PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

Shoring up Tor

Researchers mount successful attacks against popular anonymity network -- and show how to prevent them.

2015-07-29
(Press-News.org) With 2.5 million daily users, the Tor network is the world's most popular system for protecting Internet users' anonymity. For more than a decade, people living under repressive regimes have used Tor to conceal their Web-browsing habits from electronic surveillance, and websites hosting content that's been deemed subversive have used it to hide the locations of their servers.

Researchers at MIT and the Qatar Computing Research Institute (QCRI) have now demonstrated a vulnerability in Tor's design. At the Usenix Security Symposium this summer, they show that an adversary could infer a hidden server's location, or the source of the information reaching a given Tor user, by analyzing the traffic patterns of encrypted data passing through a single computer in the all-volunteer Tor network.

Fortunately, the same paper also proposes defenses, which representatives of the Tor project say they are evaluating for possible inclusion in future versions of the Tor software.

"Anonymity is considered a big part of freedom of speech now," says Albert Kwon, an MIT graduate student in electrical engineering and computer science and one of the paper's first authors. "The Internet Engineering Task Force is trying to develop a human-rights standard for the Internet, and as part of their definition of freedom of expression, they include anonymity. If you're fully anonymous, you can say what you want about an authoritarian government without facing persecution."

Layer upon layer

Sitting atop the ordinary Internet, the Tor network consists of Internet-connected computers on which users have installed the Tor software. If a Tor user wants to, say, anonymously view the front page of The New York Times, his or her computer will wrap a Web request in several layers of encryption and send it to another Tor-enabled computer, which is selected at random. That computer -- known as the guard -- will peel off the first layer of encryption and forward the request to another randomly selected computer in the network. That computer peels off the next layer of encryption, and so on.

The last computer in the chain, called the exit, peels off the final layer of encryption, exposing the request's true destination: the Times. The guard knows the Internet address of the sender, and the exit knows the Internet address of the destination site, but no computer in the chain knows both. This routing scheme, with its successive layers of encryption, is known as onion routing, and it gives the network its name: "Tor" is an acronym for "the onion router."

In addition to anonymous Internet browsing, however, Tor also offers what it calls hidden services. A hidden service protects the anonymity of not just the browser, but the destination site, too. Say, for instance, that someone in Iran wishes to host a site archiving news reports from Western media but doesn't want it on the public Internet. Using the Tor software, the host's computer identifies Tor routers that it will use as "introduction points" for anyone wishing to access its content. It broadcasts the addresses of those introduction points to the network, without revealing its own location.

If another Tor user wants to browse the hidden site, both his or her computer and the host's computer build Tor-secured links to the introduction point, creating what the Tor project calls a "circuit." Using the circuit, the browser and host identify yet another router in the Tor network, known as a rendezvous point, and build a second circuit through it. The location of the rendezvous point, unlike that of the introduction point, is kept private.

Traffic fingerprinting

Kwon devised an attack on this system with joint first author Mashael AlSabah, an assistant professor of computer science at Qatar University, a researcher at QCRI, and, this year, a visiting scientist at MIT; Srini Devadas, the Edwin Sibley Webster Professor in MIT's Department of Electrical Engineering and Computer Science; David Lazar, another graduate student in electrical engineering and computer science; and QCRI's Marc Dacier.

The researchers' attack requires that the adversary's computer serve as the guard on a Tor circuit. Since guards are selected at random, if an adversary connects enough computers to the Tor network, the odds are high that, at least on some occasions, one or another of them would be well-positioned to snoop.

During the establishment of a circuit, computers on the Tor network have to pass a lot of data back and forth. The researchers showed that simply by looking for patterns in the number of packets passing in each direction through a guard, machine-learning algorithms could, with 99 percent accuracy, determine whether the circuit was an ordinary Web-browsing circuit, an introduction-point circuit, or a rendezvous-point circuit. Breaking Tor's encryption wasn't necessary.

Furthermore, by using a Tor-enabled computer to connect to a range of different hidden services, they showed that a similar analysis of traffic patterns could identify those services with 88 percent accuracy. That means that an adversary who lucked into the position of guard for a computer hosting a hidden service, could, with 88 percent certainty, identify it as the service's host.

