On PAR for Attack

نویسندگان

  • Chris Arnold
  • Rob Jansen
  • James Parker
چکیده

In The Onion Router (TOR) system, anonymity is provided by router services run by TOR users who volunteer their computational resources. Scalability concerns stem from the TOR design because volunteers lack an incentive to participate. A payment scheme has been previously introduced which aims at providing economic incentives for volunteers in hopes of increasing both reliability of and participation in TOR. We show that this payment scheme breaks sender receiver anonymity through a traffic analysis intersection attack and is also vulnerable to traffic injection attacks, enabling TOR exit nodes to unnoticably cause an increase in traffic, and therefore payments, from the client. We simulate our intersection attack on the payment scheme and discuss directions for an improved design.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Population Attributable Risk (PAR) of Cardiovascular Diseases (CVD) Risk Factors; Bayesian Methods

   Background & Objective: Cardiovascular disease (CVD) is the main cause of morbidity and mortality in most countries. By identifying the population attributable risk (PAR) of the main risk factors of CVDs, the overall effect of various exposures on a population can be determined; the findings could be used in CVD prevention. The present study aimed to explore the PAR of some factors, includin...

متن کامل

Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

Effect of Amplitude and Mean Angle of Attack on the Unsteady Surface Pressure of a Pitching Airfoil

Details of pressure distributions, on a two dimensional airfoil oscillating in pitch through stall, in a 0.8 0.8 m low-speed wind tunnel are presented. Pitching occurred about the airfoils quarter-chord axis. Pitch rate, Reynolds number, and oscillation amplitudes were varied to determine the effects on pressure and lift distributions. It was found that mean angle of attack and pitching amplitu...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Study Degradation of 4-(2-Pyridylazo)Resorcinol Dye in Circulating Fludized Bed Photo Reactor Using ZnO Nanoparticles

Background & Aims of the Study: In this study, 4-(2-pyridylazo) resorcinol (PAR) as model azo dye was used. In spectroscopic measurements and studies of PAR reagent as a ligand are used to formation a complex with toxic metals. So, removal and degradation these compounds of wastewaters are necessary. The aim of this study is the degradation of PAR from aqueous solutions in circulating fludized ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009