Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society 2007
DOI: 10.1145/1314333.1314336
|View full text |Cite
|
Sign up to set email alerts
|

Low-resource routing attacks against tor

Abstract: Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity is due in part to its perceived strong anonymity properties and its relatively low latency service. Low latency is achieved through Tor's ability to balance the traffic load by optimizing Tor router selection to probabilistically favor routers with highbandwidth capabilities.We investigate how Tor's routing optimizations impact its ability to provide strong anonymity. Through experiments conducted on PlanetLab, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
211
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 241 publications
(212 citation statements)
references
References 24 publications
1
211
0
Order By: Relevance
“…For this reason, it was assumed and subsequently demonstrated [3,4] that by observing both ends of a connection, timing patterns are enough to confirm a suspected link between sender and receiver. This attack has also been shown to work even if only a small proportion (e.g.…”
Section: Threat Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…For this reason, it was assumed and subsequently demonstrated [3,4] that by observing both ends of a connection, timing patterns are enough to confirm a suspected link between sender and receiver. This attack has also been shown to work even if only a small proportion (e.g.…”
Section: Threat Modelmentioning
confidence: 99%
“…This was initially adequate, but as heterogeneity of node bandwidth capabilities increased, path selection was changed to take into account bandwidth capacity of nodes. The basic algorithm is described by Bauer et al [3], and our updated description is in Section 4.…”
Section: Path Selection Algorithms For Tormentioning
confidence: 99%
See 3 more Smart Citations