Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the traffic is sent over anonymity-preserving networks such as Tor. The classical attack model used to evaluate website fingerprinting attacks assume an on-path adversary, who can observe all traffic traveling between the user's computer and the secure network.
Anatoly is a Ph.D. student at the Information Systems Engineering Department at Ben Gurion University of the Negev, Israel. He specializes in machine learning and big data analytics. His research interests include Hardware side-channel attacks and Machine Learning algorithms.