Posts by Collection

portfolio

publications

Understanding Feature Discovery in Website Fingerprinting Attacks

Published in IEEE Western New York Image and Signal Processing Workshop (WNYISPW), 2018

This paper explores how convolutional neural networks discover and exploit features in website fingerprinting attacks on the Tor network.

Recommended citation: Nate Mathews, Payap Sirinam, Matthew Wright. (2018). "Understanding Feature Discovery in Website Fingerprinting Attacks." IEEE Western New York Image and Signal Processing Workshop (WNYISPW), 2018. DOI: 10.1109/WNYIPW.2018.8576379.
Download Paper | Download Slides

Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning

Published in ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019

This paper introduces Triplet Fingerprinting (TF), a novel website fingerprinting attack that uses N-shot learning to reduce training data requirements while remaining effective under varying network conditions.

Recommended citation: Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright. (2019). "Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning." ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019. DOI: 10.1145/3319535.3354217.
Download Paper | Download Slides

Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks

Published in Proceedings on Privacy Enhancing Technologies (PoPETS), 2020

This paper explores the use of packet timing in website fingerprinting (WF) attacks, showing that timing information significantly improves the accuracy of WF classifiers in both closed-world and open-world settings.

Recommended citation: Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright. (2020). "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks." Proceedings on Privacy Enhancing Technologies (PoPETS), 2020. DOI: 10.2478/popets-2020-0043.
Download Paper

Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces

Published in IEEE Transactions on Information Forensics and Security (TIFS), 2020

This paper presents Mockingbird, a novel website fingerprinting defense that uses adversarial traces to significantly reduce the accuracy of deep-learning-based attacks while maintaining reasonable bandwidth overhead.

Recommended citation: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright. (2020). "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces." IEEE Transactions on Information Forensics and Security (TIFS), 2020. DOI: 10.1109/TIFS.2020.3039691.
Download Paper

GANDaLF: GAN for Data-Limited Fingerprinting

Published in Proceedings on Privacy Enhancing Technologies (PoPETS), 2021

This paper introduces GANDaLF, a novel deep-learning-based Website Fingerprinting (WF) attack using Generative Adversarial Networks (GANs) designed to work effectively with limited training data.

Recommended citation: Se Eun Oh, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright, Nicholas Hopper. (2021). "GANDaLF: GAN for Data-Limited Fingerprinting." Proceedings on Privacy Enhancing Technologies (PoPETS), 2021. DOI: 10.2478/popets-2021-0029.
Download Paper | Download Slides

What a SHAME: Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning

Published in 20th Workshop on Privacy in the Electronic Society (WPES), 2021

This paper introduces SHAME, a deep learning-based voice command fingerprinting attack model that leverages packet metadata to infer voice commands issued to smart assistants like Amazon Echo and Google Home.

Recommended citation: Jack Hyland, Conrad Schneggenburger, Nick Lim, Jake Ruud, Nate Mathews, Matthew Wright. (2021). "What a SHAME: Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning." 20th Workshop on Privacy in the Electronic Society (WPES), 2021. DOI: 10.1145/3463676.3485615.
Download Paper | Download Slides

DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification

Published in IEEE Symposium on Security and Privacy (SP), 2022

This paper presents DeepCoFFEA, a novel end-to-end flow correlation attack that significantly improves the accuracy of flow correlation on the Tor network by using deep metric learning and amplification techniques.

Recommended citation: Se Eun Oh, Taiji Yang, Nate Mathews, James K. Holland, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright. (2022). "DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification." IEEE Symposium on Security and Privacy (SP), 2022. DOI: 10.1109/SP46214.2022.9833801.
Download Paper

SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses

Published in IEEE Symposium on Security and Privacy (SP), 2023

This paper provides a critical evaluation of nine recent efficient website fingerprinting defenses, utilizing deep-learning-based attacks and considering their real-world deployability in Tor.

Recommended citation: Nate Mathews, James K. Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright. (2023). "SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses." IEEE Symposium on Security and Privacy (SP), 2023. DOI: 10.1109/SP46215.2023.10179289.
Download Paper | Download Slides

WhisperVoiceTrace: A Comprehensive Analysis of Voice Command Fingerprinting

Published in ACM Asia Conference on Computer and Communications Security (ASIA CCS), 2024

This paper presents WhisperVoiceTrace (WhiVo), a comprehensive analysis of voice command fingerprinting, proposing new features and methods for improved voice command traffic analysis in smart speakers like Amazon Alexa and Google Assistant.

