Difference between revisions of "Tor"

From CryptoLUX
Jump to: navigation, search
Line 4: Line 4:
  
 
* [[Alex Biryukov]], [[Ivan Pustogarov]], [[Ralf-Philipp Weinmann]], "Content and popularity analysis of Tor hidden services", ICDCS 2014 Workshop, Madrid, Spain ([http://arxiv.org/abs/1308.6768 archive], [[Media:HS-popularityv1.pdf| paper]])
 
* [[Alex Biryukov]], [[Ivan Pustogarov]], [[Ralf-Philipp Weinmann]], "Content and popularity analysis of Tor hidden services", ICDCS 2014 Workshop, Madrid, Spain ([http://arxiv.org/abs/1308.6768 archive], [[Media:HS-popularityv1.pdf| paper]])
 
* [[Alex Biryukov]], [[Dmitry Khovratovich]], [[Ivan Pustogarov]], "Deanonymisation of clients in Bitcoin P2P network", ACM CCS 2014, Arizona, USA  ([http://arxiv.org/abs/1405.7418 early version in archive], [[Media:Ccsfp614s-biryukovATS.pdf| revised paper]])
 
 
  
  

Revision as of 09:05, 17 September 2014


  • Fabrice Thill, "Hidden Service Tracking Detection and Bandwidth Cheating in Tor Anonymity Network" Thesis (PDF)

This work focuses on Tor and has two contributions:

1. A method of detecting tracking attacks on hidden services as well as an implementation. By analyzing 39841 hidden services addresses for the year 2013 we found that at least 50 tor relays were conducting tracking attacks on a total of 45 hidden services. 2. An attack on the Tor bandwidth measurements protocol in order to obtain higher chances of being chosen for a client path, the implementation reaching a 1% probability to be chosen as an Exit node on the Tor network and the 21st highest relay, in terms of bandwidth weight, out of 5.834 active relays, while using a bandwidth only 50 KB/s.

This project was supervised by Alex Biryukov, advised by Ivan Pustogarov, September, 2014.