Skip to main content

Anonymity on QuickSand: Using BGP to Compromise Tor

Author(s): Vanbever, Laurent; Li, Oscar; Rexford, Jennifer; Mittal, Prateek

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1tv7c
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVanbever, Laurent-
dc.contributor.authorLi, Oscar-
dc.contributor.authorRexford, Jennifer-
dc.contributor.authorMittal, Prateek-
dc.date.accessioned2021-10-08T19:48:44Z-
dc.date.available2021-10-08T19:48:44Z-
dc.date.issued2014-10en_US
dc.identifier.citationVanbever, Laurent, Oscar Li, Jennifer Rexford, and Prateek Mittal. "Anonymity on QuickSand: Using BGP to Compromise Tor." In Proceedings of the 13th ACM Workshop on Hot Topics in Networks (2014): pp. 1-7. doi:10.1145/2670518.2673869en_US
dc.identifier.urihttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.465.6751&rep=rep1&type=pdf-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1tv7c-
dc.description.abstractAnonymity systems like Tor are known to be vulnerable to malicious relay nodes. Another serious threat comes from the Autonomous Systems (ASes) that carry Tor traffic due to their powerful eavesdropping capabilities. Indeed, an AS (or set of colluding ASes) that lies between the client and the first relay, and between the last relay and the destination, can perform timing analysis to compromise user anonymity. In this paper, we show that AS-level adversaries are much more powerful than previously thought. First, routine BGP routing changes can significantly increase the number of ASes that can analyze a user's traffic successfully. Second, ASes can actively manipulate BGP announcements to put themselves on the paths to and from relay nodes. Third, an AS can perform timing analysis even when it sees only one direction of the traffic at both communication ends. Actually, asymmetric routing increases the fraction of ASes able to analyze a user's traffic. We present a preliminary evaluation of our attacks using measurements of BGP and Tor. Our findings motivate the design of approaches for anonymous communication that are resilient to AS-level adversaries.en_US
dc.format.extent1 - 7en_US
dc.language.isoen_USen_US
dc.relation.ispartofProceedings of the 13th ACM Workshop on Hot Topics in Networksen_US
dc.rightsAuthor's manuscripten_US
dc.titleAnonymity on QuickSand: Using BGP to Compromise Toren_US
dc.typeConference Articleen_US
dc.identifier.doi10.1145/2670518.2673869-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceedingen_US

Files in This Item:
File Description SizeFormat 
AnonymityQuickSandBgpCompromise.pdf930.9 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.