Title
POSTER: Fingerprinting Tor Hidden Services.
Abstract
The website fingerprinting attack aims to infer the content of encrypted and anonymized connections by analyzing patterns from the communication such as packet sizes, their order, and direction. Although recent study has shown that no existing fingerprinting method scales in Tor when applied in realistic settings, this does not consider the case of Tor hidden services. In this work, we propose a two-phase fingerprinting approach applied in the scope of Tor hidden services and explore its scalability. We show that the success of the only previously proposed fingerprinting attack against hidden services strongly depends on the Tor version used; i.e., it may be applicable to less than 1.5% of connections to hidden services due to its requirement for control of the first anonymization node. In contrast, in our method, the attacker needs merely to be somewhere on the link between the client and the first anonymization node and the attack can be mounted for any connection to a hidden service.
Year
DOI
Venue
2016
10.1145/2976749.2989054
ACM Conference on Computer and Communications Security
Keywords
Field
DocType
Tor Hidden Services, Website Fingerprinting, Privacy
Internet privacy,Computer security,Computer science,Network packet,Encryption,Scalability
Conference
Citations 
PageRank 
References 
1
0.35
4
Authors
6
Name
Order
Citations
PageRank
Asya Mitseva193.25
Andriy Panchenko230923.05
Fabian Lanze3524.66
Martin Henze429524.86
Klaus Wehrle51062105.97
Thomas Engel645542.34