user_image

Rob G. Jansen, PhD

Computer Scientist, Researcher, and Principal Investigator
U.S. Naval Research Laboratory, Washington, DC, USA

Publication Details

  1. Citation

    Rob JansenRyan Wails, and Aaron Johnson:
    Repositioning Real-World Website Fingerprinting on Tor. Workshop on Privacy in the Electronic Society, 2024.

    Author Links

    Venue Links

    Abstract

    Website fingerprinting (WF) is a potentially devastating attack against Tor because it can break anonymity by linking a Tor user to their purportedly unlinkable internet destinations. Previous work proposes that an adversary trains WF classifiers either on synthetic traces that are programmatically generated using automated tools, or on real-world traces collected from one or more Tor exit relays. However, no existing work accurately represents a real-world threat model in which a WF adversary’s classifiers must be tested against real-world entry traces that are naturally created by real Tor users. In this paper we present Retracer, a novel method for producing labeled entry traces of genuine Tor traffic patterns. Retracer uses high-fidelity network simulation to accurately transform real-world exit traces into entry traces prior to training and testing WF classifiers. After first demonstrating that Retracer accurately transforms exit traces into entry traces, we then apply it to the recently released GTT23 dataset in a WF evaluation in which more than 3500 classifiers are tested against, for the first time, labeled entry traces of real Tor traffic patterns. Our evaluation yields the best available estimate of the performance an adversary can achieve when directing WF attacks at real Tor users.

    Bibtex

    @inproceedings{retracer-wpes2024,
      title = {Repositioning Real-World Website Fingerprinting on Tor},
      author = {Jansen, Rob and Wails, Ryan and Johnson, Aaron},
      booktitle = {Workshop on Privacy in the Electronic Society},
      year = {2024},
      doi = {10.1145/3689943.3695047},
    }