Browser-based attacks on Tor

被引:0
|
作者
Abbott, Timothy G.
Lai, Katherine J.
Lieberman, Michael R.
Price, Eric C.
机构
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user's web browser into sending a distinctive signal over the Tor network that can be detected using traffic analysis. It is delivered by a malicious exit node using a man-in-the-middle attack on HTTP. Both the attack and the traffic analysis can be performed by an adversary with limited resources. While the attack can only succeed if the attacker controls one of the victim's entry guards, the method reduces the time required for a traffic analysis attack on Tor from O(nk) to O(n + k), where n is the number of exit nodes and k is the number of entry guards. This paper presents techniques that exploit the Tor exit policy system to greatly simplify the traffic analysis. The fundamental vulnerability exposed by this paper is not specific to Tor but rather to the problem of anonymous web browsing itself. This paper also describes a related attack on users who toggle the use of Tor with the popular Firefox extension Torbutton.
引用
收藏
页码:184 / 199
页数:16
相关论文
共 50 条
  • [1] Ramping up the response to browser-based attacks
    McVey, Tom
    [J]. Network Security, 2023, 2023 (09)
  • [2] Mitigating Browser-based DDoS Attacks using CORP
    Agrawall, Akash
    Chaitanya, Krishna
    Agrawal, Arnav Kumar
    Choppella, Venkatesh
    [J]. PROCEEDINGS OF THE 10TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, 2017, : 137 - 146
  • [3] iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices
    Kim, Jason
    van Schaik, Stephan
    Genkin, Daniel
    Yarom, Yuval
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2038 - 2052
  • [4] Browser-Based CPU Fingerprinting
    Trampert, Leon
    Rossow, Christian
    Schwarz, Michael
    [J]. COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 87 - 105
  • [5] Browser model for security analysis of browser-based protocols
    Gross, T
    Pfitzmann, B
    Sadeghi, AR
    [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 489 - 508
  • [6] Why browser-based predictive maintenance?
    Fillion, E
    [J]. PULP & PAPER-CANADA, 2003, 104 (01) : 23 - +
  • [7] Browser-Based Intrusion Prevention System
    Erete, Ikpeme
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 371 - 373
  • [8] A Browser-Based Kerberos Authentication Scheme
    Gajek, Sebastian
    Jager, Tibor
    Manulis, Mark
    Schwenk, Joeg
    [J]. COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 115 - +
  • [9] A first look at browser-based cryptojacking
    Eskandari, Shayan
    Leoutsarakos, Andreas
    Mursch, Troy
    Clark, Jeremy
    [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 58 - 66
  • [10] BREF - BRowser-based Evaluation Framework
    Schoeffel, Sebastian
    Schwank, Johannes
    Staerz, Jan
    Ebert, Achim
    van der Veer, Gerrit
    [J]. DIS'17 COMPANION: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON DESIGNING INTERACTIVE SYSTEMS, 2017, : 313 - 316