RAPTOR: Routing Attacks on Privacy in Tor

@inproceedings{Sun2015RAPTORRA,
  title={RAPTOR: Routing Attacks on Privacy in Tor},
  author={Yixin Sun and Anne Edmundson and Laurent Vanbever and Oscar Li and Jennifer Rexford and Mung Chiang and Prateek Mittal},
  booktitle={USENIX Security Symposium},
  year={2015}
}
The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-level adversaries can exploit the asymmetric nature of Internet routing to increase the chance of… CONTINUE READING
Highly Influential
This paper has highly influenced 11 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 74 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 56 extracted citations

Anti-RAPTOR: Anti routing attack on privacy for a securer and scalable Tor

2015 17th International Conference on Advanced Communication Technology (ICACT) • 2015
View 19 Excerpts
Highly Influenced

DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning

ACM Conference on Computer and Communications Security • 2018
View 10 Excerpts
Highly Influenced

LiLAC: Lightweight Low-Latency Anonymous Chat

2017 IEEE Symposium on Privacy-Aware Computing (PAC) • 2017
View 5 Excerpts
Highly Influenced

75 Citations

010203020152016201720182019
Citations per Year
Semantic Scholar estimates that this publication has 75 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 51 references

AND MIT- TAL, P. Anonymity on quicksand: Using BGP to compromise Tor

L. VANBEVER, LI O., J. REXFORD
In Proceedings of the 13th ACM Workshop on Hot Topics in Networks (New York, NY, USA, • 2014
View 2 Excerpts

FBI agents tracked harvard bomb threats despite Tor

R. BRANDOM
http://www.theverge.com/2013/12/18/5224130/fbiagents-tracked-harvard-bomb-threats-across-tor. Accessed, • 2014
View 1 Excerpt

Loopholes for circumventing the constitution: Warrantless bulk surveillance on americans by collecting network traffic abroad

A. ARNBAK, S. GOLDBERG
HotPETs • 2014
View 1 Excerpt

PEERING : An AS for us

K. Z ARIFIS, N. F EAM-STER, E. AND K ATZ-B ASSETT
Proceedings of the 13 th ACM Workshop on Hot Topics in Networks • 2014

PEERING: 15 An AS for us

B. SCHLINKER, K. ZARIFIS, I. CUNHA, N. FEAM- STER, E. KATZ-BASSETT
In Proceedings of the 13th ACM Workshop on Hot Topics in Networks (New York, NY, USA, • 2014
View 1 Excerpt

GCHQ taps fibre-optic cables for secret access to world’s communications

E. MACASKILL, J. BORGER, N. HOP- KINS, N. DAVIES, J. BALL
http: //www.theguardian.com/uk/2013/jun/21/ gchq-cables-secret-world-communications-nsa, • 2013
View 1 Excerpt

NSA stores metadata of millions of web users for up to a year, secret files show

J. BALL
http:// www.theguardian.com/world/2013/sep/30/ nsa-americans-metadata-year-documents, • 2013
View 1 Excerpt

Similar Papers

Loading similar papers…