Anonymity systems like Tor are known to be vulnerable to malicious relay nodes. Another serious threat comes from the Autonomous Systems (ASes) that carry Tor traffic due to their powerful eavesdropping capabilities. Indeed, an AS (or set of colluding ASes) that lies between the client and the first relay, and between the last relay and the destination, can perform timing analysis to compromise user anonymity. In this paper, we show that AS-level adversaries are much more powerful than previously thought. First, routine BGP rout-ing changes can significantly increase the number of ASes that can analyze a user’s traffic successfully. Second, ASes can actively manipulate BGP announcements to put them-selves on the paths to and from relay node...
peer reviewedTor is a widely used anonymity network providing low-latency communication capabilities...
peer reviewedTor is a widely used anonymity network providing low-latency communication capabilities...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
The Tor network is a widely used system for anony-mous communication. However, Tor is known to be vu...
The Tor network is a widely used system for anony-mous communication. However, Tor is known to be vu...
The Tor network is a widely used system for anony-mous communication. However, Tor is known to be vu...
The popularity of Tor as an anonymity system has made it a popular target for a variety of attacks i...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
The recent public disclosure of mass surveillance of electronic communication, involving powerful go...
peer reviewedTor is one of the most widely used tools for providing anonymity on the Internet. We ha...
peer reviewedTor is one of the most widely used tools for providing anonymity on the Internet. We ha...
peer reviewedTor is one of the most widely used tools for providing anonymity on the Internet. We ha...
This thesis analyzes the threat of autonomous system (AS) and Internet exchange (IX) level adversari...
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity ...
Tor is a widely used anonymity network providing low-latency communication capabilities. The anonymi...
peer reviewedTor is a widely used anonymity network providing low-latency communication capabilities...
peer reviewedTor is a widely used anonymity network providing low-latency communication capabilities...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...
The Tor network is a widely used system for anony-mous communication. However, Tor is known to be vu...
The Tor network is a widely used system for anony-mous communication. However, Tor is known to be vu...
The Tor network is a widely used system for anony-mous communication. However, Tor is known to be vu...
The popularity of Tor as an anonymity system has made it a popular target for a variety of attacks i...
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Nichola...
The recent public disclosure of mass surveillance of electronic communication, involving powerful go...
peer reviewedTor is one of the most widely used tools for providing anonymity on the Internet. We ha...
peer reviewedTor is one of the most widely used tools for providing anonymity on the Internet. We ha...
peer reviewedTor is one of the most widely used tools for providing anonymity on the Internet. We ha...
This thesis analyzes the threat of autonomous system (AS) and Internet exchange (IX) level adversari...
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its popularity ...
Tor is a widely used anonymity network providing low-latency communication capabilities. The anonymi...
peer reviewedTor is a widely used anonymity network providing low-latency communication capabilities...
peer reviewedTor is a widely used anonymity network providing low-latency communication capabilities...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, soluti...