Table 5 from HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows | Semantic Scholar (2024)

Figures and Tables from this paper

  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
  • table 3
  • table 4
  • figure 4
  • table 5
  • figure 5
  • table 6
  • figure 6
  • table 7
  • figure 7
  • table 8
  • figure 8
  • figure 9
  • figure 10
  • figure 11
  • figure 12

Topics

Hypertext Transfer Protocol (opens in a new tab)State-of-the-art Attacks (opens in a new tab)Information Leak (opens in a new tab)Traffic Analysis (opens in a new tab)HTTP Flow (opens in a new tab)

169 Citations

Quantitative information flow of side-channel leakages in web applications

A new approach based on verification and quantitative information flow is proposed to perform a fully automated analysis of side-channel leakages in web applications and is implemented into a tool, called SideAuto, which targets at the Apache Struts web.

Path Leaks of HTTPS Side-Channel by Cookie Injection
    Fuqing ChenHaixin DuanXiaofeng ZhengJian JiangJianjun Chen

    Computer Science

    COSADE

  • 2018

A new side-channel attack against HTTPS (HTTP over TLS) by exploiting cookie injection is presented, able to reveal the full path of unknown URLs visited by the victim, exploiting cookie-path matching vulnerabilities in Internet Explorer, Edge, Safari, etc.

  • 4
Analysis and Mitigation of Information Leaks in Web Browsing Traffic

    Computer Science

  • 2012

A novel framework for reasoning about information leakage in web traffic is developed, and principles for countermeasure composition which strengthens security are designed, as well as the utilization of structural properties of web applications to design countermeasures which provide strong security guarantees.

  • PDF
Measuring the Impact of HTTP / 2 and Server Push on Web Fingerprinting
    Weiran LinS. ReddyN. Borisov

    Computer Science

  • 2019

This paper created web page models of top Alexa sites that captured the dependency structure of the resources on the site, and evaluated their susceptibility to state-of-the-art web fingerprinting attacks, showing that HTTP/2 presents a smaller fingerprinting surface for an adversary than HTTP/1.1.

  • 4
  • PDF
Encrypted DNS -> Privacy? A Traffic Analysis Perspective
    S. SibyMarc JuárezClaudia DíazNarseo Vallina-RodriguezC. Troncoso

    Computer Science

    NDSS

  • 2020

This paper examines whether encrypting DNS traffic can protect users from traffic analysis-based monitoring and censoring and shows that Tor -- which does not effectively mitigate traffic analysis attacks on web traffic -- is a good defense against DoH traffic analysis.

Breaking Web Applications Built On Top of Encrypted Data
    Paul GrubbsR. McPhersonMuhammad NaveedThomas RistenpartVitaly Shmatikov

    Computer Science

    CCS

  • 2016

The results show that the problem of securing client-server applications against actively malicious servers is challenging and still unsolved and general lessons for the designers of systems that rely on property-preserving or searchable encryption to protect data from untrusted servers are concluded.

  • 91
  • PDF
Identifying Website Users by TLS Traffic Analysis: New Attacks and Effective Countermeasures
    A. PirontiPierre-Yves StrubK. Bhargavan

    Computer Science

  • 2012

This work proposes a novel length-hiding scheme that leverages standard TLS padding to enforce website-specific privacy policies and proposes the first countermeasure that is standards-based, provably secure, and experimentally effective, yet pragmatic.

  • 19
Analyzing HTTPS encrypted traffic to identify user's operating system, browser and application
    Jonathan MuehlsteinYehonatan Zion Ofir Pele

    Computer Science

    2017 14th IEEE Annual Consumer Communications…

  • 2017

It is shown that an external attacker can identify the operating system, browser and application of HTTP encrypted traffic (HTTPS) to the best of the knowledge, this is the first work that shows this.

Request and Conquer: Exposing Cross-Origin Resource Size
    Tom van GoethemM. VanhoefFrank PiessensW. Joosen

    Computer Science

    USENIX Security Symposium

  • 2016

This in-depth analysis finds several design flaws in the storage mechanisms of browsers, which allows an adversary to expose the exact size of any resource in mere seconds, and reports on a novel size-exposing technique against Wi-Fi networks.

  • 32
  • PDF
QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework
    Jean-Pierre SmithL. DolfiPrateek MittalA. Perrig

    Computer Science

    USENIX Security Symposium

  • 2022

The QCSD framework is designed and implemented, which leverages QUIC and HTTP/3 to emulate existing website-fingerprinting defences by bidirectionally adding cover traf fic and reshaping connections solely from the client, and demonstrates the promise of this approach in shaping connections towards client-orchestrated defences.

