Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering

Xinshu Ma, Florentin Rochet, Tariq Elahi

Résultats de recherche: Contribution dans un livre/un catalogue/un rapport/dans les actes d'une conférenceArticle dans les actes d'une conférence/un colloque

98 Téléchargements (Pure)


Mixnets provide strong meta-data privacy and recent academic research and industrial projects have made strides in making them more secure, performant, and scalable. In this paper, we focus our work on stratified Mixnets, a popular design with real-world adoption. We identify and measure significant impacts of practical aspects such as: relay sampling and topology placement, network churn, and risks due to real-world usage patterns. We show that, due to the lack of incorporating these aspects in design decisions, Mixnets of this type are far more susceptible to user deanonymization than expected. In order to reason about and resolve these issues, we model Mixnets as a three-stage “Sample-Placement-Forward” pipeline and develop tools to analyze and evaluate design decisions. To address the identified gaps and weaknesses we propose Bow-Tie, a design that mitigates user deanonymization through a novel adaption of Tor’s guard design with an engineered guard layer and client guard-logic for stratified mixnets. We show that Bow-Tie has significantly higher user anonymity in the dynamic setting, where the Mixnet is used over a period of time, and is no worse in the static setting, where the user only sends a single message. We show the necessity of both the guard layer and client guard-logic in tandem as well as their individual effect when incorporated into other reference designs. We develop and implement two tools, 1) a mixnet topology generator (Mixnet-Topology-Generator (MTG)) and 2) a path simulator and security evaluator (routesim) that takes into account temporal dynamics and user behavior, to assist our analysis and empirical data collection. These tools are designed to help Mixnet designers assess the security and performance impact of their design decisions.
langue originaleAnglais
titreProceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022
Lieu de publicationNew York
EditeurACM Press
Nombre de pages14
ISBN (Electronique)9781450397599
ISBN (imprimé)9781450397599
Les DOIs
Etat de la publicationPublié - 5 déc. 2022

Série de publications

NomACM International Conference Proceeding Series

Empreinte digitale

Examiner les sujets de recherche de « Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation