{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:30:59Z","timestamp":1767094259877,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,1,6]]},"DOI":"10.1145\/3772290.3772291","type":"proceedings-article","created":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:24:18Z","timestamp":1767093858000},"page":"92-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Privacy in Tor: Message Mixing and Adaptive Padding with Opt-In Features"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8990-9571","authenticated-orcid":false,"given":"Anne","family":"Kunstmann","sequence":"first","affiliation":[{"name":"University of Hamburg, Hamburg, Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3852-5107","authenticated-orcid":false,"given":"Gabriel","family":"Bolonkowski","sequence":"additional","affiliation":[{"name":"University of Hamburg, Hamburg, Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9588-7096","authenticated-orcid":false,"given":"August","family":"See","sequence":"additional","affiliation":[{"name":"University of Hamburg, Hamburg, Hamburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2026,1,5]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155465"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Mohamad Amar Irsyad\u00a0Mohd Aminuddin Zarul\u00a0Fitri Zaaba Azman Samsudin Faiz Zaki and Nor\u00a0Badrul Anuar. 2023. The rise of website fingerprinting on Tor: Analysis on techniques and assumptions. Journal of Network and Computer Applications 212 (2023) 103582.","DOI":"10.1016\/j.jnca.2023.103582"},{"key":"e_1_3_3_1_4_2","volume-title":"Investigations in the so-called darknet: Law enforcement agencies undermine Tor anonymisation","author":"Bongen Robert","year":"2024","unstructured":"Robert Bongen and Daniel Mo\u00dfbrucker. 2024. Investigations in the so-called darknet: Law enforcement agencies undermine Tor anonymisation. Norddeutscher Rundfunk (NDR). https:\/\/www.ndr.de\/fernsehen\/sendungen\/panorama\/aktuell\/Investigations-in-the-so-called-darknet-Law-enforcement-agencies-undermine-Tor-anonymisation,toreng100.html"},{"key":"e_1_3_3_1_5_2","series-title":"(WPES \u201914)","first-page":"121","volume-title":"Proceedings of the 13th Workshop on Privacy in the Electronic Society","author":"Cai Xiang","year":"2014","unstructured":"Xiang Cai, Rishab Nithyanand, and Rob Johnson. 2014. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In Proceedings of the 13th Workshop on Privacy in the Electronic Society (Scottsdale, Arizona, USA) (WPES \u201914). Association for Computing Machinery, New York, NY, USA, 121\u2013130."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660362"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Giovanni Cherubin Jamie Hayes and Marc Ju\u00e1rez. 2017. Website fingerprinting defenses at the application layer. Proceedings on Privacy Enhancing Technologies 2017 2 (2017) 168\u2013185.","DOI":"10.1515\/popets-2017-0023"},{"key":"e_1_3_3_1_8_2","first-page":"753","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Cherubin Giovanni","year":"2022","unstructured":"Giovanni Cherubin, Rob Jansen, and Carmela Troncoso. 2022. Online website fingerprinting: Evaluating website fingerprinting attacks on tor in the real world. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, USA, 753\u2013770."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00011"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","first-page":"1971","DOI":"10.1145\/3372297.3423351","volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","author":"Cadena Wladimir De\u00a0la","year":"2020","unstructured":"Wladimir De\u00a0la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, and Andriy Panchenko. 2020. Trafficsliver: Fighting website fingerprinting attacks with traffic splitting. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, USA, 1971\u20131985."},{"key":"e_1_3_3_1_11_2","first-page":"184","volume-title":"International Symposium on Privacy Enhancing Technologies Symposium","author":"Diaz Claudia","year":"2010","unstructured":"Claudia Diaz, Steven\u00a0J. Murdoch, and Carmela Troncoso. 2010. Impact of network topology on anonymity and overhead in low-latency anonymity networks. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, Springer-Verlag, Berlin, Heidelberg, 184\u2013201."},{"key":"e_1_3_3_1_12_2","first-page":"1","volume-title":"Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006)","author":"Dingledine Roger","year":"2006","unstructured":"Roger Dingledine and Nick Mathewson. 2006. Anonymity Loves Company: Usability and the Network Effect. In Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006). Workshop on the Economics of Information Security, Cambridge, UK, 1\u201312."