Paper links:

P. Dodia, M. Al Sabah, O. Alrawi, T. Wang. Tor-based Malware Detection using Traffic Analysis (to be uploaded). CCS 2022.

J. Gong, W. Zhang, C. Zhang, T. Wang. Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense. IEEE S&P 2022.

T. Wang. The One-Page Setting: A Higher Standard for Evaluating Website Fingerprinting Defenses. CCS 2021.

J. Gong and T. Wang. Zero-Delay Defenses for Website Fingerprinting. USENIX 2020.

T. Wang. High Precision Open-World Website Fingerprinting. IEEE S&P 2020.

T. Wang. Designing a Better Browser for Tor with BLAST. NDSS 2020.

T. Wang and I. Goldberg. Walkie-Talkie: An Effective and Efficient Defense for Website Fingerprinting. USENIX 2017.

T. Wang and I. Goldberg. On Realistically Attacking Tor with Website Fingerprinting DL. PETS 2016.

X. Cai, R. Nithyanand, T. Wang, R. Johnson and I. Goldberg. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. CCS 2014.

T. Wang, X. Cai, R. Nithyanand, R. Johnson and I. Goldberg. Effective Attacks and Provable Defenses for Website Fingerprinting. USENIX 2014.

T. Wang and I. Goldberg. Improved Website Fingerprinting on Tor. WPES 2013.


Website Fingerprinting

When browsing the web, many users would prefer to have privacy. Clients who wish to avoid behavorial marketing, tracking and surveillance could use an anonymizing proxy service such as Tor. Tor, however, is susceptible to website fingerprinting, wherein a local, passive adversary (such as your ISP or those who have access to your ISP's data) can identify a user's behavior according to patterns in their packet sequences.

Download

You may need to do some editing to get some defenses to work with different data sets (for example, changing the folder names in the code). Please feel free to e-mail taowang@sfu.ca for any questions.

Repository of implemented attacks (ZIP). Includes notes to explain the attacks. Note that some are based on other authors' works.

Repository of implemented defenses (ZIP). Includes notes to explain the defenses. Note that some are based on other authors' works.

Repository of data. Includes notes to explain the data. Most files are large.

ZIP containing code for the PETS 2016 work. 900MB.


WPES 2013

This work presents an improved version of Cai's OSAD attack, along with some of the first open-world results in the field. It shows that relatively simple changes to the algorithm can greatly reduce the error rate. Results: In attacks/Wa-OSAD.py, which needs (from the same folder) Ca-OSAD.py, clLev.cpp, clgen_stratify.cpp, loaders.py. Uses data/levdata*.zip.

USENIX 2014

This work presents a new attack based on a k-nearest neighbours algorithm with optimized distances learned using a custom local hill-climbing algorithm. It has a greatly improved accuracy and lower FPR compared to previous attacks. It is also significantly faster. It also presents a defense, Supersequence. Results: In attacks/kNN.py, which needs fextractor.py, flearner.cpp. Supersequence is in defenses/cluster.py (warning: not updated, may not work well with new code). Uses data/knndata.zip.

CCS 2014

This work hypothesizes the minimum overhead of an effective defense against all website fingerprinting attacks, and implements Tamaraw as a proof of concept. Results: In defenses/tamaraw.py.

PETS 2016

This work resolves several issues with realistic website fingerprinting, and proposes new methods to tackle these issues, including noise, splitting, and training set maintenance. Results: In realpublish.zip.

USENIX 2017

This work proposes Walkie-Talkie, an effective defense against all website fingerprinting attacks, with low overhead achieved from applying half-duplex mode on browser page loading. There are several ways to use these results: