메뉴 건너뛰기




Volumn , Issue , 2009, Pages 71-80

Hashing it out in public: Common failure modes of DHT-based anonymity schemes

Author keywords

Anonymity; Peer to peer networks; Selective denial of service

Indexed keywords

ACTIVE ADVERSARY; ANONYMOUS COMMUNICATION SYSTEMS; ANONYMOUS ROUTING; DENIAL OF SERVICE; DESIGN FLAWS; DHT ROUTING; DISTRIBUTED HASH TABLE; PEER TO PEER; RELAY SELECTION; SECURITY MECHANISM; SECURITY REQUIREMENTS;

EID: 74049164513     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1655188.1655199     Document Type: Conference Paper
Times cited : (11)

References (44)
  • 1
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • Proceedings of Information Hiding Workshop IH 2001, April, I. S. Moskowitz, Ed, Springer-Verlag
    • BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of Information Hiding Workshop (IH 2001) (April 2001), I. S. Moskowitz, Ed., Springer-Verlag, LNCS 2137, pp. 245-257.
    • (2001) LNCS , vol.2137 , pp. 245-257
    • BACK, A.1    MÖLLER, U.2    STIGLIC, A.3
  • 2
    • 35248893039 scopus 로고    scopus 로고
    • GAP - practical anonymous networking
    • Proceedings of Privacy Enhancing Technologies workshop PET 2003, March, R. Dingledine, Ed, Springer-Verlag
    • BENNETT, K., AND GROTHOFF, C. GAP - practical anonymous networking. In Proceedings of Privacy Enhancing Technologies workshop (PET 2003) (March 2003), R. Dingledine, Ed., Springer-Verlag, LNCS 2760, pp. 141-160.
    • (2003) LNCS , vol.2760 , pp. 141-160
    • BENNETT, K.1    GROTHOFF, C.2
  • 3
    • 84957805506 scopus 로고    scopus 로고
    • Dummy traffic against long term intersection attacks
    • Proceedings of Privacy Enhancing Technologies workshop PET 2002, April, R. Dingledine and P. Syverson, Eds, Springer-Verlag
    • BERTHOLD, O., AND LANGOS, H. Dummy traffic against long term intersection attacks. In Proceedings of Privacy Enhancing Technologies workshop (PET 2002) (April 2002), R. Dingledine and P. Syverson, Eds., Springer-Verlag, LNCS 2482.
    • (2002) LNCS , vol.2482
    • BERTHOLD, O.1    LANGOS, H.2
  • 4
    • 56649105529 scopus 로고    scopus 로고
    • Denial of service or denial of security? How attacks on reliability can compromise anonymity
    • October
    • BORISOV, N., DANEZIS, G., MITTAL, P., AND TABRIZ, P. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In Proceedings of CCS 2007 (October 2007).
    • (2007) Proceedings of CCS 2007
    • BORISOV, N.1    DANEZIS, G.2    MITTAL, P.3    TABRIZ, P.4
  • 7
    • 47949109162 scopus 로고    scopus 로고
    • CIACCIO, G. Improving sender anonymity in a structured overlay with imprecise routing. In Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006) (Cambridge, UK, June 2006), G. Danezis and P. Golle, Eds., Springer, pp. 190-207.
    • CIACCIO, G. Improving sender anonymity in a structured overlay with imprecise routing. In Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006) (Cambridge, UK, June 2006), G. Danezis and P. Golle, Eds., Springer, pp. 190-207.
  • 8
    • 74049134136 scopus 로고    scopus 로고
    • CLAYTON, R. A Few Design Critiques. at 3rd Workshop on Privacy Enhancing Technologies, 2003.
    • CLAYTON, R. A Few Design Critiques. at 3rd Workshop on Privacy Enhancing Technologies, 2003.
  • 9
    • 1642367651 scopus 로고    scopus 로고
    • online essay:, 1994, */http://obscura.com/~loki/remailer-essay.html
    • COTTRELL, L. Mixmaster and remailer attacks. online essay: http://web.archive.org/web/*/http: //obscura.com/~loki/remailer-essay. html, 1994.
    • Mixmaster and remailer attacks
    • COTTRELL, L.1
  • 10
    • 84904332394 scopus 로고    scopus 로고
    • Statistical disclosure attacks: Traffic confirmation in open environments
    • Athens, May, and, Eds, IFIP TC11, Kluwer, pp
    • DANEZIS, G. Statistical disclosure attacks: Traffic confirmation in open environments. In Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003) (Athens, May 2003), Gritzalis, Vimercati, Samarati, and Katsikas, Eds., IFIP TC11, Kluwer, pp. 421-426.
    • (2003) Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003) , pp. 421-426
    • DANEZIS, G.1
  • 11
    • 24344460554 scopus 로고    scopus 로고
    • The traffic analysis of continuous-time mixes
    • Proceedings of Privacy Enhancing Technologies workshop PET 2004, May of
    • DANEZIS, G. The traffic analysis of continuous-time mixes. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004) (May 2004), vol. 3424 of LNCS, pp. 35-50.
    • (2004) LNCS , vol.3424 , pp. 35-50
    • DANEZIS, G.1
  • 13
    • 35048895319 scopus 로고    scopus 로고
    • Statistical disclosure or intersection attacks on anonymity systems
    • Proceedings of 6th Information Hiding Workshop IH 2004, Toronto, May
    • DANEZIS, G., AND SERJANTOV, A. Statistical disclosure or intersection attacks on anonymity systems. In Proceedings of 6th Information Hiding Workshop (IH 2004) (Toronto, May 2004), LNCS.
    • (2004) LNCS
    • DANEZIS, G.1    SERJANTOV, A.2
  • 14
    • 74049083463 scopus 로고    scopus 로고
    • DANEZIS, G., AND SYVERSON, P. Bridging and fingerprinting: Epistemic attacks on route selection. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 133-150.
    • DANEZIS, G., AND SYVERSON, P. Bridging and fingerprinting: Epistemic attacks on route selection. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 133-150.
  • 21
    • 35248900308 scopus 로고    scopus 로고
    • Limits of anonymity in open environments
    • Proceedings of Information Hiding Workshop IH 2002, October, F. Petitcolas, Ed, Springer-Verlag
    • KESDOGAN, D., AGRAWAL, D., AND PENZ, S. Limits of anonymity in open environments. In Proceedings of Information Hiding Workshop (IH 2002) (October 2002), F. Petitcolas, Ed., Springer-Verlag, LNCS 2578.
    • (2002) LNCS , vol.2578
    • KESDOGAN, D.1    AGRAWAL, D.2    PENZ, S.3
  • 22
    • 74049141876 scopus 로고    scopus 로고
    • LANDSIEDEL, O., PIMENIDIS, L., WEHRLE, K., NIEDERMAYER, H., AND CARLE, G. Core: A Peer-To-Peer Based Connectionless Onion Router. In Proceedings of IEEE GLOBECOM, Globalcommunications Conference (Washington DC, USA, November 2007).
    • LANDSIEDEL, O., PIMENIDIS, L., WEHRLE, K., NIEDERMAYER, H., AND CARLE, G. Core: A Peer-To-Peer Based Connectionless Onion Router. In Proceedings of IEEE GLOBECOM, Globalcommunications Conference (Washington DC, USA, November 2007).
  • 23
    • 12344261863 scopus 로고    scopus 로고
    • Wongoo: A peer-to-peer protocol for anonymous communication
    • H. R. Arabnia, Ed, CSREA Press, pp
    • LU, T., FANG, B., SUN, Y., AND CHENG, X. Wongoo: A peer-to-peer protocol for anonymous communication. In PDPTA (2004), H. R. Arabnia, Ed., CSREA Press, pp. 1102-1106.
    • (2004) PDPTA , pp. 1102-1106
    • LU, T.1    FANG, B.2    SUN, Y.3    CHENG, X.4
  • 25
    • 70349273917 scopus 로고    scopus 로고
    • MITTAL, P., AND BORISOV, N. Information leaks in structured peer-to-peer anonymous communication systems. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008) (Alexandria, Virginia, USA, October 2008), P. Syverson, S. Jha, and X. Zhang, Eds., ACM Press, pp. 267-278.
