TUC: Time-Sensitive and Modular Analysis of Anonymous Communication

Download Now
Provided by: Saarixx Labs
Topic: Security
Format: PDF
The Anonymous Communication (AC) protocol tor constitutes the most widely deployed technology for providing anonymity for user communication over the internet. Tor has been subject to several analyzes which have shown strong anonymity guarantees for tor. However, all previous analyses ignore time-sensitive leakage: timing patterns in web traffic allow for attacks such as website fingerprinting and traffic correlation, which completely break the anonymity provided by tor. For conducting a thorough and comprehensive analysis of tor that in particular includes all of these time-sensitive attacks, one of the main obstacles is the lack of a rigorous framework that allows for a time-sensitive analysis of complex AC protocols.
Download Now

Find By Topic