Measuring Information Leakage in Website Fingerprinting Attacks and Defenses
Association for Computing Machinery (ACM) via YouTube
Overview
Explore the intricacies of Website Fingerprinting (WF) attacks and defenses in this 25-minute conference talk from the Association for Computing Machinery (ACM). Delve into the vulnerabilities of Tor's low-latency anonymous network access and understand how information leakage can be exploited by adversaries. Learn about the WeftD framework, adaptive kernel density estimation, and the Kononex algorithm for measuring information leakage. Examine clustering techniques, feature selection, and the challenges of open-world scenarios. Analyze accuracy metrics, mutual information, and entropy in the context of WF attacks. Gain insights into the limitations of current defenses and explore potential improvements for enhancing user privacy in anonymous communication networks.
Syllabus
Intro
Limitations
Website Fingerprinting
WeftD Overview
Challenges
Adaptive Kernel Density Estimation
Kononex Algorithm
Clustering
Features
Aggregate
OpenWorld
Accuracy
Mutual Information
Information Leakage
entropy
Taught by
Association for Computing Machinery (ACM)