Authors
Juan A Elices, Fernando Perez-Gonzalez, Carmela Troncoso
Publication date
2011/11/29
Conference
2011 IEEE International Workshop on Information Forensics and Security
Pages
1-6
Publisher
IEEE
Description
Hidden services are anonymously hosted services that can be accessed over Tor, an anonymity network. In this paper we present an attack that allows an entity to prove, once a machine suspect to host a hidden server has been confiscated, that such machine has in fact hosted a particular content. Our solution is based on leaving a timing channel fingerprint in the confiscated machine's log file. In order to be able to fingerprint the log server through Tor we first study the noise sources: the delay introduced by Tor and the log entries due to other users. We then describe our fingerprint method, and analytically determine the detection probability and the rate of false positives. Finally, we empirically validate our results.
Total citations
20122013201420152016201720182019202020212122112
Scholar articles
JA Elices, F Perez-Gonzalez, C Troncoso - 2011 IEEE International Workshop on Information …, 2011