Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516740
|View full text |Cite
|
Sign up to set email alerts
|

Hang with your buddies to resist intersection attacks

Abstract: Some anonymity schemes might in principle protect users from pervasive network surveillance-but only if all messages are independent and unlinkable. Users in practice often need pseudonymity-sending messages intentionally linkable to each other but not to the sender-but pseudonymity in dynamic networks exposes users to intersection attacks. We present Buddies, the first systematic design for intersection attack resistance in practical anonymity systems. Buddies groups users dynamically into buddy sets, control… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(23 citation statements)
references
References 47 publications
0
23
0
Order By: Relevance
“…Intersection attacks are passive attacks which try to eavesdrop on traffic and find out the receiver of traffic. To defend against intersection attacks a system needs to implement some sort of buddies' architecture (Wolinsky et al, 2013).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Intersection attacks are passive attacks which try to eavesdrop on traffic and find out the receiver of traffic. To defend against intersection attacks a system needs to implement some sort of buddies' architecture (Wolinsky et al, 2013).…”
Section: Discussionmentioning
confidence: 99%
“…In this attack it is assumed that a network user is typically in contact with a relative small number of other communicating parties (Danezis & Serjantov, 2005). Resistance against intersection attacks is obtained by the use of an extended anonymous communication scheme called Buddies architecture (Wolinsky, Syta, & Ford, 2013). In this communication architecture communication parties are dynamically grouped in buddy sets, for which communication is controlled in order to make buddies in a set indistinguishable from each other when network traffic is analyzed.…”
Section: Intersection Attacksmentioning
confidence: 99%
“…If an adversary can observe traffic patterns across many epochs, as the set of online clients changes, the adversary can make statistical inferences about which client is sending which stream of messages [39][40][41]. These "intersection" or "statistical disclosure" attacks affect many anonymity systems and defending against them is an important, albeit orthogonal, problem [41,42]. Even so, intersection attacks typically become more difficult to mount as the size of the anonymity set increases, so Riposte's support for very large anonymity sets makes it less vulnerable to these attacks than are many prior systems.…”
Section: Intersection Attacksmentioning
confidence: 99%
“…Clients can minimize their risk by being online not only when they are actively communicating, but in general this attack is difficult to defend against through technical means. For further defenses, TARANET could be enhanced using existing solutions, such as dummy connections [15], or with the Buddies system [68], which allows clients to control which subset of pseudonyms appears online for a particular session. We leave analysis and evaluation of integration with such systems to future work.…”
Section: Limitationsmentioning
confidence: 99%