According to Freedom on the Net 2017 report [15] more than 60% of World’s Internet users are not completely free from censorship. Solutions like Tor allow users to gain more freedom, bypassing these restrictions. For this reason they are continuously under deep observation to detect vulnerabilities that would compromise users anonymity. The aim of this work is showing that Tor is vulnerable to app deanonymization attacks on Android devices through network traffic analysis. While attacks against Tor anonymity have already gained considerable attention in the context of website fingerprinting in desktop environments, to the best of our knowledge this is the first work that addresses a similar problem on Android devices. For this purpose, we describe a general methodology for performing an attack that allows to deanonymize the apps running on a target smartphone using Tor. Then, we discuss a Proof-of-Concept, implementing the methodology, that shows how the attack can be performed in practice and allows to assess the deanonymization accuracy that it is possible to achieve. Moreover, we made the software of the Proof-of-Concept available, as well as the datasets used to evaluate it. In our extensive experimental evaluation, we achieved an accuracy of 97%.

Peel the Onion: Recognition of Android Apps Behind the Tor Network / Petagna, Emanuele; Laurenza, Giuseppe; Ciccotelli, Claudio; Querzoni, Leonardo. - 11879:(2019), pp. 95-112. (Intervento presentato al convegno 15th International Conference on Information Security Practice and Experience, ISPEC 2019 tenutosi a Kuala Lumpur; Malaysia) [10.1007/978-3-030-34339-2_6].

Peel the Onion: Recognition of Android Apps Behind the Tor Network

Laurenza, Giuseppe
;
Ciccotelli, Claudio
;
Querzoni, Leonardo
2019

Abstract

According to Freedom on the Net 2017 report [15] more than 60% of World’s Internet users are not completely free from censorship. Solutions like Tor allow users to gain more freedom, bypassing these restrictions. For this reason they are continuously under deep observation to detect vulnerabilities that would compromise users anonymity. The aim of this work is showing that Tor is vulnerable to app deanonymization attacks on Android devices through network traffic analysis. While attacks against Tor anonymity have already gained considerable attention in the context of website fingerprinting in desktop environments, to the best of our knowledge this is the first work that addresses a similar problem on Android devices. For this purpose, we describe a general methodology for performing an attack that allows to deanonymize the apps running on a target smartphone using Tor. Then, we discuss a Proof-of-Concept, implementing the methodology, that shows how the attack can be performed in practice and allows to assess the deanonymization accuracy that it is possible to achieve. Moreover, we made the software of the Proof-of-Concept available, as well as the datasets used to evaluate it. In our extensive experimental evaluation, we achieved an accuracy of 97%.
2019
15th International Conference on Information Security Practice and Experience, ISPEC 2019
Anonymous communications; tor; mobile
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Peel the Onion: Recognition of Android Apps Behind the Tor Network / Petagna, Emanuele; Laurenza, Giuseppe; Ciccotelli, Claudio; Querzoni, Leonardo. - 11879:(2019), pp. 95-112. (Intervento presentato al convegno 15th International Conference on Information Security Practice and Experience, ISPEC 2019 tenutosi a Kuala Lumpur; Malaysia) [10.1007/978-3-030-34339-2_6].
File allegati a questo prodotto
File Dimensione Formato  
Petagna_Postprint_Peel-the-Onion_2019.pdf

accesso aperto

Note: https://link.springer.com/chapter/10.1007/978-3-030-34339-2_6
Tipologia: Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 325.85 kB
Formato Adobe PDF
325.85 kB Adobe PDF
Petagna_Peel-the-Onion_2019.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 476.67 kB
Formato Adobe PDF
476.67 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1346051
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 9
  • ???jsp.display-item.citation.isi??? 8
social impact