Deanonymizing Tor hidden service users through Bitcoin transactions analysis

被引:35
|
作者
Al Jawaheri, Husam [1 ]
Al Sabah, Mashael [2 ]
Boshmaf, Yazan [2 ]
Erbad, Aiman [3 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
[2] HBKU, Qatar Comp Res Inst, Ar Rayyan, Qatar
[3] Qatar Univ, Doha, Qatar
关键词
Bitcoin; Tor hidden services; Privacy; Deanonymization; Attack;
D O I
10.1016/j.cose.2019.101684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user. By exploiting publicly available information, we show how relying on Bitcoin for payments on Tor hidden services could lead to deanonymization of these services' users. Such linking is possible by finding at least one past transaction in the Blockchain that involves their publicly declared Bitcoin addresses. To demonstrate the consequences of this deanonymization approach, we carried out a real-world experiment simulating a passive, limited adversary. We crawled 1.5K hidden services and collected 88 unique and active Bitcoin addresses. We then crawled 5B tweets and 1M BitcoinTalk forum pages and collected 4.2K and 41K unique Bitcoin addresses, respectively. Each user address was associated with an online identity along with its public profile information. By analyzing the transactions in the Blockchain, we were able to link 125 unique users to 20 hidden services, including sensitive ones, such as The Pirate Bay and Silk Road. We also analyzed two case studies in detail to demonstrate the implications of the information leakage on users anonymity. In particular, we confirm that Bitcoin addresses should be considered exploitable, as they can be used to deanonymize users retroactively. This is especially important for Tor hidden service users who actively seek and expect privacy and anonymity. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way
    Chen, Muqian
    Wang, Xuebin
    Shi, Jinqiao
    Zhao, Can
    Wang, Meiqi
    Fang, Binxing
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 699 - 706
  • [2] Deanonymizing Schemes of Hidden Services in Tor Network: A Survey
    Nepal, Sabita
    Dahal, Saurav
    Shin, Seokjoo
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 468 - 473
  • [3] CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services
    Matic, Srdjan
    Kotzias, Platon
    Caballero, Juan
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1455 - 1466
  • [4] Deanonymizing users of the SafeWeb anonymizing service
    Martin, D
    Schulman, A
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 123 - 137
  • [5] Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor
    Kong, Xiangdong
    Shen, Meng
    Che, Zheng
    Yu, Congcong
    Zhu, Liehuang
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2022, 2022, 1679 : 292 - 305
  • [6] Leveraging the Users Graph and Trustful Transactions for the Analysis of Bitcoin Price
    Crowcroft, Jon
    Maesa, Damiano Di Francesco
    Magrini, Alessandro
    Marino, Andrea
    Ricci, Laura
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1338 - 1352
  • [7] Tracing Tor Hidden Service Through Protocol Characteristics
    Qin, Yi
    Zheng, Tianming
    Wu, Yue
    Zou, Futai
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [8] Forensic Analysis of Bitcoin Transactions
    Wu, Yan
    Luo, Anthony
    Xu, Dianxiang
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 167 - 169
  • [9] A Quantitative Model for Analysis and Evaluation of Tor Hidden Service Discovery
    Liu, Peipeng
    Wang, Xiao
    He, Xin
    Li, Chenglong
    Cao, Shoufeng
    He, Longtao
    Zhu, Jiawei
    ADVANCED HYBRID INFORMATION PROCESSING, 2018, 219 : 70 - 77
  • [10] POSTER: Fingerprinting Tor Hidden Service
    Mitseva, Asya
    Panchenko, Andriy
    Lanze, Fabian
    Henze, Martin
    Wehrle, Klaus
    Engel, Thomas
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1766 - 1768