Similarly, a spy who lucked into the position of guard for a user could, with 88 percent accuracy, tell which sites the user was accessing.

To defend against this type of attack, "We recommend that they mask the sequences so that all the sequences look the same," AlSabah says. "You send dummy packets to make all five types of circuits look similar."

INFORMATION:

Additional background ARCHIVE: "Fingerprinting" chips to fight counterfeiting http://newsoffice.mit.edu/2015/fingerprinting-chips-fight-counterfeiting-0501

ARCHIVE: Cloud security reaches silicon http://newsoffice.mit.edu/2015/cloud-security-chips-0223

ARCHIVE: Protecting data in the cloud http://newsoffice.mit.edu/2013/protecting-data-in-the-cloud-0702



ELSE PRESS RELEASES FROM THIS DATE:

Compliance with guidelines for treating brain injuries doesn't guarantee better outcomes

2015-07-29
Two decades ago, the Brain Trauma Foundation published its first set of guidelines for treating traumatic brain injury. Now, a study by the Los Angeles County Trauma Consortium -- which includes several physicians from UCLA -- has found that compliance with those guidelines doesn't necessarily translate into better results for patients. In research published online by the peer-reviewed journal JAMA Surgery, the consortium analyzed 2009 and 2010 data from all 14 L.A. County trauma centers and found no evidence that compliance with the guidelines led to lower mortality ...

Barrow scientists 'rewrite' history books

2015-07-29
Researchers at Barrow Neurological Institute have spent years of medical sleuthing across three continents to uncover a brain surgery that changed history. After more than two-years of international investigation, the scientists have concluded that Napoleon likely would have conquered Russia in 1812 if not for the life-saving brain surgery performed on Russian general Mikhail Kutuzov by the French surgeon Jean Massot, who operated on Kutuzov after bullets twice passed through his head. "It's a story of how medicine changed the course of civilization," says Mark C. Preul, ...

Basis for new treatment options for a fatal leukemia in children revealed

2015-07-29
Berlin, 29th July 2015 - Acute lymphoblastic leukemia (ALL) is the most common type of cancer in children. It can occur in various forms, differing not only by specific changes in the genetic material of the leukemia cells but also by their response to therapies. Now, an international team of scientists from Berlin, Düsseldorf, Hannover, Heidelberg, Kiel, and Zurich have succeeded in decoding the molecular characteristics of an as yet incurable subtype of leukemia, paving the way for new therapeutic approaches. Their results have been published in the current issue ...

Social groups and emotions

2015-07-29
Politicians, children, teachers, Europeans... what do they have in common? As discovered in a study led by Luca Piretti and his colleagues from SISSA (International School for Advanced Studies) of Trieste, they are all social groups, a special semantic category for the human brain that is closely linked with emotions. Until recently, most neuroscientists believed that the representation of knowledge in the brain was based on two distinct systems: one involved in representing animate objects (or, generally, anything organic), and the other for representing inanimate objects ...

Alcohol laws have a preventive effect on young men

2015-07-29
When they reach for the glass, they often know no limits: Hazardous drinking is fairly common among young Swiss men. The good news: Based on a survey of around 5,700 young Swiss men with a mean age of 20, scientists from the University of Zurich reveal that legal regulations - such as the minimum legal drinking age and restrictions on the sale or advertising of alcoholic beverages - have a preventive effect on young consumers. Around half of the respondents are high-risk drinkers, which means they consume at least six or more alcoholic drinks in a single session every ...

Overcoming why a new treatment is resisted by lung cancer

2015-07-29
A promising agent for the treatment of cancer has so far had little effect on the most common lung tumours, but new research from The University of Manchester has suggested how this resistance might be overcome. In two papers released in the journal PNAS, the research team examined factors which mean that the most common type of lung cancer - itself the most common cause of cancer deaths - is resistant to a cytokine called TRAIL that causes cell death in many other types of tumour. The researchers found that in non-small cell lung cancer, which accounts for around 85 ...

Study finds brain chemicals that keep wakefulness in check

2015-07-29
Mice that have a particular brain chemical switched off become hyperactive and sleep for just 65 per cent of their normal time. This discovery, published in the journal Neuron, could help researchers to develop new drugs that promote better sleep, or control hyperactivity in people with the medical condition mania. Scientists altered the neurochemistry of mice to help investigate why we need to sleep, what controls our wakefulness, and how a balance between these two states influences brain functions like concentration and memory and our general health. The chemicals ...

