Prabhjot Singh (University of Waterloo), Diogo Barradas (University of Waterloo), Tariq Elahi (University of Edinburgh), Noura Limam (University of Waterloo)

Despite the implementation of encrypted channels, such as those offered by anonymity networks like Tor, network adversaries have demonstrated the ability to compromise users’ browsing privacy through website fingerprinting attacks. This paper studies the susceptibility of Tor users to website fingerprinting when data is exchanged over low Earth orbit (LEO) satellite Internet links. Specifically, we design an experimental testbed that incorporates a Starlink satellite Internet connection, allowing us to collect a dataset for evaluating the success of website fingerprinting attacks in satellite environments compared to conventional fiber connections. Our findings suggest that Tor traffic transmitted via Starlink is as vulnerable to fingerprinting attacks as traffic over fiber links, despite the distinct networking characteristics of Starlink connections in contrast to fiber.

View More Papers

MirageFlow: A New Bandwidth Inflation Attack on Tor

Christoph Sendner (University of Würzburg), Jasper Stang (University of Würzburg), Alexandra Dmitrienko (University of Würzburg), Raveen Wijewickrama (University of Texas at San Antonio), Murtuza Jadliwala (University of Texas at San Antonio)

Read More

Position Paper: Space System Threat Models Must Account for...

Benjamin Cyr and Yan Long (University of Michigan), Takeshi Sugawara (The University of Electro-Communications), Kevin Fu (Northeastern University)

Read More

Why People Still Fall for Phishing Emails: An Empirical...

Asangi Jayatilaka (Centre for Research on Engineering Software Technologies (CREST), The University of Adelaide, School of Computing Technologies, RMIT University), Nalin Asanka Gamagedara Arachchilage (School of Computer Science, The University of Auckland), M. Ali Babar (Centre for Research on Engineering Software Technologies (CREST), The University of Adelaide)

Read More