TUC: Time-Sensitive and Modular Analysis of Anonymous Communication

作者: Michael Backes , Praveen Manoharan , Esfandiar Mohammadi

DOI: 10.1109/CSF.2014.34

关键词:

摘要: The anonymous communication protocol Tor constitutes the most widely deployed technology for providing anonymity user over Internet. Several frameworks have been proposed that show strong guarantees, none of these, however, are capable modeling class traffic-related timing attacks against Tor, such as traffic correlation and website fingerprinting. In this work, we present TUC: first framework allows establishing guarantees in presence time-sensitive adversaries mount attacks. TUC incorporates a comprehensive notion time an asynchronous model with sequential activation, while offering compositionality properties security proofs. We apply to evaluate novel countermeasure fingerprinting Our analysis relies on formalization onion routing underlies proves rigorous

参考文章(60)
Boris Köpf, Goran Doychev, Michael Backes, Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. network and distributed system security symposium. ,(2013)
Roger Dingledine, Nathan S. Evans, Christian Grothoff, A practical congestion attack on tor using long paths usenix security symposium. pp. 33- 50 ,(2009)
Amir Houmansadr, Nikita Borisov, The Need for Flow Fingerprints to Link Correlated Network Flows Privacy Enhancing Technologies. pp. 205- 224 ,(2013) , 10.1007/978-3-642-39077-7_11
Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas, Universally Composable Synchronous Computation Theory of Cryptography. pp. 477- 498 ,(2013) , 10.1007/978-3-642-36594-2_27
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Xinyuan Wang, Douglas S. Reeves, S. Felix Wu, Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones european symposium on research in computer security. pp. 244- 263 ,(2002) , 10.1007/3-540-45853-0_15
Ralf Küsters, Anupam Datta, John C Mitchell, Ajith Ramanathan, None, On the Relationships Between Notions of Simulation-Based Security Theory of Cryptography. pp. 476- 494 ,(2005) , 10.1007/978-3-540-30576-7_26
Sambuddho Chakravarty, Angelos Stavrou, Angelos D. Keromytis, Traffic analysis against low-latency anonymity networks using available bandwidth estimation european symposium on research in computer security. pp. 249- 267 ,(2010) , 10.1007/978-3-642-15497-3_16
Steven J. Murdoch, Piotr Zieliński, Sampled traffic analysis by internet-exchange-level adversaries privacy enhancing technologies. pp. 167- 183 ,(2007) , 10.1007/978-3-540-75551-7_11