DeepCoAST: Unveiling Split Trace Correlation to Counter Traffic Splitting Defenses
Despite its widespread adoption, Tor remains vulnerable to traffic analysis attacks, which enables both ends of the communication to be inferred by network-level adversaries.Notable examples of such attacks include website fingerprinting and end-to-end flow correlation attacks.Various defense techniques have been proposed to enhance the security of