Tor de-anonymisation techniques

Juha Nurmi, Mikko S. Niemelä

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    5 Citations (Scopus)

    Abstract

    Tor offers a censorship-resistant and distributed platform that can provide easy-to-implement anonymity to web users, websites, and other web services. Tor enables web servers to hide their location, and Tor users can connect to these authenticated hidden services while the server and the user both stay anonymous. However, throughout the years of Tor’s existence, some users have lost their anonymity. This paper discusses the technical limitations of anonymity and the operational security challenges that Tor users will encounter. We present a hands-on demonstration of anonymity exposures that leverage traffic correlation attacks, electronic fingerprinting, operational security failures, and remote code execution. Based on published research and our experience with these methods, we will discuss what they are and how some of them can be exploited. Also, open problems, solutions, and future plans are discussed.

    Original languageEnglish
    Title of host publicationNetwork and System Security
    Subtitle of host publication11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings
    PublisherSpringer
    Pages657-671
    Number of pages15
    ISBN (Electronic)978-3-319-64701-2
    ISBN (Print)978-3-319-64700-5
    DOIs
    Publication statusPublished - 2017
    Publication typeA4 Article in conference proceedings
    EventInternational Conference on Network and System Security -
    Duration: 1 Jan 2000 → …

    Publication series

    NameLecture Notes in Computer Science
    Volume10394
    ISSN (Print)0302-9743

    Conference

    ConferenceInternational Conference on Network and System Security
    Period1/01/00 → …

    Publication forum classification

    • Publication forum level 1

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Tor de-anonymisation techniques'. Together they form a unique fingerprint.

    Cite this