Cell-Sequence-Based Covert Signal for Tor De-Anonymization Attacks

Ran Xin, Yapeng Wang, Xiaohong Huang, Xu Yang, Sio Kei Im

Research output: Contribution to journalArticlepeer-review

Abstract

This research introduces a novel de-anonymization technique targeting the Tor network, addressing limitations in prior attack models, particularly concerning router positioning following the introduction of bridge relays. Our method exploits two specific, inherent protocol-level vulnerabilities: the absence of a continuity check for circuit-level cells and anomalous residual values in RELAY_EARLY cell counters, working by manipulating cell headers to embed a covert signal. This signal is composed of reserved fields, start and end delimiters, and a payload that encodes target identifiers. Using this signal, malicious routers can effectively mark data flows for later identification. These routers employ a finite state machine (FSM) to adaptively switch between signal injection and detection. Experimental evaluations, conducted within a controlled environment using attacker-controlled onion routers, demonstrated that the embedded signals are undetectable by standard Tor routers, cause no noticeable performance degradation, and allow reliable correlation of Tor users with public services and deanonymization of hidden service IP addresses. This work reveals a fundamental design trade-off in Tor: the decision to conceal circuit length inadvertently exposes cell transmission characteristics. This creates a bidirectional vector for stealthy, protocol-level de-anonymization attacks, even though Tor payloads remain encrypted.

Original languageEnglish
Article number403
JournalFuture Internet
Volume17
Issue number9
DOIs
Publication statusPublished - Sept 2025

Keywords

  • deanonymization attack
  • network security
  • privacy
  • Tor

Fingerprint

Dive into the research topics of 'Cell-Sequence-Based Covert Signal for Tor De-Anonymization Attacks'. Together they form a unique fingerprint.

Cite this