{"id":"https://openalex.org/W2034297286","doi":"https://doi.org/10.1145/2076732.2076760","title":"Exposing invisible timing-based traffic watermarks with BACKLIT","display_name":"Exposing invisible timing-based traffic watermarks with BACKLIT","publication_year":2011,"publication_date":"2011-12-05","ids":{"openalex":"https://openalex.org/W2034297286","doi":"https://doi.org/10.1145/2076732.2076760","mag":"2034297286"},"language":"en","primary_location":{"id":"doi:10.1145/2076732.2076760","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2076732.2076760","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["The Hong Kong Polytechnic University","The Hong Kong Polytechnic University#TAB#"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"The Hong Kong Polytechnic University#TAB#","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076945936","display_name":"Peng Zhou","orcid":"https://orcid.org/0000-0002-7020-0943"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Peng Zhou","raw_affiliation_strings":["The Hong Kong Polytechnic University","The Hong Kong Polytechnic University#TAB#"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"The Hong Kong Polytechnic University#TAB#","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100343044","display_name":"Junjie Zhang","orcid":"https://orcid.org/0000-0002-0033-0494"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junjie Zhang","raw_affiliation_strings":["Georgia Institute of Technology","[Georgia Institute of Technology.]"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"[Georgia Institute of Technology.]","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071832270","display_name":"Roberto Perdisci","orcid":"https://orcid.org/0000-0002-7339-0041"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Roberto Perdisci","raw_affiliation_strings":["University of Georgia","University of Georgia,"],"affiliations":[{"raw_affiliation_string":"University of Georgia","institution_ids":[]},{"raw_affiliation_string":"University of Georgia,","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047140382","display_name":"Wenke Lee","orcid":"https://orcid.org/0000-0003-2761-1277"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenke Lee","raw_affiliation_strings":["Georgia Institute of Technology","[Georgia Institute of Technology.]"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"[Georgia Institute of Technology.]","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006486786","display_name":"Rocky K. C. Chang","orcid":"https://orcid.org/0000-0002-2648-5814"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Rocky K. C. Chang","raw_affiliation_strings":["The Hong Kong Polytechnic University","The Hong Kong Polytechnic University#TAB#"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"The Hong Kong Polytechnic University#TAB#","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100400376"],"corresponding_institution_ids":["https://openalex.org/I14243506"],"apc_list":null,"apc_paid":null,"fwci":7.6964,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.97184803,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"197","last_page":"206"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7366530299186707},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7200629115104675},{"id":"https://openalex.org/keywords/backlight","display_name":"Backlight","score":0.6654954552650452},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5058145523071289},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4816681146621704},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3624899685382843},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3430861532688141},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.237809419631958},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.11829376220703125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7366530299186707},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7200629115104675},{"id":"https://openalex.org/C171107226","wikidata":"https://www.wikidata.org/wiki/Q574291","display_name":"Backlight","level":3,"score":0.6654954552650452},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5058145523071289},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4816681146621704},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3624899685382843},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3430861532688141},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.237809419631958},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.11829376220703125},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C128019096","wikidata":"https://www.wikidata.org/wiki/Q83341","display_name":"Liquid-crystal display","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2076732.2076760","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2076732.2076760","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:corescholar.libraries.wright.edu:cse-1004","is_oa":false,"landing_page_url":"https://corescholar.libraries.wright.edu/cse/5","pdf_url":null,"source":{"id":"https://openalex.org/S2737205702","display_name":"Journal