SGX-Tor: A Secure and Practical Tor Anonymity Network With SGX Enclaves

Cited 23 time in webofscience Cited 0 time in scopus
  • Hit : 533
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Seong Minko
dc.contributor.authorHan, Ju Hyengko
dc.contributor.authorHa, Jaehyeongko
dc.contributor.authorKim, Taesooko
dc.contributor.authorHan, Dongsuko
dc.date.accessioned2018-11-12T04:49:19Z-
dc.date.available2018-11-12T04:49:19Z-
dc.date.created2018-11-05-
dc.date.created2018-11-05-
dc.date.issued2018-10-
dc.identifier.citationIEEE-ACM TRANSACTIONS ON NETWORKING, v.26, no.5, pp.2174 - 2187-
dc.identifier.issn1063-6692-
dc.identifier.urihttp://hdl.handle.net/10203/246528-
dc.description.abstractWith Tor being a popular anonymity network, many attacks have been proposed to break its anonymity or leak information of a private communication on Tor. However, guaranteeing complete privacy in the face of an adversary on Tor is especially difficult, because Tor relays are under complete control of world-wide volunteers. Currently, one can gain private information, such as circuit identifiers and hidden service identifiers, by running Tor relays and can even modify their behaviors with malicious intent. This paper presents a practical approach to effectively enhancing the security and privacy of Tor by utilizing Intel SGX, a commodity trusted execution environment. We present a design and implementation of Tor, called SGX-Tor, that prevents code modification and limits the information exposed to untrusted parties. We demonstrate that our approach is practical and effectively reduces the power of an adversary to a traditional network-level adversary. Finally, SGX-Tor incurs moderate performance overhead; the end-to-end latency and throughput overheads for HTTP connections are 3.9% and 11.9%, respectively.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.subjectATTACKS-
dc.titleSGX-Tor: A Secure and Practical Tor Anonymity Network With SGX Enclaves-
dc.typeArticle-
dc.identifier.wosid000447796400013-
dc.identifier.scopusid2-s2.0-85053323217-
dc.type.rimsART-
dc.citation.volume26-
dc.citation.issue5-
dc.citation.beginningpage2174-
dc.citation.endingpage2187-
dc.citation.publicationnameIEEE-ACM TRANSACTIONS ON NETWORKING-
dc.identifier.doi10.1109/TNET.2018.2868054-
dc.contributor.localauthorHan, Dongsu-
dc.contributor.nonIdAuthorHa, Jaehyeong-
dc.contributor.nonIdAuthorKim, Taesoo-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorTor network-
dc.subject.keywordAuthorIntel SGX-
dc.subject.keywordAuthoranonymous network-
dc.subject.keywordAuthortrusted execution environment (TEE)-
dc.subject.keywordPlusATTACKS-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 23 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0