|go to week of Apr 28, 2013||28||29||30||1||2||3||4|
|go to week of May 5, 2013||5||6||7||8||9||10||11|
|go to week of May 12, 2013||12||13||14||15||16||17||18|
|go to week of May 19, 2013||19||20||21||22||23||24||25|
|go to week of May 26, 2013||26||27||28||29||30||31||1|
This talk will present a novel web page fingerprinting attack that is able to defeat several recently proposed defenses against traffic analysis attacks, including Tor, traffic morphing, HTTPOS, and randomized pipelining over Tor. Regardless of the defense scheme, the attack was able to guess which of 100 web pages a victim was visiting at least 50% of the time and, with some defenses, over 90% of the time. The attack is based on a simple model of network behavior and outperforms previously proposed ad hoc attacks. I will then describe a web site fingerprinting attack that is able to identify whether a victim is visiting a particular web site with over 90% accuracy in our experiments.
These results strongly suggest that ad hoc defenses against traffic analysis are not likely to succeed. I will cover ongoing work to develop a defense that is practical, efficient, and provably secure.
Rob Johnson is an Assistant Professor at Stony Brook University and conducts research in Software Security, System Security, Usable Security, and Cryptography. Rob is director of the Security, Privacy, And Theory (SPLAT) lab at Stony Brook, the Cryptography Lab at the New York Center for Excellence in Wireless and Information Technology (CEWIT), and the Smart Grid Cyber-security Testing Lab of the New York Advanced Energy Research and Technology Center (AERTC). He graduated from UC Berkeley in 2006, where he studied with David Wagner.