Collaborative red teaming for anonymity system evaluation

作者: Chris Wacek , Micah Sherr , Sandy Clark , Boon Thau Loo , Jonathan Smith

DOI:

关键词:

摘要: This paper describes our experiences as researchers and developers during red teaming exercises of the SAFEST anonymity system. We argue that properly evaluating an system -- particularly one makes use topological information diverse relay selection strategies, does SAFEST-- presents unique challenges are not addressed using traditional techniques. present efforts towards meeting these challenges, discuss advantages a collaborative paradigm in which play supporting role evaluation process.

参考文章(16)
Rob Jansen, Nicholas Hooper, Shadow: Running Tor in a Box for Accurate and Efficient Experimentation network and distributed system security symposium. ,(2011) , 10.21236/ADA559181
Christopher Soghoian, Enforced Community Standards for Research on Users of the Tor Anonymity Network Financial Cryptography and Data Security. pp. 146- 153 ,(2012) , 10.1007/978-3-642-29889-9_13
Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State, Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack Lecture Notes in Computer Science. pp. 201- 221 ,(2011) , 10.1007/978-3-642-23644-0_11
Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker, Shining Light in Dark Places: Understanding the Tor Network Privacy Enhancing Technologies. pp. 63- 76 ,(2008) , 10.1007/978-3-540-70630-4_5
H. J. Podell, Sushil G. Jajodia, Marshall D. Abrams, Information Security: An Integrated Collection of Essays ,(1994)
William R. Marczak, Micah Sherr, Andrew Mao, Matthew A Blaze, Wenchao Zhou, Boon Thau Loo, A³: An Extensible Platform for Application-Aware Anonymity network and distributed system security symposium. ,(2010)
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Micah Sherr, Matt Blaze, Boon Thau Loo, Scalable Link-Based Relay Selection for Anonymous Routing privacy enhancing technologies. pp. 73- 93 ,(2009) , 10.1007/978-3-642-03168-7_5
Jelena Mirkovic, Terry V. Benzel, Ted Faber, Robert Braden, John T. Wroclawski, Stephen Schwab, The DETER project: Advancing the science of cyber security experimentation and test ieee international conference on technologies for homeland security. pp. 1- 7 ,(2010) , 10.1109/THS.2010.5655108
Richard R. Linde, Operating system penetration Proceedings of the May 19-22, 1975, national computer conference and exposition on - AFIPS '75. pp. 361- 368 ,(1975) , 10.1145/1499949.1500018