March 10, 2023, 2:10 a.m. | James K Holland, Jason Carpenter, Se Eun Oh, Nicholas Hopper

cs.CR updates on arXiv.org arxiv.org

While anonymity networks like Tor aim to protect the privacy of their users,
they are vulnerable to traffic analysis attacks such as Website Fingerprinting
(WF) and Flow Correlation (FC). Recent implementations of WF and FC attacks,
such as Tik-Tok and DeepCoFFEA, have shown that the attacks can be effectively
carried out, threatening user privacy. Consequently, there is a need for
effective traffic analysis defense.


There are a variety of existing defenses, but most are either ineffective,
incur high latency and …

adversarial aim analysis anonymity attacks correlation defense effectively fingerprinting flow networks padding privacy protect tor traffic traffic analysis user privacy vulnerable website

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Principal Security Engineer

@ Activision Blizzard | Work from Home - CA

Security Engineer- Systems Integration

@ Meta | Bellevue, WA | Menlo Park, CA | New York City

Lead Security Engineer (Digital Forensic and IR Analyst)

@ Blue Yonder | Hyderabad

Senior Principal IAM Engineering Program Manager Cybersecurity

@ Providence | Redmond, WA, United States

Information Security Analyst II or III

@ Entergy | The Woodlands, Texas, United States