conscript your friends into larger anonymity sets with
play

Conscript Your Friends into Larger Anonymity Sets with JavaScript - PowerPoint PPT Presentation

Conscript Your Friends into Larger Anonymity Sets with JavaScript Henry Corrigan-Gibbs Bryan Ford Stanford Yale ACM Workshop on Privacy in the Electronic Society 4 November 2013 New Anonymity Systems Have a


  1. Conscript Your Friends into Larger Anonymity Sets with JavaScript � Henry Corrigan-Gibbs � Bryan Ford � Stanford � Yale � � ACM Workshop on Privacy in the Electronic Society � 4 November 2013 �

  2. New Anonymity Systems Have a “Chicken-and-Egg” Problem � Small Few 
 anonymity users � sets �

  3. Adversary could just arrest all three participants � Overthrow the regime!! � Start the revolution!! � Emacs rulz!! �

  4. Overthrow the regime!! � Start the revolution!! � ?? � Emacs rulz!! �

  5. Idea � • “Conscript” casual Internet users into an anonymity system using JavaScript � – Casual users submit null messages � – Savvy users use a browser plug-in to swap out the null messages with real ones � • Compatible with a number of 
 existing anonymity systems �

  6. Outline � • Motivation � • Architecture � • Attacks and Defenses � • Evaluation �

  7. GET /index.html � <html><script>... � E 1 (E 2 (E 3 (000))) � 000 � Using a randomized encryption scheme �

  8. GET /index.html � <html><script>... � m � E 1 (E 2 (E 3 (000))) � 000 � Plugin � m � E 1 (E 2 (E 3 ( m ))) �

  9. The Adversary Sees �

  10. The Adversary Sees �

  11. The Adversary Sees � Start the revolution! � 00000000 �

  12. Security Property � IF � � Casual users’ messages indistinguishable 
 � � � from savvy users’ messages � THEN � Conscripting increases the size of 
 � � � the savvy users’ anonymity set � ≈ ¡ Casual � Savvy �

  13. Compatible Anonymity Systems � 1. Monotonic anonymity set size � 2. Possible to simulate traffic streams � 3. Easy to identify malformed messages � � Yes : Timed mix cascade, verifiable shuffles, � remailers (maybe), verifiable DC-nets � No : Tor, batching mix net �

  14. The ConScript Script � E.g., for a mix-net � • The JavaScript application sends � – RSA encryption routines, � – server public keys, and � – code to POST ciphertext to mix-server. � • Mix servers uses 
 � � Access-Control-Allow-Origin header �

  15. Outline � • Motivation � • Architecture � • Attacks and Defenses � • Evaluation �

  16. Threats � Vulnerabilities of the underlying anonymity Web server can serve system � malicious JavaScript � User can submit incorrect messages �

  17. JavaScript Attack � Plugin only swaps 
 out msg if scripts 
 match exactly � Plugin �

  18. More Attacks � • Side-channel attack � • Selective DoS attack (“trickle attack”) � • Distribution point monitoring � – Who downloads the plug-in? � • User-counting attack � • […] � � Even if adversary can distinguish: 
 Anonymity provided ≥ | Savvy users | �

  19. Outline � • Motivation � • Architecture � • Attacks and Defenses � • Evaluation �

  20. 
 
 Proof-of-Concept Evaluation � Time (ms) to generate a dummy message on different devices. OpenPGP.js for RSA encryption, SJCL for ECC. � Verifiable � Device � Mix-net � DC-net � Workstation � 81 � 156 � Laptop � 133 � 231 � iPhone 4 � 9 009 � 62 973 � Milestone � – � 63 504 �

  21. Related Work � • AdLeaks [Roth et al., FC‘13] � – Similar idea: JS for dummy messages � – Works with one particular anonymity system � – Vulnerable to active attacks by browsers � • FlashProxy [Fifield et al., PETS‘12] � – Use JavaScript to “conscript” browsers into acting as Tor bridges � • Bauer [WPES ‘03] � – Covert channel between mix servers �

  22. Conclusion � • Conscripted anonymity is one possible way to address the chicken-and-egg problem in online anonymity � • Ongoing work on in-browser crypto could have benefits for anonymity systems too � – e.g., W3C Crypto API standard �

  23. � Questions? � Henry Corrigan-Gibbs � henrycg@stanford.edu � � Thanks to David Fifield and 
 David Wolinsky for their comments. �

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend