{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:27:28Z","timestamp":1773325648771,"version":"3.50.1"},"reference-count":62,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"2","license":[{"start":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T00:00:00Z","timestamp":1646265600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In recent years, we have seen rapid growth in the use and adoption of Internet of Things (IoT) devices. However, some loT devices are sensitive in nature, and simply knowing what devices a user owns can have security and privacy implications. Researchers have, therefore, looked at fingerprinting loT devices and their activities from encrypted network traffic. In this paper, we analyze the feasibility of fingerprinting IoT devices and evaluate the robustness of such fingerprinting approach across multiple independent datasets \u2014 collected under different settings. We show that not only is it possible to effectively fingerprint 188 loT devices (with over 97% accuracy), but also to do so even with multiple instances of the same make-and-model device. We also analyze the extent to which temporal, spatial and data-collection-methodology differences impact fingerprinting accuracy. Our analysis sheds light on features that are more robust against varying conditions. Lastly, we comprehensively analyze the performance of our approach under an open-world setting and propose ways in which an adversary can enhance their odds of inferring additional information about unseen devices (e.g., similar devices manufactured by the same company).<\/jats:p>","DOI":"10.2478\/popets-2022-0057","type":"journal-article","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T04:26:57Z","timestamp":1646454417000},"page":"578-600","source":"Crossref","is-referenced-by-count":19,"title":["Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices"],"prefix":"10.56553","volume":"2022","author":[{"given":"Dilawer","family":"Ahmed","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Anupam","family":"Das","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Fareed","family":"Zaffar","sequence":"additional","affiliation":[{"name":"Lahore University of Management Sciences (LUMS)"}]}],"member":"35752","published-online":{"date-parts":[[2022,3,3]]},"reference":[{"key":"2022060209294133279_j_popets-2022-0057_ref_001","unstructured":"[1] Smarthomedb. https:\/\/www.smarthomedb.com\/. Accessed: 2021-12-02."},{"key":"2022060209294133279_j_popets-2022-0057_ref_002","unstructured":"[2] OpenWrt Project, 2020. https:\/\/openwrt.org\/."},{"key":"2022060209294133279_j_popets-2022-0057_ref_003","unstructured":"[3] A. Acar, H. Fereidooni, T. Abera, A. K. Sikder, M. Miettinen, H. Aksu, M. Conti, A. Sadeghi, and A. S. Uluagac. Peek-a-boo: I see your smart home activities, even encrypted! CoRR, abs\/1808.02741, 2018."},{"key":"2022060209294133279_j_popets-2022-0057_ref_004","doi-asserted-by":"crossref","unstructured":"[4] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. G\u00fcrses, F. Piessens, and B. Preneel. Fpdetective: dusting the web for fingerprinters. In Proceedings of the 20th ACM SIGSAC conference on Computer and Communications Security (CCS), pages 1129\u20131140, 2013.10.1145\/2508859.2516674","DOI":"10.1145\/2508859.2516674"},{"key":"2022060209294133279_j_popets-2022-0057_ref_005","doi-asserted-by":"crossref","unstructured":"[5] O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose. Sok: Security evaluation of home-based IoT deployments. In Proceedings of the 40th IEEE Symposium on Security and Privacy (SP), pages 1362\u20131380, 2019.10.1109\/SP.2019.00013","DOI":"10.1109\/SP.2019.00013"},{"key":"2022060209294133279_j_popets-2022-0057_ref_006","doi-asserted-by":"crossref","unstructured":"[6] B. Anderson and D. McGrew. Identifying encrypted malware traffic with contextual flow data. In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security (AISec), pages 35\u201346, 2016.10.1145\/2996758.2996768","DOI":"10.1145\/2996758.2996768"},{"key":"2022060209294133279_j_popets-2022-0057_ref_007","doi-asserted-by":"crossref","unstructured":"[7] N. Apthorpe, D. Y. Huang, D. Reisman, A. Narayanan, and N. Feamster. Keeping the smart home private with smart(er) IoT traffic shaping. Proceedings on Privacy Enhancing Technologies, 2019(3):128\u2013148, 2019.10.2478\/popets-2019-0040","DOI":"10.2478\/popets-2019-0040"},{"key":"2022060209294133279_j_popets-2022-0057_ref_008","unstructured":"[8] N. Apthorpe, D. Reisman, and N. Feamster. A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. CoRR, abs\/1705.06805, 2017."},{"key":"2022060209294133279_j_popets-2022-0057_ref_009","unstructured":"[9] N. Apthorpe, D. Reisman, S. Sundaresan, A. Narayanan, and N. Feamster. Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic. CoRR, abs\/1708.05044, 2017."},{"key":"2022060209294133279_j_popets-2022-0057_ref_010","doi-asserted-by":"crossref","unstructured":"[10] G. D. Bissias, M. Liberatore, D. Jensen, and B. N. Levine. Privacy vulnerabilities in encrypted http streams. In Proceedings of the 5th International Conference on Privacy Enhancing Technologies (PETS), pages 1\u201311, 2005.10.1007\/11767831_1","DOI":"10.1007\/11767831_1"},{"key":"2022060209294133279_j_popets-2022-0057_ref_011","doi-asserted-by":"crossref","unstructured":"[11] X. Cai, X. C. Zhang, B. Joshi, and R. Johnson. Touching from a distance: Website fingerprinting attacks and defenses. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), pages 605\u2013616, 2012.10.1145\/2382196.2382260","DOI":"10.1145\/2382196.2382260"},{"key":"2022060209294133279_j_popets-2022-0057_ref_012","doi-asserted-by":"crossref","unstructured":"[12] S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Proceedings of the 31st IEEE Symposium on Security and Privacy (SP), pages 191\u2013206, 2010.10.1109\/SP.2010.20","DOI":"10.1109\/SP.2010.20"},{"key":"2022060209294133279_j_popets-2022-0057_ref_013","doi-asserted-by":"crossref","unstructured":"[13] M. Conti, L. V. Mancini, R. Spolaor, and N. V. Verde. Can\u2019t you hear me knocking: Identification of user actions on android apps via traffic analysis. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY), pages 297\u2013304, 2015.10.1145\/2699026.2699119","DOI":"10.1145\/2699026.2699119"},{"key":"2022060209294133279_j_popets-2022-0057_ref_014","doi-asserted-by":"crossref","unstructured":"[14] B. Copos, K. Levitt, M. Bishop, and J. Rowe. Is anybody home? inferring activity from smart home network traffic. In IEEE Security and Privacy Workshops (SPW), pages 245\u2013251. IEEE, 2016.10.1109\/SPW.2016.48","DOI":"10.1109\/SPW.2016.48"},{"key":"2022060209294133279_j_popets-2022-0057_ref_015","doi-asserted-by":"crossref","unstructured":"[15] S. Dai, A. Tongaonkar, X. Wang, A. Nucci, and D. Song. Networkprofiler: Towards automatic fingerprinting of android apps. In Proceedings of the 32nd IEEE INFOCOM, pages 809\u2013817, 2013.10.1109\/INFCOM.2013.6566868","DOI":"10.1109\/INFCOM.2013.6566868"},{"key":"2022060209294133279_j_popets-2022-0057_ref_016","doi-asserted-by":"crossref","unstructured":"[16] A. Das, N. Borisov, and E. Chou. Every move you make: Exploring practical issues in smartphone motion sensor fingerprinting and countermeasures. Proceedings on Privacy Enhancing Technologies, 2018(1):88\u2013108, 2018.","DOI":"10.1515\/popets-2018-0005"},{"key":"2022060209294133279_j_popets-2022-0057_ref_017","doi-asserted-by":"crossref","unstructured":"[17] L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In Proceedings of the 1st ACM conference on Wireless Network Security, pages 46\u201355, 2008.10.1145\/1352533.1352542","DOI":"10.1145\/1352533.1352542"},{"key":"2022060209294133279_j_popets-2022-0057_ref_018","doi-asserted-by":"crossref","unstructured":"[18] K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (SP), pages 332\u2013346. IEEE, 2012.10.1109\/SP.2012.28","DOI":"10.1109\/SP.2012.28"},{"key":"2022060209294133279_j_popets-2022-0057_ref_019","unstructured":"[19] J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive data link layer 802.11 wireless device driver fingerprinting. In Proceedings of the 15th Conference on USENIX Security Symposium (USENIX Security), volume 3, pages 16\u201389, 2006."},{"key":"2022060209294133279_j_popets-2022-0057_ref_020","unstructured":"[20] I. Guyon and A. Elisseeff. An introduction to variable and feature selection. The Journal of Machine Learning Research, 3:1157\u20131182, Mar. 2003."},{"key":"2022060209294133279_j_popets-2022-0057_ref_021","unstructured":"[21] J. Hayes and G. Danezis. k-fingerprinting: A robust scalable website fingerprinting technique. In Proceedings of the 25th USENIX Security Symposium (USENIX Security), pages 1187\u20131203, 2016."},{"key":"2022060209294133279_j_popets-2022-0057_ref_022","doi-asserted-by":"crossref","unstructured":"[22] D. Herrmann, R. Wendolsky, and H. Federrath. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na\u00efve-bayes classifier. In Proceedings of the 2009 ACM workshop on Cloud Computing Security, pages 31\u201342, 2009.10.1145\/1655008.1655013","DOI":"10.1145\/1655008.1655013"},{"key":"2022060209294133279_j_popets-2022-0057_ref_023","doi-asserted-by":"crossref","unstructured":"[23] Y. Jin, E. Sharafuddin, and Z.-L. Zhang. Unveiling core network-wide communication patterns through application traffic activity graph decomposition. In Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), pages 49\u201360, 2009.10.1145\/2492101.1555356","DOI":"10.1145\/1555349.1555356"},{"key":"2022060209294133279_j_popets-2022-0057_ref_024","doi-asserted-by":"crossref","unstructured":"[24] M. Juarez, S. Afroz, G. Acar, C. Diaz, and R. Greenstadt. A critical evaluation of website fingerprinting attacks. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), page 263\u2013274, 2014.10.1145\/2660267.2660368","DOI":"10.1145\/2660267.2660368"},{"key":"2022060209294133279_j_popets-2022-0057_ref_025","doi-asserted-by":"crossref","unstructured":"[25] T. Karagiannis, K. Papagiannaki, and M. Faloutsos. Blinc: Multilevel traffic classification in the dark. In Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), page 229\u2013240, 2005.10.1145\/1090191.1080119","DOI":"10.1145\/1090191.1080119"},{"key":"2022060209294133279_j_popets-2022-0057_ref_026","doi-asserted-by":"crossref","unstructured":"[26] T. Kohno, A. Broido, and K. C. Claffy. Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing, 2(2):93\u2013108, 2005.10.1109\/TDSC.2005.26","DOI":"10.1109\/TDSC.2005.26"},{"key":"2022060209294133279_j_popets-2022-0057_ref_027","doi-asserted-by":"crossref","unstructured":"[27] Z. Li, W. Xu, R. Miller, and W. Trappe. Securing wireless systems via lower layer enforcements. In Proceedings of the 5th ACM workshop on Wireless Security (WiSec), pages 33\u201342, 2006.10.1145\/1161289.1161297","DOI":"10.1145\/1161289.1161297"},{"key":"2022060209294133279_j_popets-2022-0057_ref_028","doi-asserted-by":"crossref","unstructured":"[28] M. Liberatore and B. N. Levine. Inferring the source of encrypted http connections. In Proceedings of the 13th ACM conference on Computer and Communications Security (CCS), pages 255\u2013263, 2006.10.1145\/1180405.1180437","DOI":"10.1145\/1180405.1180437"},{"key":"2022060209294133279_j_popets-2022-0057_ref_029","doi-asserted-by":"crossref","unstructured":"[29] L. Lu, E.-C. Chang, and M. C. Chan. Website fingerprinting and identification using ordered feature sequences. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), pages 199\u2013214, 2010.10.1007\/978-3-642-15497-3_13","DOI":"10.1007\/978-3-642-15497-3_13"},{"key":"2022060209294133279_j_popets-2022-0057_ref_030","unstructured":"[30] L. v. d. Maaten and G. Hinton. Visualizing data using t-sne. Journal of machine learning research, 9(Nov):2579\u20132605, 2008."