9/6/2023 0 Comments Android malware onion tor![]() ![]() Then, we discuss a Proof-of-Concept, implementing the methodology, that shows how the attack can be performed in practice and allows to assess the deanonymization accuracy that it is possible to achieve. For this purpose, we describe a general methodology for performing an attack that allows to deanonymize the apps running on a target smartphone using Tor. ![]() While attacks against Tor anonymity have already gained considerable attention in the context of website fingerprinting in desktop environments, to the best of our knowledge this is the first work that addresses a similar problem on Android devices. The aim of this work is showing that Tor is vulnerable to app deanonymization attacks on Android devices through network traffic analysis. For this reason they are continuously under deep observation to detect vulnerabilities that would compromise users anonymity. Solutions like Tor allow users to gain more freedom, bypassing these restrictions. According to Freedom on the Net 2017 report more than 60% of World’s Internet users are not completely free from censorship. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |