Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in IEEE Western New York Image and Signal Processing Workshop (WNYISPW), 2018
This paper explores how convolutional neural networks discover and exploit features in website fingerprinting attacks on the Tor network.
Recommended citation: Nate Mathews, Payap Sirinam, Matthew Wright. (2018). "Understanding Feature Discovery in Website Fingerprinting Attacks." IEEE Western New York Image and Signal Processing Workshop (WNYISPW), 2018. DOI: 10.1109/WNYIPW.2018.8576379.
Download Paper | Download Slides
Published in ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019
This paper introduces Triplet Fingerprinting (TF), a novel website fingerprinting attack that uses N-shot learning to reduce training data requirements while remaining effective under varying network conditions.
Recommended citation: Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright. (2019). "Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning." ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019. DOI: 10.1145/3319535.3354217.
Download Paper | Download Slides
Published in Proceedings on Privacy Enhancing Technologies (PoPETS), 2020
This paper explores the use of packet timing in website fingerprinting (WF) attacks, showing that timing information significantly improves the accuracy of WF classifiers in both closed-world and open-world settings.
Recommended citation: Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright. (2020). "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks." Proceedings on Privacy Enhancing Technologies (PoPETS), 2020. DOI: 10.2478/popets-2020-0043.
Download Paper
Published in IEEE Transactions on Information Forensics and Security (TIFS), 2020
This paper presents Mockingbird, a novel website fingerprinting defense that uses adversarial traces to significantly reduce the accuracy of deep-learning-based attacks while maintaining reasonable bandwidth overhead.
Recommended citation: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright. (2020). "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces." IEEE Transactions on Information Forensics and Security (TIFS), 2020. DOI: 10.1109/TIFS.2020.3039691.
Download Paper
Published in Proceedings on Privacy Enhancing Technologies (PoPETS), 2021
This paper introduces GANDaLF, a novel deep-learning-based Website Fingerprinting (WF) attack using Generative Adversarial Networks (GANs) designed to work effectively with limited training data.
Recommended citation: Se Eun Oh, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright, Nicholas Hopper. (2021). "GANDaLF: GAN for Data-Limited Fingerprinting." Proceedings on Privacy Enhancing Technologies (PoPETS), 2021. DOI: 10.2478/popets-2021-0029.
Download Paper | Download Slides
Published in 20th Workshop on Privacy in the Electronic Society (WPES), 2021
This paper introduces SHAME, a deep learning-based voice command fingerprinting attack model that leverages packet metadata to infer voice commands issued to smart assistants like Amazon Echo and Google Home.
Recommended citation: Jack Hyland, Conrad Schneggenburger, Nick Lim, Jake Ruud, Nate Mathews, Matthew Wright. (2021). "What a SHAME: Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning." 20th Workshop on Privacy in the Electronic Society (WPES), 2021. DOI: 10.1145/3463676.3485615.
Download Paper | Download Slides
Published in IEEE Symposium on Security and Privacy (SP), 2022
This paper presents DeepCoFFEA, a novel end-to-end flow correlation attack that significantly improves the accuracy of flow correlation on the Tor network by using deep metric learning and amplification techniques.
Recommended citation: Se Eun Oh, Taiji Yang, Nate Mathews, James K. Holland, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright. (2022). "DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification." IEEE Symposium on Security and Privacy (SP), 2022. DOI: 10.1109/SP46214.2022.9833801.
Download Paper
Published in IEEE Symposium on Security and Privacy (SP), 2023
This paper provides a critical evaluation of nine recent efficient website fingerprinting defenses, utilizing deep-learning-based attacks and considering their real-world deployability in Tor.
Recommended citation: Nate Mathews, James K. Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright. (2023). "SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses." IEEE Symposium on Security and Privacy (SP), 2023. DOI: 10.1109/SP46215.2023.10179289.
Download Paper | Download Slides
Published in ACM Asia Conference on Computer and Communications Security (ASIA CCS), 2024
This paper presents WhisperVoiceTrace (WhiVo), a comprehensive analysis of voice command fingerprinting, proposing new features and methods for improved voice command traffic analysis in smart speakers like Amazon Alexa and Google Assistant.
