ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2005.00508
  4. Cited By
Practical Traffic Analysis Attacks on Secure Messaging Applications

Practical Traffic Analysis Attacks on Secure Messaging Applications

Network and Distributed System Security Symposium (NDSS), 2020
1 May 2020
Alireza Bahramali
Ramin Soltani
Amir Houmansadr
Dennis Goeckel
Don Towsley
ArXiv (abs)PDFHTML

Papers citing "Practical Traffic Analysis Attacks on Secure Messaging Applications"

14 / 14 papers shown
Hey there! You are using WhatsApp: Enumerating Three Billion Accounts for Security and Privacy
Hey there! You are using WhatsApp: Enumerating Three Billion Accounts for Security and Privacy
G. K. Gegenhuber
Philipp É. Frenzel
Maximilian Günther
Johanna Ullrich
Aljosha Judmayer
167
3
0
25 Nov 2025
User Perceptions and Attitudes Toward Untraceability in Messaging Platforms
User Perceptions and Attitudes Toward Untraceability in Messaging Platforms
Carla F. Griggio
Boel Nelson
Zefan Sramek
Aslan Askarov
173
0
0
12 Jun 2025
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel
  Attack
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack
Ziqiang Wang
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Mengyuan Li
Ganqiu Du
Ke Xu
Jianping Wu
210
6
0
20 Feb 2024
The Spectre of Surveillance and Censorship in Future Internet Architectures
The Spectre of Surveillance and Censorship in Future Internet ArchitecturesProceedings on Privacy Enhancing Technologies (PoPETs), 2024
Michael Wrana
Diogo Barradas
N. Asokan
379
3
0
29 Jan 2024
Location Privacy Threats and Protections in 6G Vehicular Networks: A Comprehensive Review
Location Privacy Threats and Protections in 6G Vehicular Networks: A Comprehensive Review
Baihe Ma
Xu Wang
Xiaojie Lin
Yanna Jiang
Caijun Sun
...
Guangsheng Yu
Ying He
Wei Ni
R. Liu
Ren Ping Liu
341
9
0
08 May 2023
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow
  Interaction Graph Analysis
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph AnalysisNetwork and Distributed System Security Symposium (NDSS), 2023
Chuanpu Fu
Qi Li
Ke Xu
107
118
0
31 Jan 2023
Metadata Privacy Beyond Tunneling for Instant Messaging
Metadata Privacy Beyond Tunneling for Instant MessagingEuropean Symposium on Security and Privacy (Euro S&P), 2022
Boel Nelson
Elena Pagnin
Aslan Askarov
349
1
0
23 Oct 2022
Hope of Delivery: Extracting User Locations From Mobile Instant
  Messengers
Hope of Delivery: Extracting User Locations From Mobile Instant MessengersNetwork and Distributed System Security Symposium (NDSS), 2022
Theodor Schnitzler
Katharina Kohls
Evangelos Bitsikas
Christina Pöpper
159
19
0
19 Oct 2022
SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via
  Siamese Heterogeneous Graph Attention Network
SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention NetworkUSENIX Security Symposium (USENIX Security), 2022
Tianyu Cui
Gaopeng Gou
G. Xiong
Zhen Li
Mingxin Cui
Chang Liu
GNN
191
21
0
20 Apr 2022
With a Little Help from My Friends: Transport Deniability for Instant
  Messaging
With a Little Help from My Friends: Transport Deniability for Instant Messaging
Boel Nelson
Aslan Askarov
158
1
0
04 Feb 2022
Studying the anonymity trilemma with a discrete-event mix network
  simulator
Studying the anonymity trilemma with a discrete-event mix network simulator
Ania M. Piotrowska
210
14
0
26 Jul 2021
Realtime Robust Malicious Traffic Detection via Frequency Domain
  Analysis
Realtime Robust Malicious Traffic Detection via Frequency Domain AnalysisConference on Computer and Communications Security (CCS), 2021
Chuanpu Fu
Qi Li
Meng Shen
Ke Xu
AAML
239
222
0
28 Jun 2021
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices
Ashutosh Bhatia
Ankit Agrawal
Kamlesh Tiwari
K. Haribabu
D. Vishwakarma
128
23
0
22 Jun 2020
Blind Adversarial Network Perturbations
Blind Adversarial Network Perturbations
Milad Nasr
Alireza Bahramali
Amir Houmansadr
AAML
189
8
0
16 Feb 2020
1
Page 1 of 1