  • 10
  • PDF

...

...

Privacy Vulnerabilities in Encrypted HTTP Streams
    G. BissiasM. LiberatoreDavid D. JensenB. Levine

    Computer Science

    Privacy Enhancing Technologies

  • 2005

A straightforward traffic analysis attack against encrypted HTTP streams that is surprisingly effective in identifying the source of the traffic and proposes some countermeasures and improvements.

  • 255
  • Highly Influential
  • PDF
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
    Shuo ChenRui WangXiaofeng WangKehuan Zhang

    Computer Science

    2010 IEEE Symposium on Security and Privacy

  • 2010

It is found that surprisingly detailed sensitive information is being leaked out from a number of high-profile, top-of-the-line web applications in healthcare, taxation, investment and web search, suggesting the scope of the problem seems industry-wide.

  • 427
  • Highly Influential
  • PDF
Traffic Analysis of the HTTP Protocol over TLS
    G. Danezis

    Computer Science

It is shown how much information an attacker can infer about single requests and submissions knowing only their length, and a Hidden Markov Model is presented that analyzes sequences of requests and finds the most plausible resources accessed.

  • 56
  • PDF
Web tap: detecting covert web traffic
    Kevin BordersA. Prakash

    Computer Science

    CCS '04

  • 2004

The design of Web Tap is presented, results from its evaluation, as well as potential limits to Web Tap's capabilities are presented.

  • 148
  • PDF
Sidebuster: automated detection and quantification of side-channel leaks in web application development
    Kehuan ZhangZhou LiRui WangXiaofeng WangShuo Chen

    Computer Science

    CCS '10

  • 2010

A suite of new techniques for automatic detection and quantification of side-channel leaks in web applications, called Sidebuster, which can automatically analyze an application's source code to detect its side channels and then perform a rerun test to assess the amount of information disclosed through such channels.

  • 67
  • PDF
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis
    C. V. WrightScott E. CoullF. Monrose

    Computer Science

    NDSS

  • 2009

This paper proposes a novel method for thwarting statistical traffic analysis algorithms by optimally morphing one class of traffic to look like another class, and shows how to optimally modify packets in real-time to reduce the accuracy of a variety of traffic classifiers while incurring much less overhead than padding.

  • 335
  • PDF
Inferring the source of encrypted HTTP connections
    M. LiberatoreB. Levine

    Computer Science

    CCS '06

  • 2006

This work examines the effectiveness of two traffic analysis techniques, based upon classification algorithms, for identifying encrypted HTTP streams, and gives evidence that these techniques will exhibit the scalability necessary to be effective on the Internet.

  • 418
  • Highly Influential
  • PDF
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
    Dominik HerrmannRolf WendolskyH. Federrath

    Computer Science

    CCSW '09

  • 2009

A novel method that applies common text mining techniques to the normalised frequency distribution of observable IP packet sizes and outperforms previously known methods like Jaccard's classifier and Naïve Bayes that neglect packet frequencies altogether or rely on absolute frequency values.

  • 425
  • PDF
Quantifying Information Leaks in Outbound Web Traffic Kevin Borders
    A. Prakash

    Computer Science

  • 2009

This paper presents measurement algorithms for the Hypertext Transfer Protocol (HTTP), the main protocol for web browsing, that were able to discount 98.5% of measured bytes and effectively isolate information leaks.

  • 63
  • PDF
Statistical identification of encrypted Web browsing traffic
    Qixiang SunDaniel R. SimonYi-Min WangW. RussellV. PadmanabhanL. Qiu

    Computer Science

    Proceedings 2002 IEEE Symposium on Security and…

  • 2002

This work investigates the identifiability of World Wide Web traffic based on this unconcealed information in a large sample of Web pages, and shows that it suffices to identify a significant fraction of them quite reliably.

  • 431

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    Table 5 from HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows | Semantic Scholar (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Ray Christiansen

    Last Updated:

    Views: 5954

    Rating: 4.9 / 5 (69 voted)

    Reviews: 84% of readers found this page helpful

    Author information

    Name: Ray Christiansen

    Birthday: 1998-05-04

    Address: Apt. 814 34339 Sauer Islands, Hirtheville, GA 02446-8771

    Phone: +337636892828

    Job: Lead Hospitality Designer

    Hobby: Urban exploration, Tai chi, Lockpicking, Fashion, Gunsmithing, Pottery, Geocaching

    Introduction: My name is Ray Christiansen, I am a fair, good, cute, gentle, vast, glamorous, excited person who loves writing and wants to share my knowledge and understanding with you.