    • MITTAL, P., AND BORISOV, N. Information leaks in structured peer-to-peer anonymous communication systems. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008) (Alexandria, Virginia, USA, October 2008), P. Syverson, S. Jha, and X. Zhang, Eds., ACM Press, pp. 267-278.
  • 26
    • 34547339276 scopus 로고    scopus 로고
    • Hot or not: Revealing hidden services by their clock skew
    • October
    • MURDOCH, S. J. Hot or not: Revealing hidden services by their clock skew. In Proceedings of CCS 2006 (October 2006).
    • (2006) Proceedings of CCS 2006
    • MURDOCH, S.J.1
  • 27
    • 27544454707 scopus 로고    scopus 로고
    • Low-cost traffic analysis of tor
    • MURDOCH, S. J., AND DANEZIS, G. Low-cost traffic analysis of tor. IEEE SP 00 (2005), 183-195.
    • (2005) IEEE SP 00 , pp. 183-195
    • MURDOCH, S.J.1    DANEZIS, G.2
  • 29
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • October
    • NAMBIAR, A., AND WRIGHT, M. Salsa: A structured approach to large-scale anonymity. In Proceedings of CCS 2006 (October 2006).
    • (2006) Proceedings of CCS 2006
    • NAMBIAR, A.1    WRIGHT, M.2
  • 31
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability July, H. Federrath, Ed, Springer-Verlag
    • RAYMOND, J.-F. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability (July 2000), H. Federrath, Ed., Springer-Verlag, LNCS 2009, pp. 10-29.
    • (2000) LNCS , pp. 10-29
    • RAYMOND, J.-F.1
  • 34
    • 0003007594 scopus 로고    scopus 로고
    • Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
    • ROWSTRON, A., AND DRUSCHEL, P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Middleware (2001).
    • (2001) Middleware
    • ROWSTRON, A.1    DRUSCHEL, P.2
  • 35
    • 35248841429 scopus 로고    scopus 로고
    • From a trickle to a flood: Active attacks on several mix types
    • Proceedings of Information Hiding Workshop IH 2002, October, F. Petitcolas, Ed, Springer-Verlag
    • SERJANTOV, A., DINGLEDINE, R., AND SYVERSON, P. From a trickle to a flood: Active attacks on several mix types. In Proceedings of Information Hiding Workshop (IH 2002) (October 2002), F. Petitcolas, Ed., Springer-Verlag, LNCS 2578.
    • (2002) LNCS , vol.2578
    • SERJANTOV, A.1    DINGLEDINE, R.2    SYVERSON, P.3
  • 39
    • 50249128196 scopus 로고    scopus 로고
    • TRONCOSO, C., GIERLICHS, B., PRENEEL, B., AND VERBAUWHEDE, I. Perfect matching statistical disclosure attacks. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 2-23.
    • TRONCOSO, C., GIERLICHS, B., PRENEEL, B., AND VERBAUWHEDE, I. Perfect matching statistical disclosure attacks. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 2-23.
  • 40
    • 74049121685 scopus 로고    scopus 로고
    • WALLACH, D. S. A survey of peer-to-peer security issues. In ISSS (2002), M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, Eds., 2609 of Lecture Notes in Computer Science, Springer, pp. 42-57.
    • WALLACH, D. S. A survey of peer-to-peer security issues. In ISSS (2002), M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, Eds., vol. 2609 of Lecture Notes in Computer Science, Springer, pp. 42-57.
  • 43
    • 10044298435 scopus 로고    scopus 로고
    • Tap: A novel tunneling approach for anonymity in structured p2p systems. In ICPP
    • ZHU, Y., AND HU, Y. Tap: A novel tunneling approach for anonymity in structured p2p systems. In ICPP (2004), IEEE Computer Society, pp. 21-28.
    • IEEE Computer Society , pp. 21-28
    • ZHU, Y.1    HU, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.