Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks

02/18/2019
by   Mohammad Saidur Rahman, et al.
0

A passive local eavesdropper can leverage Website Fingerprinting (WF) to deanonymize the web browsing activity of Tor users. The importance of timing information to WF has often been discounted in prior work due to the volatility of low-level timing information. In this paper, we more carefully examine the extent to which packet timing can be used to facilitate WF attacks. We propose a new set of timing-related features based on burst-level characteristics as well as evaluate the effectiveness of raw timing information. To summarize our findings: (i) we achieve 84.32 timing features; (ii) using directional timing, we get 93.46 traffic, several points above the prior state-of-the-art; (iii) we get 68.90 accuracy against onion sites using only timing data, higher than using only directional data; and (iv) we get 0.98 precision and 0.92 recall on undefended Tor in the open-world setting using only raw timing. These findings indicate that developers of WF defenses need to consider timing as a potential fingerprint for sites and protect against its use by the attacker. Additionally, in our study of timing, we implemented a prototype of Walkie-Talkie (W-T) defense and collected a new W-T dataset, on which we get accuracy results above 90 defense of 50 Walkie-Talkie that still must be addressed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/23/2018

A Theory of Lazy Imperative Timing

We present a theory of lazy imperative timing....
research
02/28/2018

Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting

In recent years, there have been many works that use website fingerprint...
research
06/24/2018

The application of precision time protocol on EAST timing system

The timing system focuses on synchronizing and coordinating each subsyst...
research
04/01/2019

TG-PSM: Tunable Greedy Packet Sequence Morphing Based on Trace Clustering

Common privacy enhancing technologies fail to effectively hide certain s...
research
02/27/2023

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic

Website fingerprinting attack is an extensively studied technique used i...
research
11/24/2021

WFDefProxy: Modularly Implementing and Empirically Evaluating Website Fingerprinting Defenses

Tor, an onion-routing anonymity network, has been shown to be vulnerable...
research
07/09/2018

Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks

The timing characteristics of cache, a high-speed storage between the fa...

Please sign up or login with your details

Forgot password? Click here to reset