ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1906.09682
  4. Cited By
Encrypted DNS --> Privacy? A Traffic Analysis Perspective
v1v2v3 (latest)

Encrypted DNS --> Privacy? A Traffic Analysis Perspective

Network and Distributed System Security Symposium (NDSS), 2019
24 June 2019
S. Siby
Marc Juárez
Claudia Díaz
Narseo Vallina-Rodriguez
Carmela Troncoso
ArXiv (abs)PDFHTML

Papers citing "Encrypted DNS --> Privacy? A Traffic Analysis Perspective"

25 / 25 papers shown
Title
A Survey and Evaluation Framework for Secure DNS Resolution
A Survey and Evaluation Framework for Secure DNS Resolution
Ali Sadeghi Jahromi
A. Abdou
P. V. Oorschot
48
0
0
17 Sep 2025
Network-Level Prompt and Trait Leakage in Local Research Agents
Network-Level Prompt and Trait Leakage in Local Research Agents
Hyejun Jeong
Mohammadreza Teymoorianfard
A. Kumar
Amir Houmansadr
Eugene Bagdasarian
101
0
0
27 Aug 2025
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via
  NN-Driven Traffic Analysis at Line-Speed
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed
Jinzhu Yan
Haotian Xu
Zhuotao Liu
Qi Li
Ke Xu
Mingwei Xu
Jianping Wu
127
31
0
17 Mar 2024
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel
  Attack
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack
Ziqiang Wang
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Mengyuan Li
Ganqiu Du
Ke Xu
Jianping Wu
122
4
0
20 Feb 2024
Seqnature: Extracting Network Fingerprints from Packet Sequences
Seqnature: Extracting Network Fingerprints from Packet Sequences
Janus Varmarken
R. Trimananda
A. Markopoulou
93
0
0
28 Dec 2023
The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption
The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption
Taylor Henderson
Eric Osterweil
Pavan Kumar Dinesh
Robert Simon
82
0
0
04 Oct 2023
On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design,
  Evaluation and Dataset
On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation and DatasetIEEE Transactions on Network and Service Management (TNSM), 2023
Jayasree Sengupta
Mike Kosek
Justus Fries
Simone Ferlin-Reiter
Pratyush Dikshit
Vaibhav Bajpai
202
3
0
20 Jun 2023
Reclaiming Privacy and Performance over Centralized DNS
Reclaiming Privacy and Performance over Centralized DNS
Rashna Kumar
F. Bustamante
77
1
0
26 Feb 2023
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow
  Interaction Graph Analysis
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph AnalysisNetwork and Distributed System Security Symposium (NDSS), 2023
Chuanpu Fu
Qi Li
Ke Xu
49
88
0
31 Jan 2023
Recent Trends on Privacy-Preserving Technologies under Standardization
  at the IETF
Recent Trends on Privacy-Preserving Technologies under Standardization at the IETFComputer communication review (CCR), 2023
Pratyush Dikshit
Jayasree Sengupta
Vaibhav Bajpai
270
11
0
03 Jan 2023
Understanding User Awareness and Behaviors Concerning Encrypted DNS
  Settings
Understanding User Awareness and Behaviors Concerning Encrypted DNS SettingsUSENIX Security Symposium (USENIX Security), 2022
Alexandra Nisenoff
Ranya Sharma
Nick Feamster
AI4CE
140
3
0
09 Aug 2022
From IP to transport and beyond: cross-layer attacks against
  applications
From IP to transport and beyond: cross-layer attacks against applicationsConference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), 2021
Tianxiang Dai
Philipp Jeitner
Haya Shulman
Michael Waidner
AAML
103
20
0
12 May 2022
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet
  Resources
The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet ResourcesUSENIX Security Symposium (USENIX Security), 2022
Tianxiang Dai
Philipp Jeitner
Haya Shulman
Michael Waidner
181
20
0
11 May 2022
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNSUSENIX Security Symposium (USENIX Security), 2022
Philipp Jeitner
Haya Schulmann
87
29
0
11 May 2022
Towards Reproducible Network Traffic Analysis
Towards Reproducible Network Traffic Analysis
Jordan Holland
Paul Schmitt
Prateek Mittal
Nick Feamster
117
8
0
23 Mar 2022
You get PADDING, everybody gets PADDING! You get privacy? Evaluating
  practical QUIC website fingerprinting protections for the masses
You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses
S. Siby
Ludovic Barman
Christopher A. Wood
Marwan M. Fayed
N. Sullivan
Carmela Troncoso
123
5
0
15 Mar 2022
A Survey on DNS Encryption: Current Development, Malware Misuse, and
  Inference Techniques
A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference TechniquesACM Computing Surveys (ACM CSUR), 2022
Minzhao Lyu
Hassan Habibi Gharakheili
V. Sivaraman
128
66
0
03 Jan 2022
Studying the anonymity trilemma with a discrete-event mix network
  simulator
Studying the anonymity trilemma with a discrete-event mix network simulator
Ania M. Piotrowska
91
10
0
26 Jul 2021
Large Scale Measurement on the Adoption of Encrypted DNS
Large Scale Measurement on the Adoption of Encrypted DNS
Sebastian Garcia
Karel Hynek
Dmitrii Vekshin
T. Čejka
Armin Wasicek
AI4CE
87
28
0
09 Jul 2021
Realtime Robust Malicious Traffic Detection via Frequency Domain
  Analysis
Realtime Robust Malicious Traffic Detection via Frequency Domain AnalysisConference on Computer and Communications Security (CCS), 2021
Chuanpu Fu
Qi Li
Meng Shen
Ke Xu
AAML
132
196
0
28 Jun 2021
Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based
  Website Fingerprinting
Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website FingerprintingProceedings on Privacy Enhancing Technologies (PoPETs), 2021
Nguyen Phong Hoang
Arian Akhavan Niaki
Phillipa Gill
M. Polychronakis
134
28
0
16 Feb 2021
Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services
Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS ServicesProceedings on Privacy Enhancing Technologies (PoPETs), 2020
Rahel A. Fainchtein
Adam J. Aviv
Micah Sherr
Stephen Ribaudo
Armaan Khullar
98
5
0
14 Dec 2020
Cost-aware Feature Selection for IoT Device Classification
Cost-aware Feature Selection for IoT Device ClassificationIEEE Internet of Things Journal (IEEE IoT J.), 2020
Biswadeep Chakraborty
D. Divakaran
Ido Nevat
G. Peters
M. Gurusamy
222
30
0
02 Sep 2020
K-resolver: Towards Decentralizing Encrypted DNS Resolution
K-resolver: Towards Decentralizing Encrypted DNS Resolution
Nguyen Phong Hoang
Ivan Lin
Seyedhamed Ghavamnia
M. Polychronakis
88
27
0
24 Jan 2020
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS
Padding Ain't Enough: Assessing the Privacy Guarantees of Encrypted DNS
Jonas Bushart
C. Rossow
78
57
0
02 Jul 2019
1