Prabhjot Singh (University of Waterloo), Diogo Barradas (University of Waterloo), Tariq Elahi (University of Edinburgh), Noura Limam (University of Waterloo)

Despite the implementation of encrypted channels, such as those offered by anonymity networks like Tor, network adversaries have demonstrated the ability to compromise users’ browsing privacy through website fingerprinting attacks. This paper studies the susceptibility of Tor users to website fingerprinting when data is exchanged over low Earth orbit (LEO) satellite Internet links. Specifically, we design an experimental testbed that incorporates a Starlink satellite Internet connection, allowing us to collect a dataset for evaluating the success of website fingerprinting attacks in satellite environments compared to conventional fiber connections. Our findings suggest that Tor traffic transmitted via Starlink is as vulnerable to fingerprinting attacks as traffic over fiber links, despite the distinct networking characteristics of Starlink connections in contrast to fiber.

View More Papers

K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits...

Zhengchuan Liang (UC Riverside), Xiaochen Zou (UC Riverside), Chengyu Song (UC Riverside), Zhiyun Qian (UC Riverside)

Read More

WIP: Shadow Hack: Adversarial Shadow Attack Against LiDAR Object...

Ryunosuke Kobayashi, Kazuki Nomoto, Yuna Tanaka, Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN)

Read More

OCPPStorm: A Comprehensive Fuzzing Tool for OCPP Implementations (Long)

Gaetano Coppoletta (University of Illinois Chicago), Rigel Gjomemo (Discovery Partners Institute, University of Illinois), Amanjot Kaur, Nima Valizadeh (Cardiff University), Venkat Venkatakrishnan (Discovery Partners Institute, University of Illinois), Omer Rana (Cardiff University)

Read More

LARMix: Latency-Aware Routing in Mix Networks

Mahdi Rahimi (KU Leuven), Piyush Kumar Sharma (KU Leuven), Claudia Diaz (KU Leuven)

Read More