Загрузка страницы

USENIX Security '17 - The Loopix Anonymity System

Ania M. Piotrowska and Jamie Hayes, University College London; Tariq Elahi, KU Leuven; Sebastian Meiser and George Danezis, University College London

We present Loopix, a low-latency anonymous communication system that provides bi-directional ‘third-party’ sender and receiver anonymity and unobservability. Loopix leverages cover traffic and Poisson mixing—brief independent message delays—to provide anonymity and to achieve traffic analysis resistance against, including but not limited to, a global network adversary. Mixes and clients self-monitor and protect against active attacks via self-injected loops of traffic. The traffic loops also serve as cover traffic to provide stronger anonymity and a measure of sender and receiver unobservability. Loopix is instantiated as a network of Poisson mix nodes in a stratified topology with a low number of links, which serve to further concentrate cover traffic. Service providers mediate access in and out of the network to facilitate accounting and off-line message reception.

We provide a theoretical analysis of the Poisson mixing strategy as well as an empirical evaluation of the anonymity provided by the protocol and a functional implementation that we analyze in terms of scalability by running it on AWS EC2. We show that mix nodes in Loopix can handle upwards of 300 messages per second, at a small delay overhead of less than 1.5ms on top of the delays introduced into messages to provide security. Overall message latency is on the order of seconds – which is relatively low for a mix-system. Furthermore, many mix nodes can be securely added to the stratified topology to scale throughput without sacrificing anonymity.

View the full program: https://www.usenix.org/sec17/program

Видео USENIX Security '17 - The Loopix Anonymity System канала USENIX
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
15 сентября 2017 г. 23:52:40
00:29:00
Другие видео канала
LISA16 - Building a Billion User Load BalancerLISA16 - Building a Billion User Load BalancerUSENIX Security '20 - Everything Old is New Again: Binary Security of WebAssemblyUSENIX Security '20 - Everything Old is New Again: Binary Security of WebAssemblyOSDI '21 - Marius: Learning Massive Graph Embeddings on a Single MachineOSDI '21 - Marius: Learning Massive Graph Embeddings on a Single MachineUSENIX ATC '21 - A Case Study of Processing-in-Memory in off-the-Shelf SystemsUSENIX ATC '21 - A Case Study of Processing-in-Memory in off-the-Shelf SystemsNSDI '22 - SCALE: Automatically Finding RFC Compliance Bugs in DNS NameserversNSDI '22 - SCALE: Automatically Finding RFC Compliance Bugs in DNS NameserversNSDI '21 - One Protocol to Rule Them All: Wireless Network-on-Chip using Deep Reinforcement LearningNSDI '21 - One Protocol to Rule Them All: Wireless Network-on-Chip using Deep Reinforcement LearningUSENIX ATC '21 - FaaSNet: Scalable and Fast Provisioning of Custom Serverless Container Runtimes...USENIX ATC '21 - FaaSNet: Scalable and Fast Provisioning of Custom Serverless Container Runtimes...USENIX Security '22 - Under the Hood of DANE Mismanagement in SMTPUSENIX Security '22 - Under the Hood of DANE Mismanagement in SMTPNSDI '21 - When Cloud Storage Meets RDMANSDI '21 - When Cloud Storage Meets RDMALISA21 - Can Infrastructure as Code Apply to Bare Metal?LISA21 - Can Infrastructure as Code Apply to Bare Metal?NSDI '21 - Ownership: A Distributed Futures System for Fine-Grained TasksNSDI '21 - Ownership: A Distributed Futures System for Fine-Grained TasksUSENIX Security '19 - Small World with High Risks: A Study of Security Threats in the npm EcosystemUSENIX Security '19 - Small World with High Risks: A Study of Security Threats in the npm EcosystemSREcon19 Americas - Pragmatic AutomationSREcon19 Americas - Pragmatic AutomationUSENIX ATC '19 - Evaluating File System Reliability on Solid State DrivesUSENIX ATC '19 - Evaluating File System Reliability on Solid State DrivesUSENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over RemoteUSENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over RemoteUSENIX Security '20 - Datalog DisassemblyUSENIX Security '20 - Datalog DisassemblyUSENIX Security '22 - Poison Forensics: Traceback of Data Poisoning Attacks in Neural NetworksUSENIX Security '22 - Poison Forensics: Traceback of Data Poisoning Attacks in Neural NetworksUSENIX Security '22 - Lumos: Identifying and Localizing Diverse Hidden IoT Devices...USENIX Security '22 - Lumos: Identifying and Localizing Diverse Hidden IoT Devices...NSDI '22 - Runtime Programmable SwitchesNSDI '22 - Runtime Programmable SwitchesUSENIX Security '21 - Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNSUSENIX Security '21 - Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNSLISA16 - Network-Based LUKS Volume Decryption with TangLISA16 - Network-Based LUKS Volume Decryption with Tang
Яндекс.Метрика