Difference between revisions of "Tor"

From CryptoLUX
Jump to: navigation, search
Line 1: Line 1:
 
* [[Alex Biryukov]], [[Ivan Pustogarov]], [[Ralf-Philipp Weinmann]], "TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks", ESORICS 2012, ([[Media:TorScan.pdf‎‎| paper]]  [[Media:‎ESORICS-2012-Presentation-2.pdf|slides]])
 
* [[Alex Biryukov]], [[Ivan Pustogarov]], [[Ralf-Philipp Weinmann]], "TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks", ESORICS 2012, ([[Media:TorScan.pdf‎‎| paper]]  [[Media:‎ESORICS-2012-Presentation-2.pdf|slides]])
  
* [[Alex Biryukov]], [[Ivan Pustogarov]], [[Ralf-Philipp Weinmann]], "Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization", IEEE S&P 2013, ([[Media:Tor-HS-deanonymization.pdf‎| paper]], [[Media:SnP2013-noanimation.pdf‎|slides]])
+
* [[Alex Biryukov]], [[Ivan Pustogarov]], [[Ralf-Philipp Weinmann]], "Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization", Security and Privacy Symposium 2013, ([[Media:Tor-HS-deanonymization.pdf‎| paper]], [[Media:SnP2013-noanimation.pdf‎|slides]])
  
 
* [[Alex Biryukov]], [[Ivan Pustogarov]], [[Ralf-Philipp Weinmann]], "Content and popularity analysis of Tor hidden services", ICDCS 2014 Workshop, Madrid, Spain ([http://arxiv.org/abs/1308.6768 archive], [[Media:HS-popularityv1.pdf| paper]])
 
* [[Alex Biryukov]], [[Ivan Pustogarov]], [[Ralf-Philipp Weinmann]], "Content and popularity analysis of Tor hidden services", ICDCS 2014 Workshop, Madrid, Spain ([http://arxiv.org/abs/1308.6768 archive], [[Media:HS-popularityv1.pdf| paper]])
  
 +
* [[Alex Biryukov]], [[Ivan Pustogarov]], "Bitcoin over Tor isn't a good idea", IEEE Security and Privacy Symposium 2015, ([[Media:1410.6079v2.pdf‎| paper]], [[Media:SnP-2015-pustogarov.pdf‎|slides]])
  
*     Fabrice Thill, "Hidden Service Tracking Detection and Bandwidth Cheating in Tor Anonymity Network" [[Media:Tor_Issues_Thesis_Thill_Fabrice.pdf|Thesis (PDF)]]
+
* Fabrice Thill, "Hidden Service Tracking Detection and Bandwidth Cheating in Tor Anonymity Network" [[Media:Tor_Issues_Thesis_Thill_Fabrice.pdf|Thesis (PDF)]]
  
 
This work focuses on Tor and has two contributions:
 
This work focuses on Tor and has two contributions:

Revision as of 10:07, 22 May 2015

  • Fabrice Thill, "Hidden Service Tracking Detection and Bandwidth Cheating in Tor Anonymity Network" Thesis (PDF)

This work focuses on Tor and has two contributions:

1. A method of detecting tracking attacks on hidden services as well as an implementation. By analyzing 39841 hidden services addresses for the year 2013 we found that at least 50 tor relays were conducting tracking attacks on a total of 45 hidden services. 2. An attack on the Tor bandwidth measurements protocol in order to obtain higher chances of being chosen for a client path, the implementation reaching a 1% probability to be chosen as an Exit node on the Tor network and the 21st highest relay, in terms of bandwidth weight, out of 5.834 active relays, while using a bandwidth only 50 KB/s.

This project was supervised by Alex Biryukov, advised by Ivan Pustogarov, September, 2014.