Skip to main content

Showing 1–7 of 7 results for author: Blond, S L

Searching in archive cs. Search in all archives.
.
  1. arXiv:1109.4039  [pdf, ps, other

    cs.NI

    I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy

    Authors: Stevens Le Blond, Zhang Chao, Arnaud Legout, Keith W. Ross, Walid Dabbous

    Abstract: In this paper, we show how to exploit real-time communication applications to determine the IP address of a targeted user. We focus our study on Skype, although other real-time communication applications may have similar privacy issues. We first design a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT. By calling th… ▽ More

    Submitted 16 October, 2011; v1 submitted 19 September, 2011; originally announced September 2011.

    Comments: This is the authors' version of the ACM/USENIX Internet Measurement Conference (IMC) 2011 paper

  2. arXiv:1103.1518  [pdf, ps, other

    cs.NI

    One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

    Authors: Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Dali Kaafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous

    Abstract: Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in practi… ▽ More

    Submitted 8 March, 2011; originally announced March 2011.

    Journal ref: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11) (2011)

  3. Pushing BitTorrent Locality to the Limit

    Authors: Stevens Le Blond, Arnaud Legout, Walid Dabbous

    Abstract: Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting locality… ▽ More

    Submitted 8 November, 2010; originally announced November 2010.

    Journal ref: Computer Networks (2010)

  4. arXiv:1004.1461  [pdf, ps, other

    cs.NI cs.CR

    Compromising Tor Anonymity Exploiting P2P Information Leakage

    Authors: Pere Manils, Chaabane Abdelberri, Stevens Le Blond, Mohamed Ali Kaafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous

    Abstract: Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak inf… ▽ More

    Submitted 9 April, 2010; originally announced April 2010.

  5. arXiv:1004.1267  [pdf, ps, other

    cs.NI cs.CR

    De-anonymizing BitTorrent Users on Tor

    Authors: Stevens Le Blond, Pere Manils, Abdelberi Chaabane, Mohamed Ali Kaafar, Arnaud Legout, Claude Castellucia, Walid Dabbous

    Abstract: Some BitTorrent users are running BitTorrent on top of Tor to preserve their privacy. In this extended abstract, we discuss three different attacks to reveal the IP address of BitTorrent users on top of Tor. In addition, we exploit the multiplexing of streams from different applications into the same circuit to link non-BitTorrent applications to revealed IP addresses.

    Submitted 8 April, 2010; originally announced April 2010.

    Comments: Poster accepted at the 7th USENIX Symposium on Network Design and Implementation (NSDI '10), San Jose, CA : United States (2010)

  6. arXiv:1004.0930  [pdf, ps, other

    cs.NI

    Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent

    Authors: Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kaafar

    Abstract: This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show… ▽ More

    Submitted 6 April, 2010; originally announced April 2010.

    Journal ref: 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), San Jose, CA : United States (2010)

  7. arXiv:0812.0581  [pdf, ps, other

    cs.NI

    Pushing BitTorrent Locality to the Limit

    Authors: Stevens Le Blond, Arnaud Legout, Walid Dabbous

    Abstract: Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting localit… ▽ More

    Submitted 12 May, 2009; v1 submitted 2 December, 2008; originally announced December 2008.