Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marc Juarez is active.

Publication


Featured researches published by Marc Juarez.


computer and communications security | 2013

FPDetective: dusting the web for fingerprinters

Gunes Acar; Marc Juarez; Nick Nikiforakis; Claudia Diaz; Seda F. Gürses; Frank Piessens; Bart Preneel

In the modern web, the browser has emerged as the vehicle of choice, which users are to trust, customize, and use, to access a wealth of information and online services. However, recent studies show that the browser can also be used to invisibly fingerprint the user: a practice that may have serious privacy and security implications. In this paper, we report on the design, implementation and deployment of FPDetective, a framework for the detection and analysis of web-based fingerprinters. Instead of relying on information about known fingerprinters or third-party-tracking blacklists, FPDetective focuses on the detection of the fingerprinting itself. By applying our framework with a focus on font detection practices, we were able to conduct a large scale analysis of the million most popular websites of the Internet, and discovered that the adoption of fingerprinting is much higher than previous studies had estimated. Moreover, we analyze two countermeasures that have been proposed to defend against fingerprinting and find weaknesses in them that might be exploited to bypass their protection. Finally, based on our findings, we discuss the current understanding of fingerprinting and how it is related to Personally Identifiable Information, showing that there needs to be a change in the way users, companies and legislators engage with fingerprinting.


computer and communications security | 2014

A Critical Evaluation of Website Fingerprinting Attacks

Marc Juarez; Sadia Afroz; Gunes Acar; Claudia Diaz; Rachel Greenstadt

Recent studies on Website Fingerprinting (WF) claim to have found highly effective attacks on Tor. However, these studies make assumptions about user settings, adversary capabilities, and the nature of the Web that do not necessarily hold in practical scenarios. The following study critically evaluates these assumptions by conducting the attack where the assumptions do not hold. We show that certain variables, for example, users browsing habits, differences in location and version of Tor Browser Bundle, that are usually omitted from the current WF model have a significant impact on the efficacy of the attack. We also empirically show how prior work succumbs to the base rate fallacy in the open-world scenario. We address this problem by augmenting our classification method with a verification step. We conclude that even though this approach reduces the number of false positives over 63\%, it does not completely solve the problem, which remains an open issue for WF attacks.


european symposium on research in computer security | 2016

Toward an Efficient Website Fingerprinting Defense

Marc Juarez; Mohsen Imani; Mike Perry; Claudia Diaz; Matthew K. Wright

Website Fingerprinting attacks enable a passive eavesdropper to recover the user’s otherwise anonymized web browsing activity by matching the observed traffic with prerecorded web traffic templates. The defenses that have been proposed to counter these attacks are impractical for deployment in real-world systems due to their high cost in terms of added delay and bandwidth overhead. Further, these defenses have been designed to counter attacks that, despite their high success rates, have been criticized for assuming unrealistic attack conditions in the evaluation setting. In this paper, we propose a novel, lightweight defense based on Adaptive Padding that provides a sufficient level of security against website fingerprinting, particularly in realistic evaluation conditions. In a closed-world setting, this defense reduces the accuracy of the state-of-the-art attack from 91 % to 20 %, while introducing zero latency overhead and less than 60 % bandwidth overhead. In an open-world, the attack precision is just 1 % and drops further as the number of sites grows.


network and distributed system security symposium | 2018

Automated Website Fingerprinting through Deep Learning.

Vera Rimmer; Davy Preuveneers; Marc Juarez; Tom Van Goethem; Wouter Joosen

Several studies have shown that the network traffic that is generated by a visit to a website over Tor reveals information specific to the website through the timing and sizes of network packets. By capturing traffic traces between users and their Tor entry guard, a network eavesdropper can leverage this meta-data to reveal which website Tor users are visiting. The success of such attacks heavily depends on the particular set of traffic features that are used to construct the fingerprint. Typically, these features are manually engineered and, as such, any change introduced to the Tor network can render these carefully constructed features ineffective. In this paper, we show that an adversary can automate the feature engineering process, and thus automatically deanonymize Tor traffic by applying our novel method based on deep learning. We collect a dataset comprised of more than three million network traces, which is the largest dataset of web traffic ever used for website fingerprinting, and find that the performance achieved by our deep learning approaches is comparable to known methods which include various research efforts spanning over multiple years. The obtained success rate exceeds 96% for a closed world of 100 websites and 94% for our biggest closed world of 900 classes. In our open world evaluation, the most performant deep learning model is 2% more accurate than the state-of-the-art attack. Furthermore, we show that the implicit features automatically learned by our approach are far more resilient to dynamic changes of web content over time. We conclude that the ability to automatically construct the most relevant traffic features and perform accurate traffic recognition makes our deep learning based approach an efficient, flexible and robust technique for website fingerprinting.


computer and communications security | 2018

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

Payap Sirinam; Mohsen Imani; Marc Juarez; Matthew Wright

Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we present Deep Fingerprinting (DF), a new website fingerprinting attack against Tor that leverages a type of deep learning called Convolutional Neural Networks (CNN) with a sophisticated architecture design, and we evaluate this attack against WTF-PAD and Walkie-Talkie. The DF attack attains over 98% accuracy on Tor traffic without defenses, better than all prior attacks, and it is also the only attack that is effective against WTF-PAD with over 90% accuracy. Walkie-Talkie remains effective, holding the attack to just 49.7% accuracy. In the more realistic open-world setting, our attack remains effective, with 0.99 precision and 0.94 recall on undefended traffic. Against traffic defended with WTF-PAD in this setting, the attack still can get 0.96 precision and 0.68 recall. These findings highlight the need for effective defenses that protect against this new attack and that could be deployed in Tor.


computer and communications security | 2014

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild

Gunes Acar; Christian Eubank; Steven Englehardt; Marc Juarez; Arvind Narayanan; Claudia Diaz


network and distributed system security symposium | 2018

Inside Job: Applying Traffic Analysis to Measure Tor from Within.

Rob Jansen; Marc Juarez; Rafael Galvez; Tariq Elahi; Claudia Diaz


arXiv: Cryptography and Security | 2017

Automated Feature Extraction for Website Fingerprinting through Deep Learning.

Vera Rimmer; Davy Preuveneers; Marc Juarez; Tom Van Goethem; Wouter Joosen


arXiv: Cryptography and Security | 2015

WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor.

Marc Juarez; Mohsen Imani; Mike Perry; Claudia Diaz; Matthew K. Wright


Lecture Notes in Computer Science | 2016

Toward an Efficient Website Fingerprinting Defense for Tor

Marc Juarez; Mohsen Imani; Claudia Diaz; Mike Perry; Matthew K. Wright

Collaboration


Dive into the Marc Juarez's collaboration.

Top Co-Authors

Avatar

Claudia Diaz

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Mohsen Imani

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar

Matthew K. Wright

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar

Gunes Acar

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Davy Preuveneers

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Tom Van Goethem

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Wouter Joosen

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Bart Preneel

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Frank Piessens

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge