{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:33:35Z","timestamp":1755225215945,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["RS-2023-00222385"],"award-info":[{"award-number":["RS-2023-00222385"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3733914","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:33:18Z","timestamp":1755066798000},"page":"621-634","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Search Privacy on Tor: Advanced Deep Keyword Fingerprinting Attacks and BurstGuard Defense"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1346-3403","authenticated-orcid":false,"given":"Chaiwon","family":"Hwang","sequence":"first","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7019-9010","authenticated-orcid":false,"given":"Haeseung","family":"Jeon","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2010-8478","authenticated-orcid":false,"given":"Jiwoo","family":"Hong","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2392-7860","authenticated-orcid":false,"given":"Hosung","family":"Kang","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6186-7001","authenticated-orcid":false,"given":"Nate","family":"Mathews","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6967-152X","authenticated-orcid":false,"given":"Goun","family":"Kim","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7100-4613","authenticated-orcid":false,"given":"Se Eun","family":"Oh","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Michael Barbaro and Tom\u00a0Zeller Jr.2006. A Face Is Exposed for AOL Searcher No. 4417749. https:\/\/www.nytimes.com\/2006\/08\/09\/technology\/09aol.html. Accessed: 30-Jul-2024."},{"key":"e_1_3_3_1_3_2","unstructured":"Sanjit Bhat David Lu Albert Kwon and Srinivas Devadas. 2018. Var-CNN: A data-efficient website fingerprinting attack based on deep learning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1802.10215 (2018)."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_3_1_5_2","unstructured":"A. Chris. 2024. Top 10 search engines in the world. https:\/\/www.reliablesoft.net\/top-10-search-engines-in-the-world\/. Accessed: 30-Jul-2024."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423351"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_3_1_8_2","first-page":"717","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Gong Jiajun","year":"2020","unstructured":"Jiajun Gong and Tao Wang. 2020. Zero-delay lightweight defenses against website fingerprinting. In 29th USENIX Security Symposium (USENIX Security 20). 717\u2013734."},{"key":"e_1_3_3_1_9_2","volume-title":"k-fingerprinting: A Robust Scalable Website Fingerprinting Technique","author":"Hayes Jamie","unstructured":"Jamie Hayes and George Danezis. [n. d.]. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. https:\/\/doi.org\/jhayes14\/k-FP"},{"key":"e_1_3_3_1_10_2","first-page":"1187","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique. In 25th USENIX Security Symposium (USENIX Security 16). 1187\u20131203."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"S\u00e9bastien Henri Gines Garcia-Aviles Pablo Serrano Albert Banchs and Patrick Thiran. 2020. Protecting against Website Fingerprinting with Multihoming. Proceedings on Privacy Enhancing Technologies 2020 (2020) 89 \u2013 110.","DOI":"10.2478\/popets-2020-0019"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"e_1_3_3_1_15_2","volume-title":"Tor-Browser-Crawler","author":"Mathews Nate","unstructured":"Nate Mathews. [n. d.]. Tor-Browser-Crawler. https:\/\/doi.org\/notem\/tor-browser-crawler"},{"key":"e_1_3_3_1_16_2","volume-title":"Fingerprinting Keywords in Search Queries over Tor","author":"Oh Se\u00a0Eun","unstructured":"Se\u00a0Eun Oh, Shuai Li, and Nicholas Hopper. [n. d.]. Fingerprinting Keywords in Search Queries over Tor. https:\/\/doi.org\/KeywordFingerprinting\/KF"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Se\u00a0Eun Oh Shuai Li and Nicholas Hopper. 2017. Fingerprinting Keywords in Search Queries over Tor. Proc. Priv. Enhancing Technol. 2017 4 (2017) 251\u2013270.","DOI":"10.1515\/popets-2017-0048"},{"key":"e_1_3_3_1_18_2","volume-title":"Proc. of PETS","author":"Oh Se\u00a0Eun","year":"2019","unstructured":"Se\u00a0Eun Oh, S Sunkam, and N Hopper. 2019. p-fp: Extraction, classification, and predication of website fingerprints. In Proc. of PETS , Vol.\u00a019."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833801"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3603216.3624953"},{"key":"e_1_3_3_1_23_2","volume-title":"Tik-Tok: The utility of packet timing in website fingerprinting attacks","author":"Rahman Mohammad\u00a0Saidur","unstructured":"Mohammad\u00a0Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha\u00a0Girish Gangadhara, and Matthew Wright. [n. d.]. Tik-Tok: The utility of packet timing in website fingerprinting attacks. https:\/\/doi.org\/msrocean\/TikTok"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Mohammad\u00a0Saidur Rahman Payap Sirinam Nate Mathews Kantha\u00a0Girish Gangadhara and Matthew Wright. 2020. Tik-Tok: The utility of packet timing in website fingerprinting attacks. Proceedings on Privacy Enhancing Technologies 2020 3 (2020) 5\u201324.","DOI":"10.2478\/popets-2020-0043"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_3_1_26_2","first-page":"607","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Shen Meng","year":"2023","unstructured":"Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, and Ke Xu. 2023. Subverting website fingerprinting defenses with robust traffic representation. In 32nd USENIX Security Symposium (USENIX Security 23). 607\u2013624."},{"key":"e_1_3_3_1_27_2","unstructured":"Payap Sirinam Mohsen Imani Marc Juarez and Matthew Wright. [n. d.]. . https:\/\/doi.org\/deep-fingerprinting\/df"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"e_1_3_3_1_30_2","unstructured":"Keyword Tool. 2025. Keyword Tool: Online Keyword Analysis Tool. Retrieved Jan 21 2025 from https:\/\/keywordtool.io\/"},{"key":"e_1_3_3_1_31_2","first-page":"143","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang Tao","year":"2014","unstructured":"Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 143\u2013157."},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_3_1_33_2","volume-title":"Comparing website fingerprinting attacks and defenses","author":"Wang Tao","year":"2014","unstructured":"Tao Wang and Ian Goldberg. 2014. Comparing website fingerprinting attacks and defenses. Technical Report. Technical Report 2013-30, CACR, 2013."},{"key":"e_1_3_3_1_34_2","first-page":"1375","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An efficient defense against passive website fingerprinting attacks. In 26th USENIX Security Symposium (USENIX Security 17). 1375\u20131390."},{"key":"e_1_3_3_1_35_2","unstructured":"Junhua Yan Hasan\u00a0Faik Alan and Jasleen Kaur. 2020. Fingerprinting Search Keywords over HTTPS at Scale. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2008.08161 (2020)."}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3733914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:25:44Z","timestamp":1755069944000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3733914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":34,"alternative-id":["10.1145\/3708821.3733914","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3733914","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}