Study of birds' sense of smell reveals important clues for behavior and adaptation

2015-07-29
From slight sparrows to preening peacocks to soaring falcons, birds have long been known to possess distinct abilities in their sense of smell, but little has been known about the evolution of olfaction. Now, a large comparative genomic study of the olfactory genes tied to a bird's sense of smell has revealed important differences that correlate with their ecological niches and specific behaviors. Authors Agostinho Antunes et al., in a new study published in the advanced online edition of Molecular Biology and Evolution, analyzed olfactory receptor genes (OR gene ...

York scientists unlock secrets of stars through aluminium

2015-07-29
Physicists at the University of York have revealed a new understanding of nucleosynthesis in stars, providing insight into the role massive stars play in the evolution of the Milky Way and the origins of the Solar System. Radioactive aluminium (aluminium-26, or Al26) is an element that emits gamma radiation through its decay enabling astronomers to image its location in our galaxy. Studying how Al26 is created in massive stars, scientists have distinguished between previously conflicting assumptions about its rate of production by nuclear fusion. Funded by the Science ...

Stressed out plants send animal-like signals

2015-07-29
University of Adelaide research has shown for the first time that, despite not having a nervous system, plants use signals normally associated with animals when they encounter stress. Published today in the journal Nature Communications, the researchers at the Australian Research Council (ARC) Centre of Excellence in Plant Energy Biology reported how plants respond to their environment with a similar combination of chemical and electrical responses to animals, but through machinery that is specific to plants. "We've known for a long-time that the animal neurotransmitter ...

LAST 30 PRESS RELEASES:

Frailty linked to higher risk of respiratory complications and death in smokers

Multifocus microscope pushes the limits of fast live 3D biological imaging

NRG Oncology opens new “ARCHER” clinical trial (NRG-GU015) testing a shorter treatment duration of radiation therapy for muscle invasive bladder cancer

Researchers mimic a mystery of nature to make ice move on its own

PLOS Biology announces agreement to become a MetaROR partner journal

Helicobacter pylori eradication may raise risk of reflux esophagitis, meta-analysis warns

UC San Diego awarded $80 million to expand clinical trials and train tomorrow's researcher leaders

KIER develops high-performance electrodes for seawater electrolysis to produce hydrogen

High-oxygen vacancy cerium catalysts with NiFe alloy heterostructures: A pathway to efficient and stable biomass ethanol fuel tubular solid oxide fuel cells

Research alert: Study finds that school-based online surveillance companies monitor students 24/7

Research alert: A microbial DNA signature differentiates two types of cancer in the live

Researchers use smart watches to better understand human activity

Terasaki Institute researchers reveal vagus nerve modulation as key to combating cancer-associated cachexia featured in cell

AI also assesses Dutch mammograms better than radiologists

High triglycerides drive life-threatening aortic aneurysms, study in mice finds

Minimally invasive procedure relieves painful symptoms of knee osteoarthritis

New research reveals the spark that ignites Mediterranean marine heatwaves

Researchers build first ‘microwave brain’ on a chip

Teens with higher blood levels of PFAS regain more weight after bariatric surgery, study finds

Discovery of ‘weird looking’ otter poo reveals how these animals shape nearby ecologies

River otters unfazed by feces and parasites while eating… and that’s good for ecosystems

From static to smart: HIT researchers developed programmable 4D-printed metamaterials that think, change, and perform multiple tasks

Back from the brink of extinction

Unlocking the power within: Recycling lithium batteries for a sustainable future 

Adoption of AI-scribes by doctors raises ethical questions

65LAB awards US$1.5 million to Duke-NUS platform to advance antifibrotic drug discovery

Mount Sinai study supports evidence that prenatal acetaminophen use may be linked to increased risk of autism and ADHD

Big-data longevity specialist boosts HonorHealth Research Institute’s efforts to help patients lead longer, more productive lives

Helping others shown to slow cognitive decline

Youth violence prevention program shown to reduce arrests by up to 75%

[Press-News.org] Shoring up Tor
Researchers mount successful attacks against popular anonymity network -- and show how to prevent them.