{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:26:40Z","timestamp":1734154000375,"version":"3.30.2"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","funder":[{"name":"the National Natural Science Foundation of China","award":["62162060"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623107","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T17:35:13Z","timestamp":1700588113000},"page":"1050-1064","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Transformer-based Model for Multi-tab Website Fingerprinting Attack"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1799-2761","authenticated-orcid":false,"given":"Zhaoxin","family":"Jin","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications & Ministry of Education, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2882-6037","authenticated-orcid":false,"given":"Tianbo","family":"Lu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications & Ministry of Education, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9605-004X","authenticated-orcid":false,"given":"Shuang","family":"Luo","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications & Ministry of Education, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4659-1649","authenticated-orcid":false,"given":"Jiaze","family":"Shang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications & Ministry of Education, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES 2011","author":"Andriy Panchenko Andreas Zinnen","year":"2011","unstructured":"Andreas Zinnen Andriy Panchenko, Lukas Niessen. 2011. Fingerprinting Websites Using Traffic Analysis. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES 2011, Chicago, IL, USA, October 17, 2011. ACM, 103--114."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_3_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Ashish Vaswani Niki Parmar","year":"2017","unstructured":"Niki Parmar Ashish Vaswani, Noam Shazeer. 2017. Attention is All You Need. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA. 5998--6008."},{"key":"e_1_3_2_1_4_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Cherubin Giovanni","year":"2022","unstructured":"Giovanni Cherubin, Rob Jansen, and Carmela Troncoso. 2022. Online website fingerprinting: Evaluating website fingerprinting attacks on Tor in the real world. In 31st USENIX Security Symposium (USENIX Security 22). 753--770."},{"key":"e_1_3_2_1_5_1","volume-title":"2013 IEEE\/WIC\/ACM International Conferences on Web Intelligence, WI 2013","author":"Hauswirth Manfred","year":"2013","unstructured":"Manfred Hauswirth Christian von der Weth. 2013. DOBBS: Towards a Comprehensive Dataset to Study the Browsing Behavior of Online Users. In 2013 IEEE\/WIC\/ACM International Conferences on Web Intelligence, WI 2013, Atlanta, GA, USA, November 17-20, 2013. IEEE Computer Society, 51--56."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583200"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0125"},{"key":"e_1_3_2_1_8_1","volume-title":"Real-Time Object Detection. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016","author":"Ross","year":"2016","unstructured":"Ross B. Girshick Joseph Redmon, Santosh Kumar Divvala. 2016. You Only Look Once: Unified, Real-Time Object Detection. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016. IEEE Computer Society, 779--788."},{"key":"e_1_3_2_1_9_1","volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016","author":"Kaiming He Shaoqing Ren","year":"2016","unstructured":"Shaoqing Ren Kaiming He, Xiangyu Zhang. 2016. Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016. IEEE Computer Society, 770--778."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179289"},{"key":"e_1_3_2_1_12_1","volume-title":"End-to-End Object Detection with Transformers. In ECCV 2020 - 16th European Conference, Glasgow, UK, August 23-28, 2020, Proceedings, Part I. Springer, 213--229","author":"Nicolas Carion Gabriel Synnaeve","year":"2020","unstructured":"Gabriel Synnaeve Nicolas Carion, Francisco Massa. 2020. End-to-End Object Detection with Transformers. In ECCV 2020 - 16th European Conference, Glasgow, UK, August 23-28, 2020, Proceedings, Part I. Springer, 213--229."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0029"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0013"},{"key":"e_1_3_2_1_17_1","volume-title":"An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Qu Jian","year":"2023","unstructured":"Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, and Xiaohong Guan. 2023. An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 589--606. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/qu"},{"key":"e_1_3_2_1_18_1","volume-title":"Second International Workshop, PET 2002","author":"Paul","year":"2002","unstructured":"Paul F. Syverson Roger Dingledine. 2002. Fingerprinting Websites Using Traffic Analysis. In Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers. Springer, 171--178."},{"key":"e_1_3_2_1_19_1","volume-title":"Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium","author":"Paul","year":"2004","unstructured":"Paul F. Syverson Roger Dingledine, Nick Mathewson. 2004. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA. USENIX, 303--320."},{"key":"e_1_3_2_1_20_1","volume-title":"Kantha Girish Gangadhara, and Matthew Wright","author":"Rahman Mohammad Saidur","year":"2019","unstructured":"Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, and Matthew Wright. 2019. Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. arXiv e-prints (2019), arXiv--1902."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. Priv. Enhancing Technol.","author":"Sanjit Bhat Albert Kwon","year":"2019","unstructured":"Albert Kwon Sanjit Bhat, David Lu. 2019. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. Proc. Priv. Enhancing Technol. (2019), 292--310."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0019"},{"key":"e_1_3_2_1_23_1","volume-title":"Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. In Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015","author":"Ross","year":"2015","unstructured":"Ross B. Girshick Shaoqing Ren, Kaiming He. 2015. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. In Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada. 91--99."},{"key":"e_1_3_2_1_24_1","volume-title":"Subverting Website Fingerprinting Defenses with Robust Traffic Representation. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Shen Meng","year":"2023","unstructured":"Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, and Ke Xu. 2023. Subverting Website Fingerprinting Defenses with Robust Traffic Representation. In 32nd USENIX Security Symposium (USENIX Security 23). 607--624."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. Priv. Enhancing Technol. 21--36","author":"Tao Wang Ian Goldberg","year":"2016","unstructured":"Ian Goldberg Tao Wang. 2016. On Realistically Attacking Tor with Website Fingerprinting. In Proc. Priv. Enhancing Technol. 21--36."},{"key":"e_1_3_2_1_27_1","volume-title":"Walkie-Talkie: An Efficient Defense Against PassiveWebsite Fingerprinting Attacks. In 26th USENIX Security Symposium, USENIX Security 2017","author":"Tao Wang Ian Goldberg","year":"2017","unstructured":"Ian Goldberg Tao Wang. 2017. Walkie-Talkie: An Efficient Defense Against PassiveWebsite Fingerprinting Attacks. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. USENIX Association, 1375--1390."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Tao Wang Rishab Nithyanand","year":"2014","unstructured":"Rishab Nithyanand Tao Wang, Xiang Cai. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. USENIX, 143--157."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Alexander Veicht Cedric Renggli and Diogo Barradas. 2022. DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses.","DOI":"10.56553\/popets-2023-0047"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0074"},{"key":"e_1_3_2_1_32_1","volume-title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Victor Le Pochat Samaneh Tajalizadehkhoob","year":"2019","unstructured":"Samaneh Tajalizadehkhoob Victor Le Pochat, Tom van Goethem. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Tao Wang. 2020. Designing a Better Browser for Tor with BLAST.. In NDSS.","DOI":"10.14722\/ndss.2020.24199"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00015"},{"key":"e_1_3_2_1_35_1","volume-title":"The One-Page Setting: A Higher Standard for EvaluatingWebsite Fingerprinting Defenses. In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea","author":"Wang Tao","year":"2021","unstructured":"Tao Wang. 2021. The One-Page Setting: A Higher Standard for EvaluatingWebsite Fingerprinting Defenses. In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15-19, 2021. ACM, 2794--2806."},{"key":"e_1_3_2_1_36_1","volume-title":"More Realistic Website Fingerprinting Using Deep Learning. In 40th IEEE International Conference on Distributed Computing Systems, ICDCS 2020","author":"Chan-Tin Weiqi Eric","year":"2020","unstructured":"Eric Chan-Tin Weiqi Cui, Tao Chen. 2020. More Realistic Website Fingerprinting Using Deep Learning. In 40th IEEE International Conference on Distributed Computing Systems, ICDCS 2020, Singapore, November 29 - December 1, 2020. IEEE, 333--343."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563207"},{"key":"e_1_3_2_1_38_1","volume-title":"TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","author":"De la Cadena Jens Hiller","year":"2020","unstructured":"Jens Hiller Wladimir De la Cadena, Asya Mitseva. 2020. TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting. In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020. ACM, 1971--1985."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158086"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3104869"},{"key":"e_1_3_2_1_41_1","volume-title":"2021 IEEE\/CVF International Conference on Computer Vision, ICCV 2021","author":"Ze Liu Yue Cao","year":"2021","unstructured":"Yue Cao Ze Liu, Yutong Lin. 2021. Swin Transformer: Hierarchical Vision Transformer using Shifted Windows. In 2021 IEEE\/CVF International Conference on Computer Vision, ICCV 2021, Montreal, QC, Canada, October 10-17, 2021. IEEE, 9992--10002."},{"key":"e_1_3_2_1_42_1","volume-title":"BAPM: Block Attention Profiling Model for Multi-tabWebsite Fingerprinting Attacks on Tor. In ACSAC '21: Annual Computer Security Applications Conference","author":"Zhong Guan Gaopeng Gou","year":"2021","unstructured":"Gaopeng Gou Zhong Guan, Gang Xiong. 2021. BAPM: Block Attention Profiling Model for Multi-tabWebsite Fingerprinting Attacks on Tor. In ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6-10, 2021. ACM, 248--259."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T18:34:39Z","timestamp":1734114879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":42,"alternative-id":["10.1145\/3576915.3623107","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623107","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}