Website Fingerprinting Defenses at the Application Layer
Giovanni Cherubin1 Jamie Hayes2 Marc Juarez3
1Royal Holloway University of London 2University College London 3imec-COSIC KU Leuven
Website Fingerprinting Defenses at the Application Layer Giovanni - - PowerPoint PPT Presentation
Website Fingerprinting Defenses at the Application Layer Giovanni Cherubin 1 Jamie Hayes 2 Marc Juarez 3 1 Royal Holloway University of London 2 University College London 3 imec-COSIC KU Leuven 19th July 2017, PETS17, Minneapolis, MN, USA
1Royal Holloway University of London 2University College London 3imec-COSIC KU Leuven
2
Adversary Tor network User WWW Entry Middle Exit
3
xyz.onion User
4
5
Tor network Entry Middle Dummy Real User These are TCP packets or Tor messages
WF Defenses BuFLO Tamaraw CS-BuFLO WTF-PAD …
HTTP(S) Tor TCP ... TLS
Adversary
Web content
‘Latent‘ features: F1, …, Fn Observed features: O1, ..., On
Identifying info Last layer of encryption
T(·)
6
7
8
(two different solutions, not a client-server solution)
pad them to match a target page
e.g., comments in HTML/JS, images’ metadata, hidden styles
9
Original Morphed Target
securedrop.png index.html fake.css index.html facebook.png style.css
securedrop facebook
10 Padding
target
securedrop.png index.html fake.css index.html facebook.png style.css
securedrop facebook
Defines num objects and object sizes by:
11 Padding
Goal: randomize HTTP requests
12
13
14
15
16
17