Flow correlation is the core technique used in a multitude of deanonymization attacks on Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …
D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
End-to-end flow correlation attacks are among the oldest known attacks on low-latency anonymity networks, and are treated as a core primitive for traffic analysis of Tor. However …
Tor is vulnerable to network-level adversaries who can observe both ends of the communication to deanonymize users. Recent work has shown that Tor is susceptible to the …
Safeguarding blockchain peer-to-peer (P2P) networks is more critical than ever in light of recent network attacks. Bitcoin has been successfully handling traditional Sybil and eclipse …
We present ShorTor, a protocol for reducing latency on the Tor network. ShorTor uses multi- hop overlay routing, a technique typically employed by content delivery networks, to …
R Jansen, J Tracey, I Goldberg - 30th USENIX Security Symposium …, 2021 - usenix.org
Tor is a popular low-latency anonymous communication system that focuses on usability and performance: a faster network will attract more users, which in turn will improve the …
M Rahimi - Proceedings of the 2024 ACM Workshop on …, 2024 - dl.acm.org
Mix networks (mixnets) enhance anonymity at the cost of increased end-to-end latency, deterring clients from adopting mixnets for web browsing or instant messaging. This often …
Much research has investigated improving the security and performance of Tor by having Tor clients choose paths through the network in a way that depends on the client's location …