PCP: Preemptive Circuit Padding against Tor circuit fingerprinting

03/05/2021
by   George Kadianakis, et al.
0

Online anonymity and privacy has been based on confusing the adversary by creating indistinguishable network elements. Tor is the largest and most-used deployed anonymity system, designed against realistic modern adversaries. Recently, researchers have managed to fingerprint Tor's circuits - and hence the type of underlying traffic - simply by capturing and analyzing traffic traces. In this work, we study the circuit fingerprinting problem, isolating it from website fingerprinting, and revisit previous findings in this model, showing that accurate attacks are possible even when the application-layer traffic is identical. We then proceed to incrementally create defenses against circuit fingerprinting, using a generic adaptive padding framework for Tor based on WTF-PAD. We present a simple but high-latency defense, as well as a more advanced low-latency one which can effectively hide onion service circuits with no additional delays. We thoroughly evaluate both defenses, both analytically and experimentally, discovering new subtle fingerprints, but also showing the effectiveness of our defenses.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/15/2022

This is not the padding you are looking for! On the ineffectiveness of QUIC PADDING against website fingerprinting

Website fingerprinting (WF) is a well-know threat to users' web privacy....
research
11/26/2020

Towards Effective and Efficient Padding Machines for Tor

Tor recently integrated a circuit padding framework for creating padding...
research
12/11/2020

RegulaTOR: A Powerful Website Fingerprinting Defense

Website Fingerprinting (WF) attacks are used by passive, local attackers...
research
11/24/2021

WFDefProxy: Modularly Implementing and Empirically Evaluating Website Fingerprinting Defenses

Tor, an onion-routing anonymity network, has been shown to be vulnerable...
research
05/13/2021

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey

Deep Neural Network (DNN), one of the most powerful machine learning alg...
research
08/28/2018

Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits

We model and analyze passive adversaries that monitors Tor traffic cross...
research
08/04/2022

Padding-only defenses add delay in Tor

Website fingerprinting is an attack that uses size and timing characteri...

Please sign up or login with your details

Forgot password? Click here to reset