BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Memento EPFL//
BEGIN:VEVENT
SUMMARY:Traffic analysis and its impact on user privacy
DTSTART:20180625T130000
DTEND:20180625T150000
DTSTAMP:20260510T221450Z
UID:c107585ab8f9941e107efa2f814eb3ea6d2d71b8618ba3f86dffa6f3
CATEGORIES:Conferences - Seminars
DESCRIPTION:Sandra Deepthy Siby\nEDIC candidacy exam\nExam president: Prof
 . Jean-Pierre Hubaux\nThesis advisor: Prof. Carmela Troncoso\nCo-examiner:
  Prof. Katerina Argyraki\n\nAbstract\nThe Domain Name Service (DNS) is ubi
 quitous in today's Internet infrastructure. However\, a vast majority of D
 NS queries are sent in plaintext\, posing a privacy threat. DNS-over-TLS a
 nd DNS-over-HTTPS are two protocols that intend to provide better privacy 
 by encrypting the communication between clients and DNS recursive resolver
 s. Our research goal is toevaluate the effectiveness of TLS- based solutio
 ns for DNS privacy by determining whether it is possible to fingerprint an
 d identify webpages from encrypted DNS traffic.\n\nIn this proposal\, we d
 escribe three existing works in the area of traffic analysis. The first pa
 per investigates the effectiveness of popular countermeasures against traf
 fic analysis attacks. The second paper examines the vulnerability of HTTPS
  to traffic analysis. The third paper studies the feasibility of performin
 g behavior-based tracking using DNS traffic. Finally\, we use insights fro
 m these papers to outline our\nresearch plan.\n\nBackground papers\nPeek-a
 -Boo\, I Still See You: Why Efficient Traffic Analysis Countermeasures Fai
 l\, by Dyer\, K.\, P. et al.\nI Know Why You Went to the Clinic: Risks and
  Realization of HTTPS Traffic Analysis\, by Miller\, B.\, et al.\nBehavior
 -based tracking: Exploiting characteristic patterns in DNS traffic\, by He
 rrmann\, D.\, et al.\n\n 
LOCATION:BC 229 https://plan.epfl.ch/?room==BC%20229
STATUS:CONFIRMED
END:VEVENT
END:VCALENDAR