},{"key":"2022060209294133279_j_popets-2022-0057_ref_031","doi-asserted-by":"crossref","unstructured":"[31] S. Marchal, M. Miettinen, T. D. Nguyen, A. Sadeghi, and N. Asokan. Audi: Toward autonomous IoT device-type identification using periodic communication. IEEE Journal on Selected Areas in Communications, 37(6):1402\u20131412, 2019.","DOI":"10.1109\/JSAC.2019.2904364"},{"key":"2022060209294133279_j_popets-2022-0057_ref_032","doi-asserted-by":"crossref","unstructured":"[32] M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. Sadeghi, and S. Tarkoma. IoT SENTINEL: Automated device-type identification for security enforcement in iot. In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), pages 2177\u20132184, 2017.10.1109\/ICDCS.2017.283","DOI":"10.1109\/ICDCS.2017.283"},{"key":"2022060209294133279_j_popets-2022-0057_ref_033","doi-asserted-by":"crossref","unstructured":"[33] S. B. Moon, P. Skelly, and D. Towsley. Estimation and removal of clock skew from network delay measurements. In Proceedings of the 18th IEEE Conference on Computer Communications (INFOCOM), volume 1, pages 227\u2013234, 1999.","DOI":"10.1109\/INFCOM.1999.749287"},{"key":"2022060209294133279_j_popets-2022-0057_ref_034","doi-asserted-by":"crossref","unstructured":"[34] N. T. Nguyen, G. Zheng, Z. Han, and R. Zheng. Device fingerprinting to enhance wireless security using nonparametric bayesian method. In Proceedings of the 30th IEEE INFOCOM, pages 1404\u20131412. IEEE, 2011.10.1109\/INFCOM.2011.5934926","DOI":"10.1109\/INFCOM.2011.5934926"},{"key":"2022060209294133279_j_popets-2022-0057_ref_035","doi-asserted-by":"crossref","unstructured":"[35] T. T. T. Nguyen and G. Armitage. A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys Tutorials, 10(4):56\u201376, 2008.10.1109\/SURV.2008.080406","DOI":"10.1109\/SURV.2008.080406"},{"key":"2022060209294133279_j_popets-2022-0057_ref_036","doi-asserted-by":"crossref","unstructured":"[36] T. OConnor, R. Mohamed, M. Miettinen, W. Enck, B. Reaves, and A.-R. Sadeghi. Homesnitch: behavior transparency and control for smart home IoT devices. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), pages 128\u2013138, 2019.10.1145\/3317549.3323409","DOI":"10.1145\/3317549.3323409"},{"key":"2022060209294133279_j_popets-2022-0057_ref_037","doi-asserted-by":"crossref","unstructured":"[37] A. Panchenko, F. Lanze, J. Pennekamp, T. Engel, A. Zinnen, M. Henze, and K. Wehrle. Website fingerprinting at internet scale. In Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS), 2016.10.14722\/ndss.2016.23477","DOI":"10.14722\/ndss.2016.23477"},{"key":"2022060209294133279_j_popets-2022-0057_ref_038","doi-asserted-by":"crossref","unstructured":"[38] A. Panchenko, L. Niessen, A. Zinnen, and T. Engel. Website fingerprinting in onion routing based anonymization networks. In Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society (WPES), pages 103\u2013114, 2011.10.1145\/2046556.2046570","DOI":"10.1145\/2046556.2046570"},{"key":"2022060209294133279_j_popets-2022-0057_ref_039","doi-asserted-by":"crossref","unstructured":"[39] J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom), pages 99\u2013110, 2007.10.1145\/1287853.1287866","DOI":"10.1145\/1287853.1287866"},{"key":"2022060209294133279_j_popets-2022-0057_ref_040","unstructured":"[40] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825\u20132830, 2011."},{"key":"2022060209294133279_j_popets-2022-0057_ref_041","unstructured":"[41] R. Perdisci, W. Lee, and N. Feamster. Behavioral clustering of http-based malware and signature generation using malicious network traces. In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (NSDI), page 26, 2010."