Tor is a low-latency anonymity system intended to provide low-latencyanonymous and uncensored network access against a local or network adversary.Because of the design choice to minimize traffic overhead (and increase thepool of potential users) Tor allows some information about the client'sconnections to leak in the form of packet timing. Attacks that use (featuresextracted from) this information to infer the website a user visits arereferred to as Website Fingerprinting (WF) attacks. We develop a methodologyand tools to directly measure the amount of information about a website leakedby a given set of features. We apply this tool to a comprehensive set offeatures extracted from a large set of websites and WF defense mechanisms,allowing us to make more fine-grained observations about WF attack and defensemechanisms.
展开▼