Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2014)
A Critique of Website Traffic Fingerprinting Attacks Available at https://blog.torproject.org/blog/critique- website-traffic-fingerprinting-attacks
Aaron Johnson, Chris Wacek, Rob Jansen, M. Sherr, P. Syverson (2013)
Users get routed: traffic correlation on tor by realistic adversariesProceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Jansen (2014)
The Sniper Attack Anonymously Deanonymizing and Disabling the Tor Network In Network and Distributed SystemSecurity Symposium, 28
S. Hahn, Karsten Loesing (2012)
Privacy-preserving Ways to Estimate the Number of Tor Users
(2012)
Tor: The Second-Generation Onion Router
Cai (2012)
Touching from a Distance : Website Fingerprinting Attacks and Defenses In ACM Conference on Computer and CommunicationsSecurity
Hahn (2010)
Privacy - preserving Ways to Estimate the Number of Tor Users Technical Report Tor Project November, 19
Nathan Evans, Roger Dingledine, Christian Grothoff (2009)
A Practical Congestion Attack on Tor Using Long Paths
Jannotti (2000)
Overcast Reliable Multicasting with an Overlay Network In on Operating System Design ImplementationSymposium, 23
(2016)
http://www.yikyakapp.com. - 10.1515/popets-2016-0003 Downloaded from PubFactory at 07/26/2016 06:56:24PM via Georgetown
Sharad Goel, Mark Robson, Milo Polte, E. Sirer (2003)
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
Herrmann (2009)
Website Fingerprinting : Attacking Popular Technologies with the Multinomial Naive - bayes In ACM Workshop on CloudPrivacy Enhancing Computing Security, 21
Murdoch (2005)
Low Cost of Tor In on Privacy OaklandTraffic Analysis IEEE Symposium Security
http://www.theguardian.com/world/ 2014/oct/16/-sp-revealed-whisper-app-tracking-users
Mathewson (2014)
Dingledine Tor Rendezvous Specification Available at https gitweb torproject org torspec git log rend spec txt ofs
Dominik Herrmann, Rolf Wendolsky, H. Federrath (2009)
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
Henry Corrigan-Gibbs, D. Wolinsky, B. Ford (2012)
Proactively Accountable Anonymous Messaging in Verdict
(2016)
Proceedings on Privacy Enhancing Technologies
Rob Jansen, John Geddes, Chris Wacek, M. Sherr, P. Syverson (2014)
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport
Perry (2009)
Tor network analysis nd pagesProc
Johnson (2013)
Users Get Routed Correlation on Tor By Realistic Adversaries In ACM Conference on Computer and Communications NovemberTraffic Security, 29
S. Murdoch, G. Danezis (2005)
Low-cost traffic analysis of Tor2005 IEEE Symposium on Security and Privacy (S&P'05)
S. Deering, D. Cheriton (1990)
Multicast routing in datagram internetworks and extended LANsACM Trans. Comput. Syst., 8
Jansen (2013)
Lightweight Incentivized Routing for Anonymity In Network and Distributed SystemSecurity Symposium, 26
Hamel (2011)
The New Approaches to Measures in Tor Technical Report Cheriton School of University of WaterlooComputer Science, 20
John Jannotti, D. Gifford, Kirk Johnson, M. Kaashoek, J. O'Toole (2000)
Overcast: reliable multicasting with on overlay network
Metrics
Tor Project Tor Portal https metrics torproject org
Hong Liu, Eugene Vasserman, Nicholas Hopper (2013)
Improved group off-the-record messagingProceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Yang-hua Chu, Sanjay Rao, S. Seshan, Hui Zhang (2000)
A case for end system multicast (keynote address)IEEE J. Sel. Areas Commun., 20
Chu (2000)
Case for End System In SIGMETRICS PerformanceEvaluation Review
Reiter (1998)
Crowds Anonymity for Web Transactions on Information and SystemACM Transactions Security
D. Bernstein, N. Duif, T. Lange, P. Schwabe, Bo-Yin Yang (2011)
High-speed high-security signaturesJournal of Cryptographic Engineering, 2
John Geddes, Rob Jansen, Nicholas Hopper (2014)
IMUX: Managing Tor Connections from Two to Infinity, and BeyondProceedings of the 13th Workshop on Privacy in the Electronic Society
Liu (2013)
Improved Group Off - the - record Messaging In ACM Workshop on Privacy in the ElectronicSociety, 31
Henry Corrigan-Gibbs, B. Ford (2010)
Dissent: accountable anonymous group messagingArXiv, abs/1004.3057
S. Abercrombie (2018)
RoomsA Philosophy of Interior Design
Roger Dingledine, Nicholas Hopper, George Kadianakis, Nick Mathewson (2014)
One Fast Guard for Life ( or 9 months )
Rob Jansen, Florian Tschorsch, Aaron Johnson, B. Scheuermann (2014)
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
Geddes (2014)
Managing Tor Connections from Two to Infinity Beyond In Workshop on Privacy in the ElectronicSociety, 16
Guard (2011)
Dingledine Research Problem Better Rotation Parameters Available at https blog torproject org blog research problem better guardrotation parameters, 11
Panchenko (2011)
Website Fingerprinting in Onion Routing Based Anonymization In ACM Workshop on Privacy in the ElectronicNetworks Society
