Abstract
I present a traffic analysis based vulnerability in Safe Web, an encrypting web proxy. This vulnerability allows someone monitoring the traffic of a Safe Web user to determine if the user is visiting certain websites. I also describe a successful implementation of the attack. Finally, I discuss methods for improving the attack and for defending against the attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bruce Schneier, Applied Cryptography (New York: Wiley and Sons, 1996) 219.
David Martin and Andrew Schulman, Deanonymizing Users of the Safe Web Anonymizing Service, Technical Report 2002-003, Boston University Computer Science Department, February 2002. To appear in Proceedings of the 11th USENIX Security Symposium, August 2002.
New PRC Internet Regulation http://www.usembassy-china.org.cn/english/sandt/netreg.htm
Steve Friess, ”China Re-Blocks News Sites,” Wired News http://www.wired.com/news/politics/0,1283,47121,00.html
SafeWeb PrivaSec Alliance Press Release, August 14, 2001, http://safeweb.com/prprivasec.html
D. Song, D. Wagner, and X. Tian, Timing Analysis of Keystrokes and SSH Timing Attacks (10th USENIX Security Symposium, 2001) 2–3.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hintz, A. (2003). Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P. (eds) Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science, vol 2482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36467-6_13
Download citation
DOI: https://doi.org/10.1007/3-540-36467-6_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00565-0
Online ISBN: 978-3-540-36467-2
eBook Packages: Springer Book Archive