/\/www.tunnelbear.com\/blog\/tunnelbear-implements-pluggable-transports-with-openvpn3\/. (Accessed on 04\/19\/2023)."},{"key":"e_1_3_2_1_65_1","volume-title":"High Precision Open-World Website Fingerprinting","author":"Wang Tao","year":"2020","unstructured":"Tao Wang . 2020. High Precision Open-World Website Fingerprinting . In IEEE S &P 2020 . Tao Wang. 2020. High Precision Open-World Website Fingerprinting. In IEEE S&P 2020."},{"key":"e_1_3_2_1_66_1","volume-title":"USENIX Security","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , Rob Johnson , and Ian Goldberg . 2014. Effective attacks and provable defenses for website fingerprinting . In USENIX Security 2014 . Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective attacks and provable defenses for website fingerprinting. In USENIX Security 2014."},{"key":"e_1_3_2_1_67_1","volume-title":"USENIX Security","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg . 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks . In USENIX Security 2017 . Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In USENIX Security 2017."},{"key":"e_1_3_2_1_68_1","volume-title":"ACM CCS","author":"Wang Xinyuan","year":"2003","unstructured":"Xinyuan Wang and Douglas\u00a0 S Reeves . 2003 . Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays . In ACM CCS 2023. Xinyuan Wang and Douglas\u00a0S Reeves. 2003. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In ACM CCS 2023."},{"key":"e_1_3_2_1_69_1","unstructured":"Zack Whittaker. 2022. Apple says Lockdown Mode in iOS 16 will help block government spyware attacks | TechCrunch. https:\/\/techcrunch.com\/2022\/07\/06\/apple-lockdown-mode\/. (Accessed on 04\/20\/2023).  Zack Whittaker. 2022. Apple says Lockdown Mode in iOS 16 will help block government spyware attacks | TechCrunch. https:\/\/techcrunch.com\/2022\/07\/06\/apple-lockdown-mode\/. (Accessed on 04\/20\/2023)."},{"key":"#cr-split#-e_1_3_2_1_70_1.1","doi-asserted-by":"crossref","unstructured":"Paul Wouters Hannes Tschofenig John\u00a0IETF Gilmore Samuel Weiler and Tero Kivinen. 2014. Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). RFC 7250. https:\/\/doi.org\/10.17487\/RFC7250 10.17487\/RFC7250","DOI":"10.17487\/rfc7250"},{"key":"#cr-split#-e_1_3_2_1_70_1.2","doi-asserted-by":"crossref","unstructured":"Paul Wouters Hannes Tschofenig John\u00a0IETF Gilmore Samuel Weiler and Tero Kivinen. 2014. Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). RFC 7250. https:\/\/doi.org\/10.17487\/RFC7250","DOI":"10.17487\/rfc7250"},{"key":"e_1_3_2_1_71_1","volume-title":"Feature Selection for Website Fingerprinting. In PETS","author":"Yan Junhua","year":"2018","unstructured":"Junhua Yan and Jasleen Kaur . 2018 . Feature Selection for Website Fingerprinting. In PETS 2018. Junhua Yan and Jasleen Kaur. 2018. Feature Selection for Website Fingerprinting. In PETS 2018."},{"key":"e_1_3_2_1_72_1","volume-title":"DSSS-based flow marking technique for invisible traceback","author":"Yu Wei","year":"2007","unstructured":"Wei Yu , Xinwen Fu , Steve Graham , Dong Xuan , and Wei Zhao . 2007. DSSS-based flow marking technique for invisible traceback . In IEEE S &P 2007 . Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, and Wei Zhao. 2007. DSSS-based flow marking technique for invisible traceback. In IEEE S&P 2007."},{"key":"e_1_3_2_1_73_1","volume-title":"ICN","author":"Zantout Bassam","year":"2011","unstructured":"Bassam Zantout , Ramzi Haraty , 2011 . I2P data communication system . In ICN 2011. Bassam Zantout, Ramzi Haraty, 2011. I2P data communication system. In ICN 2011."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595793","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3579856.3595793","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":76,"alternative-id":["10.1145\/3579856.3595793","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3595793","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}