DYER K,COULL S,RISTENPART T,et al.Peeka-Boo,I still see you:why efficient traffic analysis countermeasures fail[C]//Proceedings of the 2012IEEE Symposium on Security and Privacy.Washington,D C:IEEE Computer Society,2012:332-346.DOI:10.1109/SP.2012.28.
[2]
CAI X,NITHYANAND R,WANG T,et al.A systematic approach to developing and evaluating website fingerprinting defenses[C]//Proceedings of the 21st ACM Conference on Computer and Communications Security.New York:ACM,2014:227-238.DOI:10.1145/2660267.2660362.
[3]
CAI X,ZHANG X C,JOSHI B,et al.Touching from a distance:website fingerprinting attacks and defenses[C]//ACM Conference on Computer and Communications Security.New York:ACM,2012:605-616.DOI:10.1145/2382196.2382260.
[4]
HERRMANN D,WENDOLSKY R,FEDERRATH H.Website Fingerprinting:attacking popular privacy enhancing technologies with the Multinomial Naivebayes classifier[C]//Proceedings of the 2009 ACM Workshop on Cloud Computing Security.New York:ACM,2009:31-42.DOI:10.1145/1655008.1655013.
[5]
LIBERATORE M,LEVINE B N.Inferring the source of encrypted HTTP connections[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New York:ACM,2006:255-263.DOI:10.1145/1180405.1180437.
[6]
WANG T,GOLDBERG I.On realistically attacking Tor with Website Fingerprinting[C]//Proceedings on Privacy Enhancing Technologies.Berlin:Spring-Verlag,2016:21-36.DOI:10.1515/popets-2016-0027.
PANCHENKO A,NIESSEN L,ZINNEN A,et al.Website fingerprinting in onion routing based anonymization networks[C]//Proceedings of the 10th ACM Workshop on Privacy in the Electronic Society.New York:ACM,2011:103-114.DOI:10.1145/2046556.2046570.
[9]
PERRY M.Experimental Defense for Website Traffic Fingerprinting[EB/OL].[2011-09-05].https://blog.torproject.org/blog/experimental-defense-website-traffic-fingerprinting.
[10]
JUAREZ M,AFROZ S,ACAR G,et al.A critical evaluation of website fingerprinting attacks[C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2014:263-274.DOI:10.1145/2660267.2660368.
[11]
GU X D,YANG M,LUO J Z.A novel Website Fingerprinting attack against multitab browsing behavior[J].IEEE International Conference on Computer Supported Cooperative Work in Design,2015,10(9):234-239.DOI:10.1109/CSCWD.2015.7230964.
[12]
LUO X P,ZHOU P,CHAN E W W,et al.HTTPOS:Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows[DB/OL].[2017-01-02].http://www.internetsociety.org/sites/default/files/luo.pdf.
[13]
WANG T,GOLDBERG I.Improved website fingerprinting on Tor[C]//Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society.New York:ACM,2013:201-212.DOI:10.1145/2517840.2517851.
[14]
WANG T,CAI X,NITHYANAND R,et al.Effective attacks and provable defenses for website fingerprinting[C]//Proceedings of the 23rd USENIX Security Symposium.Berkeley:USENIX,2014:143-157.
[15]
DINGLEDINE R,MATHEWSON N,SYVERSON P F.Tor:the second-generation onion router[C]//Proceedings of the 13th USENIX Security Symposium.Berkeley:USENIX,2004:303-320.DOI:10.1.1.4.6896.
[16]
HAYES J,DANEZIS G.k-Fingerprinting:A Robust Scalable Website Fingerprinting Technique[DB/OL].[2016-09-05].http://xueshu.baidu.com/s?wd=paperuri%3A%28239df3c4b43255ccac06affb54478bc1%29&filter=sc_long_sign&tn=SE_xueshusource_2kduw22v&sc_vurl=http%3A%2F%2Farxiv.org%2Fabs%2F1509.00789&ie=utf-8&sc_us=10844508426409760753.
[17]
PANCHENKO A,LANZE F,ZINNEN A,et al.Website Fingerprinting at Internet Scale[DB/OL].[2017-01-05].https://www.researchgate.net/publication/306097739_Website_Fingerprinting_at_Internet_Scale.DOI:10.14722/ndss.2016.23477.