Skip to main content

Showing 1–2 of 2 results for author: Kadianakis, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2103.03831  [pdf, other

    cs.CR

    Tor circuit fingerprinting defenses using adaptive padding

    Authors: George Kadianakis, Theodoros Polyzos, Mike Perry, Kostas Chatzikokolakis

    Abstract: Online anonymity and privacy has been based on confusing the adversary by creating indistinguishable network elements. Tor is the largest and most widely deployed anonymity system, designed against realistic modern adversaries. Recently, researchers have managed to fingerprint Tor's circuits -- and hence the type of underlying traffic -- simply by capturing and analyzing traffic traces. In this wo… ▽ More

    Submitted 11 January, 2022; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: 17 pages

  2. arXiv:1704.00792  [pdf, ps, other

    cs.CR

    Anomalous keys in Tor relays

    Authors: George Kadianakis, Claudia V. Roberts, Laura M. Roberts, Philipp Winter

    Abstract: In its more than ten years of existence, the Tor network has seen hundreds of thousands of relays come and go. Each relay maintains several RSA keys, amounting to millions of keys, all archived by The Tor Project. In this paper, we analyze 3.7 million RSA public keys of Tor relays. We (i) check if any relays share prime factors or moduli, (ii) identify relays that use non-standard exponents, (iii)… ▽ More

    Submitted 15 December, 2017; v1 submitted 3 April, 2017; originally announced April 2017.