Website Fingerprinting Attacks and Defenses in the Tor Onion Space
Marc Juarez
imec-COSIC KU Leuven
Website Fingerprinting Attacks and Defenses in the Tor Onion Space - - PowerPoint PPT Presentation
Website Fingerprinting Attacks and Defenses in the Tor Onion Space Marc Juarez imec-COSIC KU Leuven COSIC Seminar - 23rd October 2017, Leuven Introduction Contents of this presentation: - PETS17: Website Fingerprinting Defenses at
imec-COSIC KU Leuven
2
3
Adversary Tor network User WWW Entry Middle Exit
4
Training Testing
6
7
xyz.onion User
8
9
1Royal Holloway University of London 2University College London 3imec-COSIC KU Leuven
11
Tor network Entry Middle Dummy Real User These are TCP packets or Tor messages
WF Defenses BuFLO Tamaraw CS-BuFLO WTF-PAD …
HTTP(S) Tor TCP ... TLS
Adversary
Web content
‘Latent‘ features: F1, …, Fn Observed features: O1, ..., On
Identifying info Last layer of encryption
T(·)
12
13
14
(two different solutions, not a client-server solution)
pad them to match a target page
e.g., comments in HTML/JS, images’ metadata, “display: none” styles
15
Original Morphed Target
securedrop.png index.html fake.css index.html facebook.png style.css
securedrop facebook
16 Padding
target
securedrop.png index.html fake.css index.html facebook.png style.css
securedrop facebook
Defines num objects and object sizes by:
17 Padding
18
19
20
1Drexel University 2imec-COSIC KU Leuven
Credit: Claudia Diaz
23
Credit: Bekah Overdorf
Credit: Bekah Overdorf
Credit: Bekah Overdorf
Credit: Bekah Overdorf
Credit: Bekah Overdorf
Credit: Bekah Overdorf
Credit: Bekah Overdorf
Credit: Bekah Overdorf
1. Total Size of all Outgoing Packets 2. Total Size of Incoming Packets 3. Number of Incoming Packets 4. Number of Outgoing Packets
Random forest regressor
Future work Re-design ALPaCA to follow these guidelines.
40
41
42
Goal: randomize HTTP requests
43
44