On PAR for Attack
نویسندگان
چکیده
In The Onion Router (TOR) system, anonymity is provided by router services run by TOR users who volunteer their computational resources. Scalability concerns stem from the TOR design because volunteers lack an incentive to participate. A payment scheme has been previously introduced which aims at providing economic incentives for volunteers in hopes of increasing both reliability of and participation in TOR. We show that this payment scheme breaks sender receiver anonymity through a traffic analysis intersection attack and is also vulnerable to traffic injection attacks, enabling TOR exit nodes to unnoticably cause an increase in traffic, and therefore payments, from the client. We simulate our intersection attack on the payment scheme and discuss directions for an improved design.
منابع مشابه
Population Attributable Risk (PAR) of Cardiovascular Diseases (CVD) Risk Factors; Bayesian Methods
Background & Objective: Cardiovascular disease (CVD) is the main cause of morbidity and mortality in most countries. By identifying the population attributable risk (PAR) of the main risk factors of CVDs, the overall effect of various exposures on a population can be determined; the findings could be used in CVD prevention. The present study aimed to explore the PAR of some factors, includin...
متن کاملAggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...
متن کاملOn the computational complexity of finding a minimal basis for the guess and determine attack
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...
متن کاملEffect of Amplitude and Mean Angle of Attack on the Unsteady Surface Pressure of a Pitching Airfoil
Details of pressure distributions, on a two dimensional airfoil oscillating in pitch through stall, in a 0.8 0.8 m low-speed wind tunnel are presented. Pitching occurred about the airfoils quarter-chord axis. Pitch rate, Reynolds number, and oscillation amplitudes were varied to determine the effects on pressure and lift distributions. It was found that mean angle of attack and pitching amplitu...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملStudy Degradation of 4-(2-Pyridylazo)Resorcinol Dye in Circulating Fludized Bed Photo Reactor Using ZnO Nanoparticles
Background & Aims of the Study: In this study, 4-(2-pyridylazo) resorcinol (PAR) as model azo dye was used. In spectroscopic measurements and studies of PAR reagent as a ligand are used to formation a complex with toxic metals. So, removal and degradation these compounds of wastewaters are necessary. The aim of this study is the degradation of PAR from aqueous solutions in circulating fludized ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009