Skip to main content

2018 | OriginalPaper | Buchkapitel

Tor Fingerprinting: Tor Browser Can Mitigate Browser Fingerprinting?

verfasst von : Takamichi Saito, Kazushi Takahashi, Koki Yasuda, Kazuhisa Tanabe, Masayuki Taneoka, Ryohei Hosoya

Erschienen in: Advances in Network-Based Information Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The onion router (Tor) is currently the most powerful and prominent tool to achieve online privacy on the Internet. As a browser, Tor can protect web users by not revealing the source or destination IP address, and it also prevents web tracking with HTTP cookies. Tor browser has been updated continuously to resist de-anonymizing attacks by restricting the browser’s functions, e.g., excluding all plugins such as Flash player. On March 2016, Jose Norte posted the article as “Advanced Tor Browser Fingerprinting” in his blog [37]. It suggested that browser fingerprinting can track Tor browser. In this paper, we examined how secure Tor browser version 5.5 is against browser fingerprinting. Our study concludes that Tor user accesses can be distinguished: 14.28% of Tor browser version 5.5 can be identified within two weeks at our experimental sites, although 70.0% of the older versions can. In this paper, we analyze the current features of Tor browser against browser fingerprinting and also show capabilities to track Tor browser accesses.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat de Montjoye, Y.A., Radaelli, L., Singh, V.K., Pentland, A.: Science 347, 536–539 (2015) de Montjoye, Y.A., Radaelli, L., Singh, V.K., Pentland, A.: Science 347, 536–539 (2015)
8.
Zurück zum Zitat Panchenko, A., Niessen L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th ACM Workshop on Privacy in the Electronic Society (2011) Panchenko, A., Niessen L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th ACM Workshop on Privacy in the Electronic Society (2011)
9.
Zurück zum Zitat Eckersley, P.: How Unique is Your Web Browser? In: Proceedings of the Privacy Enhancing Technologies Symposium. LNCS, vol. 6205 (2010) Eckersley, P.: How Unique is Your Web Browser? In: Proceedings of the Privacy Enhancing Technologies Symposium. LNCS, vol. 6205 (2010)
11.
Zurück zum Zitat Takei, N., Saito, T., Takasu, K., Yamada, T.: Web browser fingerprinting using only cascading style sheets. In: Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (2015) Takei, N., Saito, T., Takasu, K., Yamada, T.: Web browser fingerprinting using only cascading style sheets. In: Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (2015)
12.
Zurück zum Zitat Takasu, K., Saito, T., Yamada, T., Ishikawa, T.: A survey of hardware features in modern browsers: 2015 edition. In: Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2015) (2015) Takasu, K., Saito, T., Yamada, T., Ishikawa, T.: A survey of hardware features in modern browsers: 2015 edition. In: Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2015) (2015)
14.
Zurück zum Zitat Kwon, A., AlSabah, M., Lazar, D., Dacier, M., Devadas, S.: Circuit fingerprinting attacks: passive deanonymization of tor hidden services. In: Proceedings of the USENIX 2015 (2015) Kwon, A., AlSabah, M., Lazar, D., Dacier, M., Devadas, S.: Circuit fingerprinting attacks: passive deanonymization of tor hidden services. In: Proceedings of the USENIX 2015 (2015)
15.
Zurück zum Zitat Boda, K., Földes, A., Gulyás, G., Imre, S.: User Tracking on the web via cross-browser fingerprinting. In: Proceedings of the 16th Nordic Conference on Information Security Technology for Applications (2011) Boda, K., Földes, A., Gulyás, G., Imre, S.: User Tracking on the web via cross-browser fingerprinting. In: Proceedings of the 16th Nordic Conference on Information Security Technology for Applications (2011)
16.
Zurück zum Zitat Kiryu, N., Iso, Y., Kaneko, Y., Saito, T.: Estimation of Number of CPU Cores Using with Web Workers. In: Proceedings of the Computer Security Symposium (CSS 2014) (2014). (in Japanese) Kiryu, N., Iso, Y., Kaneko, Y., Saito, T.: Estimation of Number of CPU Cores Using with Web Workers. In: Proceedings of the Computer Security Symposium (CSS 2014) (2014). (in Japanese)
