2019
DOI: 10.2478/popets-2019-0069
|View full text |Cite
|
Sign up to set email alerts
|

Guard Placement Attacks on Path Selection Algorithms for Tor

Abstract: The popularity of Tor has made it an attractive target for a variety of deanonymization and fingerprinting attacks. Location-based path selection algorithms have been proposed as a countermeasure to defend against such attacks. However, adversaries can exploit the location-awareness of these algorithms by strategically placing relays in locations that increase their chances of being selected as a client’s guard. Being chosen as a guard facilitates website fingerprinting and traffic correlation attacks over ext… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 41 publications
(80 reference statements)
0
11
0
Order By: Relevance
“…Compatibility with security-focused path selection: ShorTor is also fully compatible with any modifications to Tor's path selection algorithm. Prior work has shown that existing proposals, overviewed briefly in Section VI, suffer from poor load balancing and non-uniform client behavior, hurting performance and client anonymity [12,14,36,60,61,74,85,86]. However, this does not preclude some future path selection proposal from improving upon Tor's current algorithm.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Compatibility with security-focused path selection: ShorTor is also fully compatible with any modifications to Tor's path selection algorithm. Prior work has shown that existing proposals, overviewed briefly in Section VI, suffer from poor load balancing and non-uniform client behavior, hurting performance and client anonymity [12,14,36,60,61,74,85,86]. However, this does not preclude some future path selection proposal from improving upon Tor's current algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…We quantify this advantage using MATOR by applying ShorTor to LASTor [5], a location-biased path-selection proposal. We emphasize that LASTor is not integrated in Tor and has known security flaws [86]-we include it as an illustrative example of a location-aware path selection scheme.…”
Section: B Differential Advantagementioning
confidence: 99%
See 3 more Smart Citations