Recommended citation: Minji Jo, Hyojin Kim, Jiwoo Hong, Hosung Kang, Nate Mathews, Se Eun Oh. (2024). "WhisperVoiceTrace: A Comprehensive Analysis of Voice Command Fingerprinting." ACM Asia Conference on Computer and Communications Security (ASIA CCS), 2024. DOI: 10.1145/3634737.3657017.
Download Paper

LASERBEAK: Evolving Website Fingerprinting Attacks with Attention and Multi-Channel Feature Representation

Published in IEEE Transactions on Information Forensics and Security (TIFS), 2024

This paper introduces LASERBEAK, a novel website fingerprinting attack that combines multi-channel feature representations and transformer-based attention mechanisms to significantly improve performance against defended Tor traffic.

Recommended citation: Nate Mathews, James K. Holland, Nicholas Hopper, Matthew Wright. (2024). "LASERBEAK: Evolving Website Fingerprinting Attacks with Attention and Multi-Channel Feature Representation." IEEE Transactions on Information Forensics and Security (TIFS), 2024. DOI: 10.1109/TIFS.2024.3468171.
Download Paper

talks

Triplet Fingerprinting: N-shot Learning for Website Fingerprinting

Published:

Presented research on “Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning” at ACM CCS 2019. The talk introduced the novel triplet learning-based approach to website fingerprinting, significantly reducing the data requirements while maintaining effectiveness across different network conditions.

Deanonymizing Internet Traffic with Website Fingerprinting

Published:

Gave an invited talk on the topic of “Deanonymizing Internet Traffic with Website Fingerprinting” for the Privacy Enhancements and Assessments Research Group (PEARG) at IETF-108. This presentation discussed new techniques and research directions for analyzing traffic and compromising privacy in encrypted network environments.

GANDaLF: GAN for Data-Limited Fingerprinting

Published:

Presented research on “GANDaLF: GAN for Data-Limited Fingerprinting” at PETS 2021. This talk highlighted the novel use of Generative Adversarial Networks (GANs) to improve website fingerprinting attacks in data-limited scenarios, outperforming existing methods in subpage fingerprinting.

Critical Evaluation of Efficient Website Fingerprinting Defenses

Published:

Presented research on the paper “SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses” at the IEEE S&P 2023. This talk covered the comprehensive evaluation of nine recent defenses and their performance against deep-learning-based website fingerprinting attacks.

Teaching Generative AI for Cybersecurity: A Project-Based Learning Approach

Published:

At the 28th Colloquium for Information Systems Security Education (CISSE), I presented our work on teaching Generative AI for cybersecurity through a hands-on, project-based learning approach. The course explores the application of large language models (LLMs) to automate cybersecurity tasks, emphasizing real-world case studies, prompt engineering, fine-tuning, and retrieval-augmented generation (RAG).

teaching

CSEC 520/620 Cyber Analytics & Machine Learning

Graduate/Undergraduate course, Rochester Institute of Technology, Department of Computing Security, 2022

This course provides students with the opportunity to explore methods and applications in cyber analytics using advanced machine learning algorithms, including deep learning. The course covers both foundational machine learning techniques and their applications to real-world cybersecurity problems, such as network anomaly detection, malware analysis, and intrusion detection.

Download Syllabus

CSEC-559/659 Generative AI in Cybersecurity

Graduate/Undergraduate course, Rochester Institute of Technology, Department of Computing Security, 2024

In this project-based course, students explore the application of generative AI models, such as large language models (LLMs), to various cybersecurity tasks. Students gain hands-on experience working with AI tools, critiquing their application in real-world scenarios, and understanding the implications of using generative AI in cybersecurity.

Download Syllabus

CSEC-759 Graduate Seminar in Computing Security

Graduate course, Rochester Institute of Technology, Department of Computing Security, 2025

This research-oriented seminar explores the latest advancements in malware analysis, focusing on techniques to detect, analyze, and counteract malicious software. Students engage with state-of-the-art research, apply malware analysis tools, and examine strategies used by attackers to evade detection. The course emphasizes hands-on experience with tools such as Cuckoo Sandbox, Volatility, and Google Rapid Response (GRR) while fostering critical analysis of recent research papers.

Download Syllabus