Research unmasks anonymity networks

Even supposedly infallible techniques can often be defeated by exploiting real-world weaknesses in the systems

Anonymity systems designed to allow users to carry out actions on the Internet without identifying themselves can often be cracked with a bit of unorthodox thinking, according to a Cambridge researcher.

Stephen Murdoch, a researcher in the University of Cambridge's Security Group, outlined a number of different anonymity-cracking techniques in a recently published PhD thesis.

The techniques aim at removing the cloak provided by anonymity systems such as Tor, which can be used by legitimate users looking to protect their identities, as well as by criminals covering their tracks.

Murdoch has tested his techniques whenever possible, and his results show that even supposedly infallible techniques can often be defeated by exploiting real-world weaknesses in the systems.

One technique explored in the paper, called indirect traffic analysis, relies on examining the actions of an anonymous user, through which the user's intent and often their identity can be inferred, according to Murdoch.

For example, if an attacker is able to modify certain characteristics of an anonymized data stream coming through an anonymization network such as Tor, the attacker can often discover the first Tor node connected to by the client, Murdoch said.

"This reduces the anonymity provided to that of a single-hop proxy, and then mundane legal mechanisms might be used to discover the initiator," Murdoch wrote.

In experimenting with such techniques on Tor, Murdoch said he was able to de-anonymize 11 out of the 13 Tor nodes tested.

One of the more outrageous techniques examined in the paper explores the link between processor load and the behavior of the system's clock crystal - its "clock skew." This is because when the processor is undergoing a greater load, it is emitting more heat, which in turn affects the temperature of the clock crystal.

The link has been examined since the early 1990s in the security community, but Murdoch's innovation is to deliberately induce a pattern of processor load in an anonymous service, and use the resulting clock skew data to determine the identity of the service.

"Such an attack could be deployed in practice by an attacker using one machine to access the hidden service, varying traffic over time to cause the server to heat up or cool down," Murdoch wrote.

"Simultaneously, he probes all candidate machines for timestamps. From these the attacker infers clock skew estimates and when a correlation between the skew and the induced load pattern is found, the hidden service is de-anonymised," he wrote.

Such an attack is unlikely to be the fastest way to de-anonymize users of anonymity networks, Murdoch conceded, but he expects interest in and use of such techniques to grow.

"As systems become hardened against more conventional attacks, this attack could become a plausible threat," he wrote.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Matthew Broersma

Techworld.com
Show Comments

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?