Skip to main content

Showing 1–6 of 6 results for author: Edmundson, A

.
  1. arXiv:1806.11278  [pdf, other

    cs.CR

    How Do Tor Users Interact With Onion Services?

    Authors: Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Zuk, Marshini Chetty, Nick Feamster

    Abstract: Onion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names that are long and difficult for humans to read. In this paper, we study how people perceive, understand, and use onion services based on data from 17 semi-structu… ▽ More

    Submitted 29 June, 2018; originally announced June 2018.

    Comments: Appeared in USENIX Security Symposium 2018

    Journal ref: USENIX Security Symposium, Baltimore, Maryland, August 2018

  2. Oblivious DNS: Practical Privacy for DNS Queries

    Authors: Paul Schmitt, Anne Edmundson, Nick Feamster

    Abstract: Virtually every Internet communication typically involves a Domain Name System (DNS) lookup for the destination server that the client wants to communicate with. Operators of DNS recursive resolvers---the machines that receive a client's query for a domain name and resolve it to a corresponding IP address---can learn significant information about client activity. Past work, for example, indicates… ▽ More

    Submitted 11 December, 2018; v1 submitted 1 June, 2018; originally announced June 2018.

  3. arXiv:1711.01478  [pdf, other

    cs.NI

    OCDN: Oblivious Content Distribution Networks

    Authors: Anne Edmundson, Paul Schmitt, Nick Feamster, Jennifer Rexford

    Abstract: As publishers increasingly use Content Distribution Networks (CDNs) to distribute content across geographically diverse networks, CDNs themselves are becoming unwitting targets of requests for both access to user data and content takedown. From copyright infringement to moderation of online speech, CDNs have found themselves at the forefront of many recent legal quandaries. At the heart of the ten… ▽ More

    Submitted 4 November, 2017; originally announced November 2017.

  4. arXiv:1704.00843  [pdf, other

    cs.CR cs.NI

    Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks

    Authors: Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal

    Abstract: Tor is vulnerable to network-level adversaries who can observe both ends of the communication to deanonymize users. Recent work has shown that Tor is susceptible to the previously unknown active BGP routing attacks, called RAPTOR attacks, which expose Tor users to more network-level adversaries. In this paper, we aim to mitigate and detect such active routing attacks against Tor. First, we present… ▽ More

    Submitted 5 April, 2017; v1 submitted 3 April, 2017; originally announced April 2017.

    Comments: Appearing at IEEE S&P 2017

  5. arXiv:1605.07685  [pdf, other

    cs.NI

    Characterizing and Avoiding Routing Detours Through Surveillance States

    Authors: Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford

    Abstract: An increasing number of countries are passing laws that facilitate the mass surveillance of Internet traffic. In response, governments and citizens are increasingly paying attention to the countries that their Internet traffic traverses. In some cases, countries are taking extreme steps, such as building new Internet Exchange Points (IXPs), which allow networks to interconnect directly, and encour… ▽ More

    Submitted 24 May, 2016; originally announced May 2016.

  6. arXiv:1503.03940  [pdf, other

    cs.NI cs.CR

    RAPTOR: Routing Attacks on Privacy in Tor

    Authors: Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal

    Abstract: The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-… ▽ More

    Submitted 12 March, 2015; originally announced March 2015.