t55wang@xxxxxxxxxxxxxxx: > I'd like to introduce two new works on website fingerprinting I've > written with my supervisor, Ian Goldberg. Thanks! I am looking forward to study your new work and hope we can include it into Tor Browser. > The first is titled ``On Realistically Attacking Tor with Website > Fingerprinting''. We talk about methods to allow website fingerprinting > to perform under realistically difficult scenarios. We have a tech > report here: > > http://cacr.uwaterloo.ca/techreports/2015/cacr2015-09.pdf On https://crysp.uwaterloo.ca/software/webfingerprint/ the link to this report just points to https://crysp.uwaterloo.ca/software/webfingerprint/ Georg > The second is titled ``Walkie-Talkie: An Effective and Efficient Defense > against Website Fingerprinting''. We propose a new website > fingerprinting defense that is practically efficient and provably > effective. We have a tech report here: > > http://cacr.uwaterloo.ca/techreports/2015/cacr2015-08.pdf > > Our code for both of those works are here: > > https://crysp.uwaterloo.ca/software/webfingerprint/ > > In the code we have an implementation of a website fingerprinting attack > that can take a long series of web page accesses (as one packet > sequence) as input, and output if it has recognized any page in the > sequence. We also have an implementation of half-duplex communication > for Tor Firefox as the core of Walkie-Talkie. > > Tao Wang > > > > _______________________________________________ > tor-dev mailing list > tor-dev@xxxxxxxxxxxxxxxxxxxx > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev >
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev