ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2102.08332
  4. Cited By
Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based
  Website Fingerprinting
v1v2 (latest)

Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting

16 February 2021
Nguyen Phong Hoang
Arian Akhavan Niaki
Phillipa Gill
M. Polychronakis
ArXiv (abs)PDFHTML

Papers citing "Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting"

24 / 24 papers shown
Title
How Great is the Great Firewall? Measuring China's DNS Censorship
How Great is the Great Firewall? Measuring China's DNS Censorship
Nguyen Phong Hoang
Arian Akhavan Niaki
Jakub Dalek
Jeffrey Knockel
Pellaeon Lin
Bill Marczak
Masashi Crete-Nishihata
Phillipa Gill
M. Polychronakis
107
59
0
03 Jun 2021
Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS
Oblivious DNS over HTTPS (ODoH): A Practical Privacy Enhancement to DNS
S. Singanamalla
Suphanat Chunhapanya
Marek Vavrusa
Tanya Verma
Peter Wu
Marwan M. Fayed
Kurtis Heimerl
N. Sullivan
Christopher A. Wood
28
32
0
19 Nov 2020
The Web is Still Small After More Than a Decade
The Web is Still Small After More Than a Decade
Nguyen Phong Hoang
Arian Akhavan Niaki
M. Polychronakis
Phillipa Gill
37
19
0
09 Apr 2020
K-resolver: Towards Decentralizing Encrypted DNS Resolution
K-resolver: Towards Decentralizing Encrypted DNS Resolution
Nguyen Phong Hoang
Ivan Lin
Seyedhamed Ghavamnia
M. Polychronakis
38
23
0
24 Jan 2020
Assessing the Privacy Benefits of Domain Name Encryption
Assessing the Privacy Benefits of Domain Name Encryption
Nguyen Phong Hoang
Arian Akhavan Niaki
Nikita Borisov
Phillipa Gill
M. Polychronakis
43
25
0
01 Nov 2019
Filter List Generation for Underserved Regions
Filter List Generation for Underserved Regions
Alexander Sjösten
Peter Snyder
Antonio Pastor
P. Papadopoulos
B. Livshits
58
33
0
16 Oct 2019
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
Arian Akhavan Niaki
Shinyoung Cho
Zachary Weinberg
Nguyen Phong Hoang
Abbas Razaghpanah
Nicolas Christin
Phillipa Gill
34
86
0
09 Jul 2019
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS
Jonas Bushart
C. Rossow
41
54
0
02 Jul 2019
Encrypted DNS --> Privacy? A Traffic Analysis Perspective
Encrypted DNS --> Privacy? A Traffic Analysis Perspective
S. Siby
Marc Juárez
Claudia Díaz
Narseo Vallina-Rodriguez
Carmela Troncoso
44
106
0
24 Jun 2019
Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep
  Learning
Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning
Z. Din
P. Tigas
Samuel T. King
B. Livshits
VLM
147
29
0
17 May 2019
Mockingbird: Defending Against Deep-Learning-Based Website
  Fingerprinting Attacks with Adversarial Traces
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces
Mohammad Saidur Rahman
Mohsen Imani
Nate Mathews
M. Wright
AAML
46
81
0
18 Feb 2019
The Chain of Implicit Trust: An Analysis of the Web Third-party
  Resources Loading
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading
Muhammad Ikram
Rahat Masood
Gareth Tyson
M. Kâafar
Noha Loizon
Roya Ensafi
LRM
60
53
0
23 Jan 2019
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
Milad Nasr
Alireza Bahramali
Amir Houmansadr
AAML
46
154
0
22 Aug 2018
Tranco: A Research-Oriented Top Sites Ranking Hardened Against
  Manipulation
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation
Victor Le Pochat
Tom van Goethem
Samaneh Tajalizadehkhoob
Maciej Korczyński
Wouter Joosen
60
654
0
04 Jun 2018
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking
Umar Iqbal
Peter Snyder
Shitong Zhu
B. Livshits
Zhiyun Qian
Zubair Shafiq
128
30
0
22 May 2018
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with
  Deep Learning
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Payap Sirinam
Mohsen Imani
Marc Juárez
M. Wright
91
462
0
07 Jan 2018
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Panagiotis Kintis
N. Miramirkhani
Chaz Lever
Yizheng Chen
Rosa Romero Gómez
Nikolaos Pitropakis
Nick Nikiforakis
M. Antonakakis
44
151
0
28 Aug 2017
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor
  Onion Services
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services
R. Overdorf
Marc Juárez
Gunes Acar
Rachel Greenstadt
Claudia Díaz
28
65
0
28 Aug 2017
The Effect of DNS on Tor's Anonymity
The Effect of DNS on Tor's Anonymity
Benjamin Greschbach
T. Pulls
Laura M. Roberts
Philipp Winter
Nick Feamster
AAML
18
47
0
26 Sep 2016
Your Neighbors Are My Spies: Location and other Privacy Concerns in
  Dating Apps
Your Neighbors Are My Spies: Location and other Privacy Concerns in Dating Apps
Nguyen Phong Hoang
Yasuhito Asano
Masatoshi Yoshikawa
25
16
0
20 Apr 2016
Your Neighbors Are My Spies: Location and other Privacy Concerns in
  GLBT-focused Location-based Dating Applications
Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications
Nguyen Phong Hoang
Yasuhito Asano
Masatoshi Yoshikawa
29
25
0
20 Apr 2016
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
Jamie Hayes
G. Danezis
53
386
0
02 Sep 2015
I Know Why You Went to the Clinic: Risks and Realization of HTTPS
  Traffic Analysis
I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis
Brad Miller
Ling Huang
A. Joseph
J. D. Tygar
54
126
0
03 Mar 2014
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow
  Records alone
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone
Nino Vincenzo Verde
G. Ateniese
E. Gabrielli
L. Mancini
A. Spognardi
56
48
0
09 Feb 2014
1