Skip to main content

Showing 1–4 of 4 results for author: Roberts, L M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2005.07641  [pdf, other

    cs.NI

    Watching the Watchers: Nonce-based Inverse Surveillance to Remotely Detect Monitoring

    Authors: Laura M. Roberts, David Plonka

    Abstract: Internet users and service providers do not often know when traffic is being watched but desire a way to determine when, where, and by whom. We present NOISE, the Nonce Observatory for Inverse Surveillance of Eavesdroppers, a method and system that detects monitoring by disseminating nonces - unique, pseudorandom values - in traffic and seeing if they are acted upon unexpectedly, indicating that t… ▽ More

    Submitted 5 June, 2020; v1 submitted 15 May, 2020; originally announced May 2020.

  2. arXiv:1806.11278  [pdf, other

    cs.CR

    How Do Tor Users Interact With Onion Services?

    Authors: Philipp Winter, Anne Edmundson, Laura M. Roberts, Agnieszka Dutkowska-Zuk, Marshini Chetty, Nick Feamster

    Abstract: Onion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names that are long and difficult for humans to read. In this paper, we study how people perceive, understand, and use onion services based on data from 17 semi-structu… ▽ More

    Submitted 29 June, 2018; originally announced June 2018.

    Comments: Appeared in USENIX Security Symposium 2018

    Journal ref: USENIX Security Symposium, Baltimore, Maryland, August 2018

  3. arXiv:1704.00792  [pdf, ps, other

    cs.CR

    Anomalous keys in Tor relays

    Authors: George Kadianakis, Claudia V. Roberts, Laura M. Roberts, Philipp Winter

    Abstract: In its more than ten years of existence, the Tor network has seen hundreds of thousands of relays come and go. Each relay maintains several RSA keys, amounting to millions of keys, all archived by The Tor Project. In this paper, we analyze 3.7 million RSA public keys of Tor relays. We (i) check if any relays share prime factors or moduli, (ii) identify relays that use non-standard exponents, (iii)… ▽ More

    Submitted 15 December, 2017; v1 submitted 3 April, 2017; originally announced April 2017.

  4. arXiv:1609.08187  [pdf, other

    cs.CR

    The Effect of DNS on Tor's Anonymity

    Authors: Benjamin Greschbach, Tobias Pulls, Laura M. Roberts, Philipp Winter, Nick Feamster

    Abstract: Previous attacks that link the sender and receiver of traffic in the Tor network ("correlation attacks") have generally relied on analyzing traffic from TCP connections. The TCP connections of a typical client application, however, are often accompanied by DNS requests and responses. This additional traffic presents more opportunities for correlation attacks. This paper quantifies how DNS traffic… ▽ More

    Submitted 11 October, 2016; v1 submitted 26 September, 2016; originally announced September 2016.