1 code implementation • 18 Feb 2019 • Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright
To further investigate the value of timing information, we perform an information leakage analysis on our proposed handcrafted features.
Website Fingerprinting Attacks Cryptography and Security
1 code implementation • 18 Feb 2019 • Mohsen Imani, Mohammad Saidur Rahman, Nate Mathews, Matthew Wright
Since the attacker gets to design his classifier based on the defense design, we first demonstrate that at least one technique for generating adversarial-example based traces fails to protect against an attacker using adversarial training for robust classification.
Website Fingerprinting Defense Cryptography and Security