},{"key":"2022060209294133279_j_popets-2022-0057_ref_042","doi-asserted-by":"crossref","unstructured":"[42] R. Perdisci, T. Papastergiou, O. Alrawi, and M. Antonakakis. Iotfinder: Efficient large-scale identification of iot devices via passive dns traffic analysis. In Proceedings of the 5th IEEE European Symposium on Security and Privacy (EuroS&P), 2020.10.1109\/EuroSP48549.2020.00037","DOI":"10.1109\/EuroSP48549.2020.00037"},{"key":"2022060209294133279_j_popets-2022-0057_ref_043","doi-asserted-by":"crossref","unstructured":"[43] A. Reed and M. Kranch. Identifying https-protected netflix videos in real-time. In Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy, pages 361\u2013368, 2017.10.1145\/3029806.3029821","DOI":"10.1145\/3029806.3029821"},{"key":"2022060209294133279_j_popets-2022-0057_ref_044","doi-asserted-by":"crossref","unstructured":"[44] J. Ren, D. J. Dubois, D. Choffnes, A. M. Mandalari, R. Kolcun, and H. Haddadi. Information exposure from consumer IoT devices: A multidimensional, network-informed measurement approach. In Proceedings of the 19th Internet Measurement Conference (IMC), pages 267\u2013279, 2019.10.1145\/3355369.3355577","DOI":"10.1145\/3355369.3355577"},{"key":"2022060209294133279_j_popets-2022-0057_ref_045","doi-asserted-by":"crossref","unstructured":"[45] S. J. Saidi, A. M. Mandalari, R. Kolcun, D. J. D. Hamed Haddadi, D. Choffnes, G. Smaragdakis, and A. Feldmann. A haystack full of needles: Scalable detection of IoT devices in the wild. In Proceedings of the 20th Internet Measurement Conference (IMC), 2020.10.1145\/3419394.3423650","DOI":"10.1145\/3419394.3423650"},{"key":"2022060209294133279_j_popets-2022-0057_ref_046","unstructured":"[46] B. Saltaformaggio, H. Choi, K. Johnson, Y. Kwon, Q. Zhang, X. Zhang, D. Xu, and J. Qian. Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In Proceedings of the 10th USENIX Conference on Offensive Technologies (WOOT), pages 69\u201378, 2016."},{"key":"2022060209294133279_j_popets-2022-0057_ref_047","unstructured":"[47] T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, T. Kohno, et al. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In Proceedings of the 16th USENIX Security Symposium (USENIX Security), pages 55\u201370, 2007."},{"key":"2022060209294133279_j_popets-2022-0057_ref_048","doi-asserted-by":"crossref","unstructured":"[48] A. Sivanathan, H. H. Gharakheili, F. Loi, A. Radford, C. Wijenayake, A. Vishwanath, and V. Sivaraman. Classifying IoT devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing, 18(8):1745\u20131759, 2018.10.1109\/TMC.2018.2866249","DOI":"10.1109\/TMC.2018.2866249"},{"key":"2022060209294133279_j_popets-2022-0057_ref_049","doi-asserted-by":"crossref","unstructured":"[49] A. Sivanathan, D. Sherratt, H. H. Gharakheili, A. Radford, C. Wijenayake, A. Vishwanath, and V. Sivaraman. Characterizing and classifying IoT traffic in smart cities and campuses. In IEEE Conference on Computer Communications Workshops, pages 559\u2013564, 2017.10.1109\/INFCOMW.2017.8116438","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"2022060209294133279_j_popets-2022-0057_ref_050","doi-asserted-by":"crossref","unstructured":"[50] R. Sommer and V. Paxson. Outside the closed world: On using machine learning for network intrusion detection. In Proceedings of the 30th IEEE Symposium on Security and Privacy (SP), pages 305\u2013316, 2010.10.1109\/SP.2010.25","DOI":"10.1109\/SP.2010.25"},{"key":"2022060209294133279_j_popets-2022-0057_ref_051","unstructured":"[51] D. Song. Timing analysis of keystrokes and ssh timing attacks. In Proceedings of the 10th USENIX Security Symposium (USENIX Security), 2001."},{"key":"2022060209294133279_j_popets-2022-0057_ref_052","unstructured":"[52] Q. Sun, D. R. Simon, Y.-M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical identification of encrypted web browsing traffic. In Proceedings of the 23rd IEEE Symposium on Security and Privacy, pages 19\u201330, 2002."