19.
Zurück zum Zitat Fifield, D., Egelman, S.: Fingerprinting web users through font metrics. In: Proceedings of the Financial Cryptography and Data Security 2015. Lecture Notes in Computer Science, vol. 8975 (2015) Fifield, D., Egelman, S.: Fingerprinting web users through font metrics. In: Proceedings of the Financial Cryptography and Data Security 2015. Lecture Notes in Computer Science, vol. 8975 (2015)
25.
Zurück zum Zitat Mowery, K., Shacham, H.: Pixel Perfect: Fingerprinting Canvas in HTML5. In: Proceedings of the Web 2.0 Security and Privacy (W2SP) (2012) Mowery, K., Shacham, H.: Pixel Perfect: Fingerprinting Canvas in HTML5. In: Proceedings of the Web 2.0 Security and Privacy (W2SP) (2012)
26.
Zurück zum Zitat Kiryu, N., Goto, H., Saito T.: A proposal of estimating of CPU architectures by JavaScript engine. In: Proceedings of the 75th National Convention of Information Processing Society of Japan (IPSJ) (2013). (in Japanese) Kiryu, N., Goto, H., Saito T.: A proposal of estimating of CPU architectures by JavaScript engine. In: Proceedings of the 75th National Convention of Information Processing Society of Japan (IPSJ) (2013). (in Japanese)
27.
Zurück zum Zitat Faizkhademi, A., Zulkernine, M., Weldemariam, K.: Empirical evaluation of web-based fingerprinting. IEEE Softw. 32, 46–52 (2015) Faizkhademi, A., Zulkernine, M., Weldemariam, K.: Empirical evaluation of web-based fingerprinting. IEEE Softw. 32, 46–52 (2015)
28.
Zurück zum Zitat Lu, T., Yao, P., Zhao, L., Li, Y., Xie, F., Xia, Y.: Towards attacks and defenses of anonymous communication systems. Int. J. Secur. Appl. 9(1), 313–328 (2015) Lu, T., Yao, P., Zhao, L., Li, Y., Xie, F., Xia, Y.: Towards attacks and defenses of anonymous communication systems. Int. J. Secur. Appl. 9(1), 313–328 (2015)
29.
Zurück zum Zitat Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of Web-based device fingerprinting. In: Proceedings of the 34th IEEE Symposium of Security and Privacy (IEEE S&P 2013) (2013) Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of Web-based device fingerprinting. In: Proceedings of the 34th IEEE Symposium of Security and Privacy (IEEE S&P 2013) (2013)
30.
Zurück zum Zitat Boda, K., Földes, Á.M., Gulyás, G.G., Imre, S.: Tracking and Fingerprinting in E-Business: New Storageless Technologies and Countermeasures (2013) Boda, K., Földes, Á.M., Gulyás, G.G., Imre, S.: Tracking and Fingerprinting in E-Business: New Storageless Technologies and Countermeasures (2013)
31.
Zurück zum Zitat Upathilake, R., Yingkun, L., Matrawy, A.: A classification of web browser fingerprinting techniques. In: Proceedings of the IFIP New Technologies, Mobility, and Security (NTMS), pp. 1–5 (2015) Upathilake, R., Yingkun, L., Matrawy, A.: A classification of web browser fingerprinting techniques. In: Proceedings of the IFIP New Technologies, Mobility, and Security (NTMS), pp. 1–5 (2015)
33.
Zurück zum Zitat Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of 13th USENIX Security Symposium (2004) Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of 13th USENIX Security Symposium (2004)
36.
Zurück zum Zitat Mulazzani, M., Reschl, P., Huber, M., Leithner, M., Schrittwieser, S., Weippl, E.: Fast and reliable browser identification with JavaScript engine fingerprinting. In: Proceedings of Web 2.0 Workshop on Security and Privacy (W2SP) (2013) Mulazzani, M., Reschl, P., Huber, M., Leithner, M., Schrittwieser, S., Weippl, E.: Fast and reliable browser identification with JavaScript engine fingerprinting. In: Proceedings of Web 2.0 Workshop on Security and Privacy (W2SP) (2013)
Metadaten
Titel
Tor Fingerprinting: Tor Browser Can Mitigate Browser Fingerprinting?
verfasst von
Takamichi Saito
Kazushi Takahashi
Koki Yasuda
Kazuhisa Tanabe
Masayuki Taneoka
Ryohei Hosoya
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-65521-5_44