Skip to main content

Showing 1–1 of 1 results for author: Abdelberi, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:1103.1518  [pdf, ps, other

    cs.NI

    One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

    Authors: Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Dali Kaafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous

    Abstract: Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in practi… ▽ More

    Submitted 8 March, 2011; originally announced March 2011.

    Journal ref: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11) (2011)