Please use this identifier to cite or link to this item:
http://arks.princeton.edu/ark:/88435/dsp01m900nw755
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Mittal, Prateek | - |
dc.contributor.author | Li, Oscar | - |
dc.date.accessioned | 2015-06-26T14:38:29Z | - |
dc.date.available | 2015-06-26T14:38:29Z | - |
dc.date.created | 2015-04-30 | - |
dc.date.issued | 2015-06-26 | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/dsp01m900nw755 | - |
dc.description.abstract | Tor is a widely used system that enables Internet anonymity. However, Tor is known to be vulnerable against autonomous systems (ASes) that can observe a Tor user’s traffic between the Tor client and guard relay and also between the exit relay and destination. In this paper, we show that these attacks are just the tip of the iceberg. We present RAPTor, a new set of attacks on Tor that leverage the asymmetric and dynamic nature of Internet paths. Furthermore, we have built a Tor Path Simulation System that quantifies the impact of RAPTor on Tor security and a Traceroute Monitoring Framework that detects and analyzes RAPTor. On a whole, our work highlights the dangers of abstracting network routing in analyzing the security of anonymity systems. | en_US |
dc.format.extent | 37 pages | en_US |
dc.language.iso | en_US | en_US |
dc.title | RAPTor: Routing Attacks on Privacy in Tor | en_US |
dc.type | Princeton University Senior Theses | - |
pu.date.classyear | 2015 | en_US |
pu.department | Computer Science | en_US |
pu.pdf.coverpage | SeniorThesisCoverPage | - |
Appears in Collections: | Computer Science, 1988-2020 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
PUTheses2015-Li_Oscar.pdf | 2.76 MB | Adobe PDF | Request a copy |
Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.