P. Francis (2000)
Yoid: Extending the Internet Multicast Architec-ture
Mike Perry (2009)
TorFlow: Tor Network Analysis
S. Murdoch, R. Watson (2008)
Metrics for Security and Performance in Low-Latency Anonymity Systems
P. Syverson (2009)
Why I'm Not an Entropist
Tor Metrics Portal
A. Hamel (2011)
The Mis-entropists : New Approaches to Measures in Tor
Lewis (2014)
Rushe http www theguardian com world oct sp revealed whisper app tracking users, 30
Rob Jansen, Kevin Bauer, Nicholas Hopper, Roger Dingledine (2012)
Methodically Modeling the Tor Network
(2014)
Tor Rendezvous Specification Available at https://gitweb.torproject.org/ torspec.git/log/rend-spec.txt?ofs=50
D. Chaum (1988)
The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1
(2011)
Research Problem: Better Guard Rotation Parameters Available at https: //blog.torproject.org/blog/research-problem-better-guard- rotation-parameters
Castro (2003)
High - Bandwidth Multicast in Cooperative Environments In on Operating Systems Principles pagesSymposium
Nicholas Hopper (2013)
Proving Security of Tor ’ s Hidden Service Identity Blinding Protocol
A. Serjantov, G. Danezis (2002)
Towards an Information Theoretic Metric for Anonymity
M. Reiter, A. Rubin (1998)
Crowds: anonymity for Web transactionsACM Trans. Inf. Syst. Secur., 1
M. Castro, P. Druschel, Anne-Marie Kermarrec, A. Rowstron (2002)
Scribe: a large-scale and decentralized application-level multicast infrastructureIEEE J. Sel. Areas Commun., 20
G. Perng, M. Reiter, Chenxi Wang (2006)
M2: Multicasting Mixes for Efficient and Anonymous Communication26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
Xiang Cai, Xin Zhang, Brijesh Joshi, Rob Johnson (2012)
Touching from a distance: website fingerprinting attacks and defensesProceedings of the 2012 ACM conference on Computer and communications security
Perng (2006)
Mixes for Efficient and Anonymous In International Conference on DistributedCommunication Computing Systems
M. Castro, P. Druschel, Anne-Marie Kermarrec, Animesh Nandi, A. Rowstron, Atul Singh (2003)
SplitStream: high-bandwidth multicast in cooperative environments
Syverson (2009)
Why not an In WorkshopSecurity Protocols
Corrigan (2010)
Accountable Anonymous Group Messaging In ACM Conference on and CommunicationsDissent Computer Security
Goel (2003)
Herbivore Efficient Protocol for Anonymous Technical report UniversityCommunication, 18
Rob Jansen, Nicholas Hopper (2011)
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
Rob Jansen, Aaron Johnson, P. Syverson (2013)
LIRA: Lightweight Incentivized Routing for Anonymity
Jansen (2012)
Shadow Running Tor in a Box for Accurate and Efficient Experimentation In Network and Distributed SystemSecurity Symposium, 24
(2013)
Next-Generation Hidden Service in Tor
ILBC
Global IP Solutions The Internet Low Bitrate Codec http tools ietf org html rfc, 17
A. Panchenko, L. Niessen, Andreas Zinnen, T. Engel (2011)
Website fingerprinting in onion routing based anonymization networksProceedings of the 10th annual ACM workshop on Privacy in the electronic society
Francis (2000)
Extending the Internet Multicast Unpublished manuscript available at https mpi sws org francis yoidArch pdfArchitecture, 15
Damon McCoy, Kevin Bauer, D. Grunwald, Tadayoshi Kohno, D. Sicker (2008)
Shining Light in Dark Places: Understanding the Tor Network
Claudia Díaz, Stefaan Seys, J. Claessens, B. Preneel (2002)
Towards Measuring Anonymity
(2014)
What Attacks Remain Against Onion Routing Available at https
(2000)
Unpublished manuscript, available at https://mpi-sws
The Internet Low Bitrate Codec (ILBC)
Chaum (1988)
The Dining Problem Unconditional Sender and Recipient ofJournal Cryptology
Hopper (2013)
Proving Security of Tor s Hidden Service Identity Blinding Protocol Technical Report Tor Project, 22
Dingledine (2014)
One Fast for Life or months In PETSPrivacy Enhancing Technologies Symposium, 13
Abstract This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing. We detail the design of MTor and then analyze its performance and anonymity. By simulating MTor in Shadow and TorPS using realistic models of the live Tor network’s topology and recent consensus records from the live Tor network, we show that MTor achieves a 29% savings in network bandwidth and a 73% reduction in transmission time as compared to the baseline approach for anonymous group communication among 20 group members. We also demonstrate that MTor scales gracefully with the number of group participants, and allows dynamic group composition over time. Importantly, as more Tor users switch to group communication, we show that the overall performance and utilization for group communication improves. Finally, we discuss the anonymity implications of MTor and measure its resistance to traffic correlation.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Apr 1, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.