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_3_1_15_2","first-page":"717","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Gong Jiajun","year":"2020","unstructured":"Jiajun Gong and Tao Wang. 2020. Zero-delay Lightweight Defenses against Website Fingerprinting. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, USA, 717\u2013734."},{"key":"e_1_3_3_1_16_2","first-page":"1187","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 1187\u20131203."},{"key":"e_1_3_3_1_17_2","first-page":"195","volume-title":"2019 2nd International Conference on Data Intelligence and Security (ICDIS)","author":"He Yongzhong","year":"2019","unstructured":"Yongzhong He, Liping Hu, and Rui Gao. 2019. Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering. In 2019 2nd International Conference on Data Intelligence and Security (ICDIS). IEEE, South Padre Island, USA, 195\u2013200."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"S\u00e9bastien Henri Gines Garcia-Aviles Pablo Serrano Albert Banchs and Patrick Thiran. 2020. Protecting against website fingerprinting with multihoming. Proceedings on Privacy Enhancing Technologies 2020 2 (2020) 89\u2013110.","DOI":"10.2478\/popets-2020-0019"},{"key":"e_1_3_3_1_19_2","unstructured":"James\u00a0K. Holland and Nicholas Hopper. 2021. RegulaTor: A Straightforward Website Fingerprinting Defense. arxiv:https:\/\/arXiv.org\/abs\/2012.06609"},{"key":"e_1_3_3_1_20_2","first-page":"1","volume-title":"Proceedings of the 2012 Network and Distributed System Security Symposium (NDSS)","author":"Jansen Rob","year":"2012","unstructured":"Rob Jansen and Nicholas Hopper. 2012. Shadow: Running Tor in a box for accurate and efficient experimentation. In Proceedings of the 2012 Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, USA, 1\u201318."},{"key":"e_1_3_3_1_21_2","first-page":"3415","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Jansen Rob","year":"2021","unstructured":"Rob Jansen, Justin Tracey, and Ian Goldberg. 2021. Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Boston, USA, 3415\u20133432."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243815"},{"key":"e_1_3_3_1_23_2","series-title":"(CCS \u201913)","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1145\/2508859.2516651","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security","author":"Johnson Aaron","year":"2013","unstructured":"Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. 2013. Users get routed: traffic correlation on tor by realistic adversaries. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (Berlin, Germany) (CCS \u201913). Association for Computing Machinery, New York, NY, USA, 337\u2013348."},{"key":"e_1_3_3_1_24_2","first-page":"27","volume-title":"21st European Symposium on Research in Computer Security","author":"Juarez Marc","year":"2016","unstructured":"Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright. 2016. Toward an Efficient Website Fingerprinting Defense. In 21st European Symposium on Research in Computer Security. Springer, Cham, Heraklion, Greece, 27\u201346."},{"key":"e_1_3_3_1_25_2","first-page":"287","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Kwon Albert","year":"2015","unstructured":"Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas. 2015. Circuit fingerprinting attacks: Passive deanonymization of tor hidden services. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., USA, 287\u2013302."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-540-27809-2_25","volume-title":"Financial Cryptography: 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers 8","author":"Levine Brian\u00a0N.","year":"2004","unstructured":"Brian\u00a0N. Levine, Michael\u00a0K. Reiter, Chenxi Wang, and Matthew Wright. 2004. Timing attacks in low-latency mix systems. In Financial Cryptography: 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers 8. Springer, Willemstad, Cura\u00e7ao, 251\u2013265."},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268960"},{"key":"e_1_3_3_1_29_2","unstructured":"Kyle MacMillan Jordan Holland and Prateek Mittal. 2020. Evaluating Snowflake as an Indistinguishable Censorship Circumvention Tool. arxiv:https:\/\/arXiv.org\/abs\/2008.03254"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1145\/2665943.2665950","volume-title":"Proceedings of the 13th Workshop on Privacy in the Electronic Society","author":"Nithyanand Rishab","year":"2014","unstructured":"Rishab Nithyanand, Xiang Cai, and Rob Johnson. 