Abstract

Tor, the popular onion-routing based anonymity network, has an outdated threat model that does not account for the increasing surveillance capabilities prevalent today. Although certain strategies, such as traffic mixing and traffic padding, are performance prohibitive when applied at scale to the entirety of an onion-routed anonymity network, the careful application of these techniques to specific types of traffic vulnerable to low-resource attack may allow dramatically improved security with a relatively small performance cost. The Tor rendezvous model, in particular, stands to gain substantially from targeted hardening against various low-resource traffic correlation attacks.

Advisor

Price Jones, Rhys

Department

Computer Science

Publication Date

2016

Degree Granted

Bachelor of Arts

Document Type

Senior Independent Study Thesis

Share

COinS
 

© Copyright 2016 Torger Miller