2018
DOI: 10.1515/popets-2018-0019
|View full text |Cite
|
Sign up to set email alerts
|

Tempest: Temporal Dynamics in Anonymity Systems

Abstract: Many recent proposals for anonymous communication omit from their security analyses a consideration of the effects of time on important system components. In practice, many components of anonymity systems, such as the client location and network structure, exhibit changes and patterns over time. In this paper, we focus on the effect of such temporal dynamics on the security of anonymity networks. We present Tempest, a suite of novel attacks based on (1) client mobility, (2) usage patterns, and (3) changes in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 44 publications
0
7
0
Order By: Relevance
“…Even though a single AS could serve thousands of Tor clients, identification of a Tor client's AS can be dangerous. As noted by Wails et al [36], knowledge of a client's AS is problematic for three unique reasons: (1) The client AS can be tar-geted to divulge a user's real identity; (2) the diversity of a client's attributes (e.g. physical location) is much lower in a single AS and could be combined with auxiliary information to perform deanonymization; (3) the client AS can be used to link connections and profile Tor clients.…”
Section: Adversary Modelmentioning
confidence: 76%
See 1 more Smart Citation
“…Even though a single AS could serve thousands of Tor clients, identification of a Tor client's AS can be dangerous. As noted by Wails et al [36], knowledge of a client's AS is problematic for three unique reasons: (1) The client AS can be tar-geted to divulge a user's real identity; (2) the diversity of a client's attributes (e.g. physical location) is much lower in a single AS and could be combined with auxiliary information to perform deanonymization; (3) the client AS can be used to link connections and profile Tor clients.…”
Section: Adversary Modelmentioning
confidence: 76%
“…However, this results in a decrease in guard relay randomness, which in turn leaks probabilistic information about client origin ASes. A major drawback of their approach is thus a significant decrease in the Shannon entropy of client source ASes over time, allowing client ASes to be statistically fingerprinted [26,36]. These fingerprinting attacks allow adversaries to link a client to her source AS.…”
Section: Introductionmentioning
confidence: 99%
“…In practice, many components of anonymous systems, such as network structures and communication components, change over time [79]. In particular, the communication performance of routing nodes in a network, such as bandwidth, communication delay, etc., will change over time.…”
Section: B Transmission Side: Lack Of Security Considerations For Himentioning
confidence: 99%
“…That is, if the adversary is located at the exit node (and hence knows the destination), the security properties of dPHI and PHI hold even if d is malicious. Recently, Wails et al [31] presented attacks against various anonymity protocols in case the source or destination moves within the network and the attacker located within the path between s and d is able to link sessions. While this is an interesting type of attack, it is not part of the threat model of dPHI.…”
Section: Original Threat Modelmentioning
confidence: 99%