Timing Attacks Against Encrypted Web Traffic (HTTPS)

The basic idea is that when a web page is fetched it leads to a cascade of fetches as the various objects in the page (images, javascript, adverts etc) are fetched, and this cascade generates a timing signature within the resulting packet stream that can be used to identify the page fetched, even when the packets are encrypted and padded to be equal size. Importantly, this signature is robust -- so we can reliably identify the web page with high probability, even when measurements are taken in different locations etc.

Data & Code

The data and code used to demonstrate these attacks is here.

Defending Against Timing Attacks

Data & Code

The data and code is here.