FINDING · DETECTION

A circuit-clogging attack against bridge operators—using median-normalized latency correlations—achieved an AUC of 0.884 and an equal error rate of 0.2 when distinguishing the victim bridge from innocent bridges in PlanetLab experiments with 180 victim and 180 disjoint runs. With 10 repeated clogging experiments and a majority-vote threshold, the false positive (and false negative) rate drops below 0.033, confirming a bridge operator's identity with high confidence given a candidate set of ≤4.4 bridges from the winnowing stage.

From 2009-mclachlan-risksOn the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design · §3.4 · 2009 · Workshop on Privacy in the Electronic Society

Implications

Tags

censors
generic
techniques
flow-correlationtraffic-shape
defenses
bridgestor

Extracted by claude-sonnet-4-6 — review before relying.