作者: Michael Backes , Praveen Manoharan , Esfandiar Mohammadi
DOI: 10.1109/CSF.2014.34
关键词:
摘要: The anonymous communication protocol Tor constitutes the most widely deployed technology for providing anonymity user over Internet. Several frameworks have been proposed that show strong guarantees, none of these, however, are capable modeling class traffic-related timing attacks against Tor, such as traffic correlation and website fingerprinting. In this work, we present TUC: first framework allows establishing guarantees in presence time-sensitive adversaries mount attacks. TUC incorporates a comprehensive notion time an asynchronous model with sequential activation, while offering compositionality properties security proofs. We apply to evaluate novel countermeasure fingerprinting Our analysis relies on formalization onion routing underlies proves rigorous