WiNoN - Plugging the Leaky Boat of Web Anonymity.

作者: David Isaac Wolinsky , Bryan Ford

DOI:

关键词:

摘要: Despite the attempts of well-designed anonymous communication tools to protect users from tracking or identification, flaws in surrounding software (such as web browsers) and mistakes configuration may leak user's identity. We introduce Nymix, an anonymity-centric operating system architecture designed "top-to-bottom" strengthen identity- tracking-protection. Nymix's core contribution is OS support for nym-browsing: independent, parallel, ephemeral sessions. Each session, pseudonym, runs a unique virtual machine (VM) instance evolving common base state with long-lived sessions which can be anonymously stored cloud, avoiding de-anonymization despite potential confiscation theft. Nymix allows user safely browse Web using various different transports simultaneously through pluggable model that supports Tor, Dissent, private browsing mode. In evaluations, consumes 600 MB per nymbox loads within 15 25 seconds.

参考文章(21)
Sravan Bhamidipati, Nikhil Sarda, Ashish Bijlani, Yang Tang, Roxana Geambasu, Phillip Ames, CleanOS: limiting mobile data exposure with idle eviction operating systems design and implementation. pp. 77- 91 ,(2012) , 10.5555/2387880.2387888
Henry Corrigan-Gibbs, David Isaac Wolinsky, Aaron Johnson, Bryan Ford, Scalable Anonymous Group Communication in the Anytrust Model ,(2012)
Latanya Sweeney, Replacing personally-identifying information in medical records, the Scrub system. conference of american medical informatics association. pp. 333- 337 ,(1996)
Peter Eckersley, How unique is your web browser privacy enhancing technologies. pp. 1- 18 ,(2010) , 10.1007/978-3-642-14527-8_1
Andrei Serjantov, Peter Sewell, Passive Attack Analysis for Connection-Based Anonymity Systems european symposium on research in computer security. pp. 116- 131 ,(2003) , 10.1007/978-3-540-39650-5_7
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Dogan Kedogan, Dakshi Agrawal, Stefan Penz, Limits of Anonymity in Open Environments information hiding. pp. 53- 69 ,(2002) , 10.1007/3-540-36415-3_4
Vitaly Shmatikov, Mark Silberstein, Alan M. Dunn, Michael Z. Lee, Suman Jana, Sangman Kim, Emmett Witchel, Yuanzhong Xu, Eternal sunshine of the spotless machine: protecting privacy with ephemeral channels operating systems design and implementation. pp. 61- 75 ,(2012) , 10.5555/2387880.2387887
Haohui Mai, Shuo Tang, Samuel T. King, Trust and protection in the Illinois browser operating system operating systems design and implementation. pp. 17- 31 ,(2010) , 10.5555/1924943.1924945
Christophe Guyeux, Jacques M. Bahi, Julien Voisin, The Metadata Anonymization Toolkit arXiv: Cryptography and Security. ,(2012)