DocumentCode :
2933523
Title :
Fingerprinting Tor´s hidden service log files using a timing channel
Author :
Elices, Juan A. ; Perez-Gonzalez, Fernando ; Troncoso, Carmela
Author_Institution :
Electr. & Comput. Eng. Dept., Univ. of New Mexico, Albuquerque, NM, USA
fYear :
2011
fDate :
Nov. 29 2011-Dec. 2 2011
Firstpage :
1
Lastpage :
6
Abstract :
Hidden services are anonymously hosted services that can be accessed over Tor, an anonymity network. In this paper we present an attack that allows an entity to prove, once a machine suspect to host a hidden server has been confiscated, that such machine has in fact hosted a particular content. Our solution is based on leaving a timing channel fingerprint in the confiscated machine´s log file. In order to be able to fingerprint the log server through Tor we first study the noise sources: the delay introduced by Tor and the log entries due to other users. We then describe our fingerprint method, and analytically determine the detection probability and the rate of false positives. Finally, we empirically validate our results.
Keywords :
Internet; computer network security; Internet; Tor hidden service log file fingerprinting; anonymity network; anonymously hosted services; timing channel fingerprint; Educational institutions; Law enforcement;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Forensics and Security (WIFS), 2011 IEEE International Workshop on
Conference_Location :
Iguacu Falls
Print_ISBN :
978-1-4577-1017-9
Electronic_ISBN :
978-1-4577-1018-6
Type :
conf
DOI :
10.1109/WIFS.2011.6123154
Filename :
6123154
Link To Document :
بازگشت