},{"key":"2022060209294133279_j_popets-2022-0057_ref_053","doi-asserted-by":"crossref","unstructured":"[53] V. F. Taylor, R. Spolaor, M. Conti, and I. Martinovic. Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic. In Proceedings of the 1st IEEE European Symposium on Security and Privacy (EuroS&P), pages 439\u2013454, 2016.10.1109\/EuroSP.2016.40","DOI":"10.1109\/EuroSP.2016.40"},{"key":"2022060209294133279_j_popets-2022-0057_ref_054","doi-asserted-by":"crossref","unstructured":"[54] R. Trimananda, J. Varmarken, A. Markopoulou, and B. Demsky. Packet-level signatures for smart home devices. In Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS), 2020.10.14722\/ndss.2020.24097","DOI":"10.14722\/ndss.2020.24097"},{"key":"2022060209294133279_j_popets-2022-0057_ref_055","doi-asserted-by":"crossref","unstructured":"[55] T. van Ede, R. Bortolameotti, A. Continella, J. Ren, D. J. Dubois, M. Lindorfer, D. Choffness, M. van Steen, and A. Peter. FlowPrint: Semi-Supervised Mobile-App Finger-printing on Encrypted Network Traffic. In Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS), 2020.10.14722\/ndss.2020.24412","DOI":"10.14722\/ndss.2020.24412"},{"key":"2022060209294133279_j_popets-2022-0057_ref_056","unstructured":"[56] T. Wang, X, Cai, R. Nithyanand, R. Johnson, and I. Goldberg. Effective attacks and provable defenses for website fingerprinting. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), pages 143\u2013157, 2014."},{"key":"2022060209294133279_j_popets-2022-0057_ref_057","doi-asserted-by":"crossref","unstructured":"[57] C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. Uncovering spoken phrases in encrypted voice over ip conversations. ACM Transactions on Information and System Security (TISSEC), 13(4):1\u201330, 201010.1145\/1880022.1880029","DOI":"10.1145\/1880022.1880029"},{"key":"2022060209294133279_j_popets-2022-0057_ref_058","unstructured":"[58] C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson. Language identification of encrypted VOIP traffic: Alejandra y roberto or alice and bob? In Proceedings of the 16th USENIX Security Symposium (USENIX Security), volume 3, pages 43\u201354, 2007."},{"key":"2022060209294133279_j_popets-2022-0057_ref_059","unstructured":"[59] C. V. Wright, S. E. Coull, and F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), 2009."},{"key":"2022060209294133279_j_popets-2022-0057_ref_060","doi-asserted-by":"crossref","unstructured":"[60] J. Yan and J. Kaur. Feature selection for website fingerprinting. Proceedings on Privacy Enhancing Technologies (PETS), 2018(4):200\u2013219, 2018.10.1515\/popets-2018-0039","DOI":"10.1515\/popets-2018-0039"},{"key":"2022060209294133279_j_popets-2022-0057_ref_061","unstructured":"[61] Y. Yang and J. O. Pederson. A comparative study on feature selection in text categorization. In Proceedings of the 14th International Conference on Machine Learning (ICML), pages 412\u2013420, 1997."},{"key":"2022060209294133279_j_popets-2022-0057_ref_062","doi-asserted-by":"crossref","unstructured":"[62] W. Zhang, Y. Meng. Y. Liu, X. Zhang, and H. Zhu. Homonit: Monitoring smart home apps from encrypted traffic. In Proceedings of the 25th ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 1074\u20131088, 2018.10.1145\/3243734.3243820","DOI":"10.1145\/3243734.3243820"}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2022-0057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T20:21:09Z","timestamp":1726777269000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2022\/popets-2022-0057.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,3]]},"references-count":62,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,3,3]]},"published-print":{"date-parts":[[2022,4,1]]}},"alternative-id":["10.2478\/popets-2022-0057"],"URL":"https:\/\/doi.org\/10.2478\/popets-2022-0057","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,3]]}}}