〰 our glitçh-tåstic, eye-pleasing, much improved new website has made its début 〰
newly-lowered token prices 〰 snappy, responsive loadtimes 〰 mobile-friendly 〰 also really fun 〰
〰 please take a moment to visit cleanVPN.org & contribute what you can to encourage a clean, healthy, transparent VPN industry! 〰
deepDNS now routes all Tor traffic natively 〰 our webRTC research is now an opensource toolkit 〰 native, transparent .i2p 'eepsite' access in-browser via deepDNS ღ

paper: "A Critical Evaluation of Website Fingerprinting Attacks {on Tor users}" (2014) | #torkittenz

Increasingly, folks realise that hybrid network models combining multiple strong frameworks are a robust option for defense against nation-level attackers & attack vectors. Torstom, our gateway-based hybrid offering, offers a next-generation example of these new approaches.
User avatar

Topic Author
Pattern_Juggled
Site Admin
Posts: 1447
Joined: Sun Dec 16, 2012 6:34 am
Location: in the Higgs ocean...
Contact:

paper: "A Critical Evaluation of Website Fingerprinting Attacks {on Tor users}" (2014) | #torkittenz

Postby Pattern_Juggled » Wed Dec 17, 2014 8:40 am

{direct link: torkittenz.cryptostorm.org}


A Critical Evaluation of Website Fingerprinting Attacks
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, Rachel Greenstadt


ABSTRACT

Recent studies on Website Fingerprinting (WF) claim to have found highly effective attacks on Tor. However, these studies make assumptions about user settings, adversary capabilities, and the nature of the Web that do not necessarily hold in practical scenarios. The following study critically evaluates these assumptions by conducting the attack where the assumptions do not hold. We show that certain variables, for example, user’s browsing habits, differences in location and version of Tor Browser Bundle, that are usually omitted from the current WF model have a significant impact on the efficacy of the attack. We also empirically show how prior work succumbs to the base rate fallacy in the open-world scenario. We address this problem by augmenting our classification method with a verification step. We conclude that even though this approach reduces the number of false positives over 63%, it does not completely solve the problem, which remains an open issue for WF attacks.

ccs-webfp-final.pdf
(587.72 KiB) Downloaded 33 times

User avatar

Topic Author
Pattern_Juggled
Site Admin
Posts: 1447
Joined: Sun Dec 16, 2012 6:34 am
Location: in the Higgs ocean...
Contact:

#torkittenz

Postby Pattern_Juggled » Sun Dec 28, 2014 12:34 pm

This is brilliant work - #torkittenz, courtesy of Julien Savoie.

Combine it with torstorm and a class of hardened, Tor-based network configurations opens up before your eyes.

torkittenz2.png


Absolutely brilliant work. I can't think of another piece of work in recent years that had anywhere close to the "oh that's beautiful" impact on me as does this line of research: elegant, powerful, clever, deadly effective as a defensive technique.

Torkittenz: https://lu376epcoakc6izi.torstorm.org/
(or Tor-direct via: http://lu376epcoakc6izi.onion)

torkittenz.png


Return to “torstorm.cryptostorm.org: hybrid cryptostorm/torstorm network services”

Who is online

Users browsing this forum: No registered users and 0 guests