ABSTRACT
Most traditional techniques for Tor user de-anonymization rely on the use of server-side originating traffic watermarks. In this poster, we outline the key ideas behind our novel client-side originating watermark scheme and describe some possible ways of how this scheme could be implemented in practice. We also demonstrate the superior real-world performance of this approach vs. those previously discussed in the literature.
- Tor Project. Retrieved July 15, 2023 from https://www.torproject.org/ [Accessed Jul. 15, 2023Google Scholar
- D. Arp, F. Yamaguchi, and K. Rieck, "Torben," Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015. doi:10.1145/2714576.2714627Google ScholarDigital Library
Index Terms
- Poster: Novel Client-Side Watermarking Technique for Tor User De-Anonymization
Recommendations
Tor forensics: Proposed workflow for client memory artefacts
AbstractThe Internet is now part of everyday life, and plays a significant role in communication, online shopping, online banking, etc. However, one of the current issues with using the Internet is lack of security since it is still possible ...
Improving the Privacy of Tor Onion Services
Applied Cryptography and Network SecurityAbstractOnion services enable bidirectional anonymity for parties that communicate over the Tor network, thus providing improved privacy properties compared to standard TLS connections. Since these services are designed to support server-side anonymity, ...
Novel blind multiple watermarking technique for images
Three novel blind watermarking techniques are proposed to embed watermarks into digital images for different purposes. The watermarks are designed to be decoded or detected without the original images. The first one, called single watermark embedding (...
Comments