2014. Glove: A bespoke website fingerprinting defense. In Proceedings of the 13th Workshop on Privacy in the Electronic Society. Association for Computing Machinery, Scottsdale, USA, 131\u2013134."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_3_1_32_2","first-page":"1199","volume-title":"26th usenix security symposium (usenix security 17)","author":"Piotrowska Ania\u00a0M.","year":"2017","unstructured":"Ania\u00a0M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The loopix anonymity system. In 26th usenix security symposium (usenix security 17). USENIX Association, Vancouver, BC, 1199\u20131216."},{"key":"e_1_3_3_1_33_2","volume-title":"Tor Metrics - Users","author":"Project The\u00a0Tor","year":"2024","unstructured":"The\u00a0Tor Project. 2024. Tor Metrics - Users. https:\/\/metrics.torproject.org\/userstats-relay-country.html?start=2024-01-06&end=2025-02-04&country=all&events=off"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/11863908_2","volume-title":"Computer Security\u2013ESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings 11","author":"Shmatikov Vitaly","year":"2006","unstructured":"Vitaly Shmatikov and Ming-Hsiu Wang. 2006. Timing analysis in low-latency mix networks: Attacks and defenses. In Computer Security\u2013ESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings 11. Springer, Hamburg, Germany, 18\u201333."},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2018.00482"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1007\/3-540-44702-4_6","volume-title":"Designing privacy enhancing technologies: International workshop on design issues in anonymity and Unobservability Berkeley, CA, USA, July 25\u201326, 2000 proceedings","author":"Syverson Paul","year":"2001","unstructured":"Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr. 2001. Towards an analysis of onion routing security. In Designing privacy enhancing technologies: International workshop on design issues in anonymity and Unobservability Berkeley, CA, USA, July 25\u201326, 2000 proceedings. Springer, Berkeley, USA, 96\u2013114."},{"key":"e_1_3_3_1_37_2","first-page":"143","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang Tao","year":"2014","unstructured":"Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 143\u2013157."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Tao Wang and Ian Goldberg. 2016. On realistically attacking Tor with website fingerprinting. Proceedings on Privacy Enhancing Technologies 2016 4 (2016) 21\u201336.","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_3_1_39_2","first-page":"1375","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An efficient defense against passive website fingerprinting attacks. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1375\u20131390."},{"key":"e_1_3_3_1_40_2","first-page":"1","volume-title":"NDSS","author":"Wright Charles\u00a0V.","year":"2009","unstructured":"Charles\u00a0V. Wright, Scott\u00a0E. Coull, and Fabian Monrose. 2009. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. In NDSS , Vol.\u00a09. Internet Society, San Diego, USA, 1\u201314."},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"crossref","unstructured":"Matthew\u00a0K. Wright Micah Adler Brian\u00a0Neil Levine and Clay Shields. 2004. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Transactions on Information and System Security (TISSEC) 7 4 (2004) 489\u2013522.","DOI":"10.1145\/1042031.1042032"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-031-46677-9_8","volume-title":"International Conference on Advanced Data Mining and Applications","author":"Yang Zhenyu","year":"2023","unstructured":"Zhenyu Yang, Xi Xiao, Bin Zhang, Guangwu Hu, Qing Li, and Qixu Liu. 2023. AAP: defending against website fingerprinting through burst obfuscation. In International Conference on Advanced Data Mining and Applications. Springer, Shenyang, China, 107\u2013121."}],"event":{"name":"ICDCN 2026: 27th International Conference on Distributed Computing and Networking","acronym":"ICDCN 2026","location":"Nara Japan"},"container-title":["Proceedings of the 27th International Conference on Distributed Computing and Networking"],"original-title":[],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:25:12Z","timestamp":1767093912000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772290.3772291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,5]]},"references-count":41,"alternative-id":["10.1145\/3772290.3772291","10.1145\/3772290"],"URL":"https:\/\/doi.org\/10.1145\/3772290.3772291","relation":{},"subject":[],"published":{"date-parts":[[2026,1,5]]},"assertion":[{"value":"2026-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}