Recommended citation: Minji Jo, Hyojin Kim, Jiwoo Hong, Hosung Kang, Nate Mathews, Se Eun Oh. (2024). "WhisperVoiceTrace: A Comprehensive Analysis of Voice Command Fingerprinting." ACM Asia Conference on Computer and Communications Security (ASIA CCS), 2024. DOI: 10.1145/3634737.3657017.
Download Paper
Published in IEEE Transactions on Information Forensics and Security (TIFS), 2024
This paper introduces LASERBEAK, a novel website fingerprinting attack that combines multi-channel feature representations and transformer-based attention mechanisms to significantly improve performance against defended Tor traffic.
Recommended citation: Nate Mathews, James K. Holland, Nicholas Hopper, Matthew Wright. (2024). "LASERBEAK: Evolving Website Fingerprinting Attacks with Attention and Multi-Channel Feature Representation." IEEE Transactions on Information Forensics and Security (TIFS), 2024. DOI: 10.1109/TIFS.2024.3468171.
Download Paper
Published:
Presented research on “Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning” at ACM CCS 2019. The talk introduced the novel triplet learning-based approach to website fingerprinting, significantly reducing the data requirements while maintaining effectiveness across different network conditions.
Published:
Gave an invited talk on the topic of “Deanonymizing Internet Traffic with Website Fingerprinting” for the Privacy Enhancements and Assessments Research Group (PEARG) at IETF-108. This presentation discussed new techniques and research directions for analyzing traffic and compromising privacy in encrypted network environments.
Published:
Presented research on “GANDaLF: GAN for Data-Limited Fingerprinting” at PETS 2021. This talk highlighted the novel use of Generative Adversarial Networks (GANs) to improve website fingerprinting attacks in data-limited scenarios, outperforming existing methods in subpage fingerprinting.
Published:
Presented research on the paper “SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses” at the IEEE S&P 2023. This talk covered the comprehensive evaluation of nine recent defenses and their performance against deep-learning-based website fingerprinting attacks.
Published:
In this talk, myself and my advisor, Dr. Matthew Wright, explored the AI techniques we used to develop a novel stepping-stone identification method. A key focus was on Flow Correlation attacks, a class of attacks that target anonymity networks but can be adapted to defense, particularly for detecting pivoting in network intrusion attacks.
Published:
This is a repeat of the same talk presented a few days prior at Rochester Security Summit, with modifications for an academic crowd as part of WashU’s graduate colloquium series.
Published:
At the 28th Colloquium for Information Systems Security Education (CISSE), I presented our work on teaching Generative AI for cybersecurity through a hands-on, project-based learning approach. The course explores the application of large language models (LLMs) to automate cybersecurity tasks, emphasizing real-world case studies, prompt engineering, fine-tuning, and retrieval-augmented generation (RAG).
Graduate/Undergraduate course, Rochester Institute of Technology, Department of Computing Security, 2022
This course provides students with the opportunity to explore methods and applications in cyber analytics using advanced machine learning algorithms, including deep learning. The course covers both foundational machine learning techniques and their applications to real-world cybersecurity problems, such as network anomaly detection, malware analysis, and intrusion detection.
Download SyllabusGraduate/Undergraduate course, Rochester Institute of Technology, Department of Computing Security, 2024
In this project-based course, students explore the application of generative AI models, such as large language models (LLMs), to various cybersecurity tasks. Students gain hands-on experience working with AI tools, critiquing their application in real-world scenarios, and understanding the implications of using generative AI in cybersecurity.
Download SyllabusGraduate course, Rochester Institute of Technology, Department of Computing Security, 2025
This research-oriented seminar explores the latest advancements in malware analysis, focusing on techniques to detect, analyze, and counteract malicious software. Students engage with state-of-the-art research, apply malware analysis tools, and examine strategies used by attackers to evade detection. The course emphasizes hands-on experience with tools such as Cuckoo Sandbox, Volatility, and Google Rapid Response (GRR) while fostering critical analysis of recent research papers.
Download Syllabus