Show simple item record

dc.contributor.advisorSrinivas Devadas.en_US
dc.contributor.authorHogan, Kyle(Kyle L.)en_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2020-11-23T17:40:22Z
dc.date.available2020-11-23T17:40:22Z
dc.date.copyright2020en_US
dc.date.issued2020en_US
dc.identifier.urihttps://hdl.handle.net/1721.1/128590
dc.descriptionThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, February, 2020en_US
dc.descriptionCataloged from PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 99-107).en_US
dc.description.abstractThe performance and security of anonymous communication protocols are closely tied to their effective utilization of lower layer network primitives. Tor, the most widely deployed framework for anonymous communication over the internet, suffers from high latency and bandwidth overheads due to poor congestion control and interference between clients. Additionally, Tor's use of TCP for network transport has resulted in traffic features that are correlated to the underlying data being transmitted. This correlation can be exploited by network adversaries to compromise the anonymity of Tor users. Solutions to both the security and performance issues experienced by Tor require network layer support that is not provided by TCP. Recent proposals have turned to a new network protocol, QUIC, as an alternative. QUIC provides native support for logical multiplexing of unrelated data as well as the fairness and flow control required for Tor to carry data from multiple clients efficiently. Previous proposals have utilized QUIC to, separately, provide logical multiplexing for data from independent clients and support end-to-end congestion control. This work combines these efforts to incorporate backpropagation of congestion control information into a design that supports logical multiplexing for client data. It additionally discusses how QUIC can be used to solve Tor's inefficient, unfair resource allocation caused by ineffective queuing at Tor relays. The combination of multiplexing, congestion control, and effective scheduling provided by this proposal to run Tor over QUIC addresses all of Tor's major performance concerns in a cohesive design without introducing additional complexity into the Tor protocol itself. All design decisions are motivated by a security analysis, lacking in prior proposals, that ensures none of the performance enhancing features come at the cost of user anonymity.en_US
dc.description.statementofresponsibilityby Kyle Hogan.en_US
dc.format.extent107 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses may be protected by copyright. Please reuse MIT thesis content according to the MIT Libraries Permissions Policy, which is available through the URL provided.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleSecurity analysis of Tor over QUICen_US
dc.typeThesisen_US
dc.description.degreeS.M.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.identifier.oclc1220836856en_US
dc.description.collectionS.M. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Scienceen_US
dspace.imported2020-11-23T17:40:21Zen_US
mit.thesis.degreeMasteren_US
mit.thesis.departmentEECSen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record