of Bioresource Management","issn_l":"2309-3854","issn":["2309-3854"],"is_oa":false,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310316536","host_organization_name":"Bioresource Research Center (BRC), Islamabad","host_organization_lineage":["https://openalex.org/P4310316536"],"host_organization_lineage_names":["Bioresource Research Center (BRC), Islamabad"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science and Engineering Faculty Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3943877786","display_name":null,"funder_award_id":"831300","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G406685602","display_name":null,"funder_award_id":"FA8750-08-2-0141","funder_id":"https://openalex.org/F4320306110","funder_display_name":"U.S. Department of Homeland Security"},{"id":"https://openalex.org/G6152010099","display_name":null,"funder_award_id":"N000140710907N000140911042","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G8313302142","display_name":null,"funder_award_id":"G-U386","funder_id":"https://openalex.org/F4320322598","funder_display_name":"Hong Kong Polytechnic University"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"},{"id":"https://openalex.org/F4320322598","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W84267113","https://openalex.org/W127688506","https://openalex.org/W187122915","https://openalex.org/W1518813109","https://openalex.org/W1528476405","https://openalex.org/W1567366855","https://openalex.org/W1572284822","https://openalex.org/W1579427489","https://openalex.org/W1595191049","https://openalex.org/W1627919342","https://openalex.org/W1655958391","https://openalex.org/W1970121628","https://openalex.org/W2022062661","https://openalex.org/W2043681328","https://openalex.org/W2058143565","https://openalex.org/W2078318318","https://openalex.org/W2097905005","https://openalex.org/W2101583963","https://openalex.org/W2122272157","https://openalex.org/W2127264212","https://openalex.org/W2127797529","https://openalex.org/W2128945468","https://openalex.org/W2130200004","https://openalex.org/W2135570031","https://openalex.org/W2137776827","https://openalex.org/W2137803891","https://openalex.org/W2139978474","https://openalex.org/W2146148058","https://openalex.org/W2151114655","https://openalex.org/W2162275200","https://openalex.org/W2169991041","https://openalex.org/W2399169235","https://openalex.org/W6605166902","https://openalex.org/W6636440945","https://openalex.org/W6680602496"],"related_works":["https://openalex.org/W2386995878","https://openalex.org/W2363818791","https://openalex.org/W2388155101","https://openalex.org/W2361811722","https://openalex.org/W2379855919","https://openalex.org/W2375374240","https://openalex.org/W245389424","https://openalex.org/W2116279801","https://openalex.org/W2392411212","https://openalex.org/W2217182457"],"abstract_inverted_index":{"Traffic":[0],"watermarking":[1,27,58],"is":[2,76],"an":[3,146],"important":[4],"element":[5],"in":[6,92,125,145],"many":[7],"network":[8,173],"security":[9],"and":[10,19,36,62,117,128,141,178],"privacy":[11],"applications,":[12],"such":[13],"as":[14],"tracing":[15],"botnet":[16],"C&C":[17],"communications":[18],"deanonymizing":[20],"peer-to-peer":[21],"VoIP":[22],"calls.":[23],"The":[24,165],"state-of-the-art":[25,111],"traffic":[26,86,112],"schemes":[28,59],"are":[29,38,64,106],"usually":[30],"based":[31],"on":[32,138],"packet":[33],"timing":[34,95],"information":[35],"they":[37],"notoriously":[39],"difficult":[40],"to":[41,79,156],"detect.":[42],"In":[43],"this":[44],"paper,":[45],"we":[46],"show":[47,167],"for":[48,108,114],"the":[49,54,80,93,162],"first":[50],"time":[51],"that":[52,82,105,168],"even":[53],"most":[55],"sophisticated":[56],"timing-based":[57,85],"(e.g.,":[60,131],"RAINBOW":[61],"SWIRL)":[63],"not":[65,136],"invisible":[66],"by":[67],"proposing":[68],"a":[69],"new":[70],"detection":[71,159],"system":[72],"called":[73],"BACKLIT.":[74],"BACKLIT":[75,120,169],"designed":[77],"according":[78],"observation":[81],"any":[83],"practical":[84],"watermark":[87],"will":[88],"cause":[89],"noticeable":[90],"alterations":[91],"intrinsic":[94],"features":[96],"typical":[97],"of":[98],"TCP":[99],"flows.":[100],"We":[101,151],"propose":[102],"five":[103],"metrics":[104],"sufficient":[107],"detecting":[109],"four":[110],"watermarks":[113],"bulk":[115],"transfer":[116],"interactive":[118],"traffic.":[119],"can":[121,142,170],"be":[122,143],"easily":[123],"deployed":[124],"stepping":[126],"stones":[127],"anonymity":[129],"networks":[130],"Tor),":[132],"because":[133],"it":[134],"does":[135],"rely":[137],"strong":[139],"assumptions":[140],"realized":[144],"active":[147],"or":[148],"passive":[149],"mode.":[150],"have":[152],"conducted":[153],"extensive":[154],"experiments":[155],"evaluate":[157],"BACKLIT's":[158],"performance":[160],"using":[161],"PlanetLab":[163],"platform.":[164],"results":[166],"detect":[171],"watermarked":[172],"flows":[174],"with":[175],"high":[176],"accuracy":[177],"few":[179],"false":[180],"positives.":[181]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
