Authors
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
Publication date
2014/7/16
Conference
International Symposium on Privacy Enhancing Technologies Symposium
Pages
304-331
Publisher
Springer International Publishing
Description
Tor exit relays are operated by volunteers and together push more than 1 GiB/s of network traffic. By design, these volunteers are able to inspect and modify the anonymized network traffic. In this paper, we seek to expose such malicious exit relays and document their actions. First, we monitored the Tor network after developing two fast and modular exit relay scanners—one for credential sniffing and one for active MitM attacks. We implemented several scanning modules for detecting common attacks and used them to probe all exit relays over a period of several months. We discovered numerous malicious exit relays engaging in a multitude of different attacks. To reduce the attack surface users are exposed to, we patched Torbutton, an existing browser extension and part of the Tor Browser Bundle, to fetch and compare suspicious X.509 certificates over independent Tor circuits. Our work makes it possible to …
Total citations
2014201520162017201820192020202120222023202481121161881111992
Scholar articles
P Winter, R Köwer, M Mulazzani, M Huber… - … 14th International Symposium, PETS 2014, Amsterdam …, 2014