{"id":"https://openalex.org/W4416276813","doi":"https://doi.org/10.1145/3772356.3772428","title":"Rethinking the Role of Network Stacks for Website Fingerprinting Defenses","display_name":"Rethinking the Role of Network Stacks for Website Fingerprinting Defenses","publication_year":2025,"publication_date":"2025-11-17","ids":{"openalex":"https://openalex.org/W4416276813","doi":"https://doi.org/10.1145/3772356.3772428"},"language":"en","primary_location":{"id":"doi:10.1145/3772356.3772428","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772356.3772428","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772428","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Workshop on Hot Topics in Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772428","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120405189","display_name":"Elisaveta Lavrentieva","orcid":"https://orcid.org/0009-0001-6317-5890"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Elisaveta Lavrentieva","raw_affiliation_strings":["University of Edinburgh, Edinburgh, United Kingdom"],"raw_orcid":"https://orcid.org/0009-0001-6317-5890","affiliations":[{"raw_affiliation_string":"University of Edinburgh, Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000247697","display_name":"Marc Ju\u00e1rez","orcid":"https://orcid.org/0000-0001-7657-9934"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Marc Juarez","raw_affiliation_strings":["University of Edinburgh, Edinburgh, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0001-7657-9934","affiliations":[{"raw_affiliation_string":"University of Edinburgh, Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072560578","display_name":"Michio Honda","orcid":"https://orcid.org/0000-0003-1895-5318"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Michio Honda","raw_affiliation_strings":["University of Edinburgh, Edinburgh, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0003-1895-5318","affiliations":[{"raw_affiliation_string":"University of Edinburgh, Edinburgh, United Kingdom","institution_ids":["https://openalex.org/I98677209"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5120405189"],"corresponding_institution_ids":["https://openalex.org/I98677209"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17829238,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"254","last_page":"262"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.003800000064074993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9003000259399414},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7703999876976013},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6202999949455261},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.578000009059906},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45570001006126404},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4133000075817108},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.375900000333786}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9003000259399414},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7703999876976013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7674999833106995},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6308000087738037},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6202999949455261},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.578000009059906},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.48069998621940613},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45570001006126404},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42100000381469727},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4133000075817108},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.375900000333786},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.36579999327659607},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.3481999933719635},{"id":"https://openalex.org/C2985371682","wikidata":"https://www.wikidata.org/wiki/Q11135","display_name":"Ip address","level":2,"score":0.3400999903678894},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.3319999873638153},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32989999651908875},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2581000030040741}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3772356.3772428","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772356.3772428","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772428","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Workshop on Hot Topics in Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.ed.ac.uk:openaire/52cd00c7-40a1-4eeb-bdeb-6aa51980ea7d","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/52cd00c7-40a1-4eeb-bdeb-6aa51980ea7d","pdf_url":"https://www.research.ed.ac.uk/files/617346418/LavrentievaEtalHotNets25RethinkingtheRoleofNetworkStacks.pdf","source":{"id":"https://openalex.org/S4306400321","display_name":"Edinburgh Research Explorer (University of Edinburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98677209","host_organization_name":"University of Edinburgh","host_organization_lineage":["https://openalex.org/I98677209"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lavrentieva, L, Juarez, M & Honda, M 2025, Rethinking the Role of Network Stacks for Website Fingerprinting Defense. in Rethinking the Role of Network Stacks for Website Fingerprinting Defense. Association for Computing Machinery (ACM), Workshop on Hot Topics in Networks, pp. 254-262. https://doi.org/10.1145/3772356.3772428","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.ed.ac.uk:publications/52cd00c7-40a1-4eeb-bdeb-6aa51980ea7d","is_oa":true,"landing_page_url":"https://hdl.handle.net/20.500.11820/52cd00c7-40a1-4eeb-bdeb-6aa51980ea7d","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lavrentieva, L, Juarez, M & Honda, M 2025, Rethinking the Role of Network Stacks for Website Fingerprinting Defense. in Rethinking the Role of Network Stacks for Website Fingerprinting Defense. Association for Computing Machinery (ACM), Workshop on Hot Topics in Networks, pp. 254-262. https://doi.org/10.1145/3772356.3772428","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"doi:10.1145/3772356.3772428","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772356.3772428","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772428","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Workshop on Hot Topics in Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416276813.pdf","grobid_xml":"https://content.openalex.org/works/W4416276813.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W197026479","https://openalex.org/W2012210084","https://openalex.org/W2027177092","https://openalex.org/W2120702739","https://openalex.org/W2485000773","https://openalex.org/W2604754095","https://openalex.org/W2783301790","https://openalex.org/W2885982708","https://openalex.org/W2895807258","https://openalex.org/W2963704216","https://openalex.org/W2964602598","https://openalex.org/W2968193396","https://openalex.org/W3008176860","https://openalex.org/W3046407074","https://openalex.org/W3126325113","https://openalex.org/W3155879802","https://openalex.org/W3169619208","https://openalex.org/W3206637460","https://openalex.org/W4255831625","https://openalex.org/W4308995377","https://openalex.org/W4385522515","https://openalex.org/W4388925668","https://openalex.org/W4400381946","https://openalex.org/W4405184267"],"related_works":[],"abstract_inverted_index":{"While":[0],"encryption":[1,25],"has":[2],"become":[3,37],"ubiquitous":[4],"across":[5],"the":[6,22,31,41,56,67,91],"Internet,":[7],"there":[8],"is":[9,26],"growing":[10],"concern":[11],"that":[12,95],"website":[13],"fingerprinting":[14],"and":[15],"other":[16],"traffic":[17,46],"analysis":[18],"attacks":[19,35],"could":[20],"undermine":[21],"confidentiality":[23],"guarantees":[24],"meant":[27],"to":[28,44],"provide.":[29],"Over":[30],"past":[32],"decade,":[33],"these":[34],"have":[36,51],"increasingly":[38],"effective,":[39],"highlighting":[40],"urgent":[42],"need":[43],"deploy":[45],"obfuscation":[47,83],"countermeasures.":[48],"Although":[49],"defenses":[50,96],"already":[52],"been":[53],"proposed":[54],"in":[55],"literature,":[57],"they":[58,63],"remain":[59],"inefficient":[60],"partly":[61],"because":[62],"are":[64],"implemented":[65],"at":[66],"application-level,":[68],"which":[69],"limits":[70],"their":[71],"control":[72],"over":[73],"packet":[74,81,93],"sequences.":[75],"This":[76],"paper":[77],"advocates":[78],"for":[79],"integrating":[80],"sequence":[82],"support":[84],"directly":[85],"into":[86],"host":[87],"network":[88],"stacks,":[89],"where":[90],"fine-grained":[92],"operations":[94],"require":[97],"can":[98],"be":[99],"effectively":[100],"enforced.":[101]},"counts_by_year":[],"updated_date":"2026-04-29T09:16:38.111599","created_date":"2025-11-17T00:00:00"}
