An Extended View on Measuring Tor AS-level Adversaries
- URL: http://arxiv.org/abs/2403.08517v1
- Date: Wed, 13 Mar 2024 13:27:02 GMT
- Title: An Extended View on Measuring Tor AS-level Adversaries
- Authors: Gabriel Karl Gegenhuber, Markus Maier, Florian Holzbauer, Wilfried
Mayer, Georg Merzdovnik, Edgar Weippl, Johanna Ullrich
- Abstract summary: We use the Atlas framework to infer the risk of deanonymization for IPv4 clients in Germany and the US.
For clients in Germany and the US, the overall picture, however, has not changed since 2020.
Russian users are able to securely evade censorship using Tor.
- Score: 1.0170676980352482
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Tor provides anonymity to millions of users around the globe which has made
it a valuable target for malicious actors. As a low-latency anonymity system,
it is vulnerable to traffic correlation attacks from strong passive adversaries
such as large autonomous systems (ASes). In preliminary work, we have developed
a measurement approach utilizing the RIPE Atlas framework -- a network of more
than 11,000 probes worldwide -- to infer the risk of deanonymization for IPv4
clients in Germany and the US.
In this paper, we apply our methodology to additional scenarios providing a
broader picture of the potential for deanonymization in the Tor network. In
particular, we (a) repeat our earlier (2020) measurements in 2022 to observe
changes over time, (b) adopt our approach for IPv6 to analyze the risk of
deanonymization when using this next-generation Internet protocol, and (c)
investigate the current situation in Russia, where censorship has been
intensified after the beginning of Russia's full-scale invasion of Ukraine.
According to our results, Tor provides user anonymity at consistent quality:
While individual numbers vary in dependence of client and destination, we were
able to identify ASes with the potential to conduct deanonymization attacks.
For clients in Germany and the US, the overall picture, however, has not
changed since 2020. In addition, the protocols (IPv4 vs. IPv6) do not
significantly impact the risk of deanonymization. Russian users are able to
securely evade censorship using Tor. Their general risk of deanonymization is,
in fact, lower than in the other investigated countries. Beyond, the few ASes
with the potential to successfully perform deanonymization are operated by
Western companies, further reducing the risk for Russian users.
Related papers
- TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network [16.6364461552258]
Research revealed an unexpected pattern of substantial Tor network traffic targeting cloudless IoT devices.
We developed TORCHLIGHT, a tool designed to detect both known and unknown threats targeting cloudless IoT devices by analyzing Tor traffic.
For the first time, we have demonstrated that attackers are indeed using Tor to conceal their identities while targeting cloudless IoT devices.
arXiv Detail & Related papers (2025-01-28T08:13:02Z) - Seldom: An Anonymity Network with Selective Deanonymization [4.701818757220776]
We design Seldom, an anonymity network with integrated selective deanonymization.
Seldom enables law enforcement agencies to selectively access otherwise anonymized identities of misbehaving users.
Seldom provides a practical and deployable technical solution to the inherent problem of criminal activities in anonymity networks.
arXiv Detail & Related papers (2024-12-01T22:31:31Z) - EIA: Environmental Injection Attack on Generalist Web Agents for Privacy Leakage [40.82238259404402]
We conduct the first study on the privacy risks of generalist web agents in adversarial environments.
First, we present a realistic threat model for attacks on the website, where we consider two adversarial targets: stealing users' specific PII or the entire user request.
We collect 177 action steps that involve diverse PII categories on realistic websites from the Mind2Web, and conduct experiments using one of the most capable generalist web agent frameworks to date.
arXiv Detail & Related papers (2024-09-17T15:49:44Z) - ParTEETor: A System for Partial Deployments of TEEs within Tor [6.668496876628325]
ParTEETor is a Tor-variant system that uses partial deployments of trusted execution environments to thwart known attacks.
We evaluate ParTEETor for security, performance, and privacy.
arXiv Detail & Related papers (2024-08-26T21:23:19Z) - Dissecting Adversarial Robustness of Multimodal LM Agents [70.2077308846307]
We manually create 200 targeted adversarial tasks and evaluation scripts in a realistic threat model on top of VisualWebArena.
We find that we can successfully break latest agents that use black-box frontier LMs, including those that perform reflection and tree search.
We also use ARE to rigorously evaluate how the robustness changes as new components are added.
arXiv Detail & Related papers (2024-06-18T17:32:48Z) - PRAT: PRofiling Adversarial aTtacks [52.693011665938734]
We introduce a novel problem of PRofiling Adversarial aTtacks (PRAT)
Given an adversarial example, the objective of PRAT is to identify the attack used to generate it.
We use AID to devise a novel framework for the PRAT objective.
arXiv Detail & Related papers (2023-09-20T07:42:51Z) - On the Security Risks of Knowledge Graph Reasoning [71.64027889145261]
We systematize the security threats to KGR according to the adversary's objectives, knowledge, and attack vectors.
We present ROAR, a new class of attacks that instantiate a variety of such threats.
We explore potential countermeasures against ROAR, including filtering of potentially poisoning knowledge and training with adversarially augmented queries.
arXiv Detail & Related papers (2023-05-03T18:47:42Z) - Untargeted Backdoor Attack against Object Detection [69.63097724439886]
We design a poison-only backdoor attack in an untargeted manner, based on task characteristics.
We show that, once the backdoor is embedded into the target model by our attack, it can trick the model to lose detection of any object stamped with our trigger patterns.
arXiv Detail & Related papers (2022-11-02T17:05:45Z) - An anomaly detection approach for backdoored neural networks: face
recognition as a case study [77.92020418343022]
We propose a novel backdoored network detection method based on the principle of anomaly detection.
We test our method on a novel dataset of backdoored networks and report detectability results with perfect scores.
arXiv Detail & Related papers (2022-08-22T12:14:13Z) - SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via
Siamese Heterogeneous Graph Attention Network [10.299611702673635]
IPv6 addresses could easily be correlated with user activity, endangering their privacy.
Mitigations to address this privacy concern have been deployed, making existing approaches for address-to-user correlation unreliable.
This work demonstrates that an adversary could still correlate IPv6 addresses with users accurately, even with these protection mechanisms.
arXiv Detail & Related papers (2022-04-20T13:54:10Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.