{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:06:26Z","timestamp":1772042786873,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2010,2,1]],"date-time":"2010-02-01T00:00:00Z","timestamp":1264982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0546162"],"award-info":[{"award-number":["CNS-0546162"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2010,2]]},"abstract":"<jats:p>Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by \u201clocal\u201d adversaries who control only a few machines and have low enough delay to support anonymous use of network services like Web browsing and remote login. One consequence of these goals is that these services leak some information about the network latency between the sender and one or more nodes in the system. We present two attacks on low-latency anonymity schemes using this information. The first attack allows a pair of colluding Web sites to predict, based on local timing information and with no additional resources, whether two connections from the same Tor exit node are using the same circuit with high confidence. The second attack requires more resources but allows a malicious Web site to gain several bits of information about a client each time he visits the site. We evaluate both attacks against two low-latency anonymity protocols\u2014the Tor network and the MultiProxy proxy aggregator service\u2014and conclude that both are highly vulnerable to these attacks.<\/jats:p>","DOI":"10.1145\/1698750.1698753","type":"journal-article","created":{"date-parts":[[2010,3,9]],"date-time":"2010-03-09T16:34:59Z","timestamp":1268152499000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":91,"title":["How much anonymity does network latency leak?"],"prefix":"10.1145","volume":"13","author":[{"given":"Nicholas","family":"Hopper","sequence":"first","affiliation":[{"name":"University of Minnesota"}]},{"given":"Eugene Y.","family":"Vasserman","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]},{"given":"Eric","family":"Chan-TIN","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]}],"member":"320","published-online":{"date-parts":[[2010,3,5]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2008. TOR node status information. https:\/\/torstat.xenobite.edu\/.  2008. TOR node status information. https:\/\/torstat.xenobite.edu\/."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of Information Hiding Workshop (IH'01)","author":"Back A.","unstructured":"Back , A. , M\u00f6ller , U. , and Stiglic , A . 2001. Traffic analysis attacks and trade-offs in anonymity providing systems . In Proceedings of Information Hiding Workshop (IH'01) . Springer-Verlag, Berlin, 245--257. Back, A., M\u00f6ller, U., and Stiglic, A. 2001. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of Information Hiding Workshop (IH'01). Springer-Verlag, Berlin, 245--257."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04)","author":"Blum A.","unstructured":"Blum , A. , Song , D. , and Venkataraman , S . 2004. Detection of interactive stepping stones: Algorithms and confidence bounds . In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04) . Springer, Berlin. Blum, A., Song, D., and Venkataraman, S. 2004. Detection of interactive stepping stones: Algorithms and confidence bounds. In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04). Springer, Berlin."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_2_1_5_1","unstructured":"Chroboczek J. 2003--2008. Polipo--A caching web proxy. http:\/\/www.pps.jussieu.fr\/jch\/software\/polipo\/.  Chroboczek J. 2003--2008. Polipo--A caching web proxy. http:\/\/www.pps.jussieu.fr\/jch\/software\/polipo\/."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)","author":"Costa M.","unstructured":"Costa , M. , Castro , M. , Rowstron , A. , and Key , P . 2004. PIC: Practical internet coordinates for distance estimation . In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04) . IEEE, Los Alamitos, CA, 178--187. Costa, M., Castro, M., Rowstron, A., and Key, P. 2004. PIC: Practical internet coordinates for distance estimation. In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04). IEEE, Los Alamitos, CA, 178--187."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015471"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP'03)","author":"Danezis G.","unstructured":"Danezis , G. , Dingledine , R. , and Mathewson , N . 2003. Mixminion: Design of a type III anonymous remailer protocol . In Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP'03) . IEEE, Los Alamitos, CA, 2. Danezis, G., Dingledine, R., and Mathewson, N. 2003. Mixminion: Design of a type III anonymous remailer protocol. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP'03). IEEE, Los Alamitos, CA, 2."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of Privacy Enhancing Technologies Workshop (PET'03)","author":"D\u00edaz C.","unstructured":"D\u00edaz , C. and Serjantov , A . 2003. Generalizing mixes . In Proceedings of Privacy Enhancing Technologies Workshop (PET'03) . Springer-Verlag, Berlin. D\u00edaz, C. and Serjantov, A. 2003. Generalizing mixes. In Proceedings of Privacy Enhancing Technologies Workshop (PET'03). Springer-Verlag, Berlin."},{"key":"e_1_2_1_12_1","unstructured":"Dingledine R. Mathewson N. and Syverson P. F. 1999. Anonymity bibliography. http:\/\/freehaven.net\/anonbib.  Dingledine R. Mathewson N. and Syverson P. F. 1999. Anonymity bibliography. http:\/\/freehaven.net\/anonbib."},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 13th USENIX Security Symposium. USENIX","author":"Dingledine R.","unstructured":"Dingledine , R. , Mathewson , N. , and Syverson , P. F . 2004. Tor: The second-generation onion router . In Proceedings of the 13th USENIX Security Symposium. USENIX , Berkeley, CA. Dingledine, R., Mathewson, N., and Syverson, P. F. 2004. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium. USENIX, Berkeley, CA."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_2_1_15_1","volume-title":"JAP: Java anonymous proxy","author":"Federrath H.","year":"2006","unstructured":"Federrath , H. and K\u00f6psell , S . 2006 . JAP: Java anonymous proxy . http:\/\/anon.inf.tu-dresden.de\/. Federrath, H. and K\u00f6psell, S. 2006. JAP: Java anonymous proxy. http:\/\/anon.inf.tu-dresden.de\/."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2616"},{"key":"e_1_2_1_17_1","unstructured":"Gil T. M. Kaashoek F. Li J. Morris R. and Stribling J. 2005. The \u201cKing\u201d data set. http:\/\/pdos.csail.mit.edu\/p2psim\/kingdata\/.  Gil T. M. Kaashoek F. Li J. Morris R. and Stribling J. 2005. The \u201cKing\u201d data set. http:\/\/pdos.csail.mit.edu\/p2psim\/kingdata\/."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.886332"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637203"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the Privacy Enhancing Technologies Workshop (PET'02)","author":"Hintz A.","year":"2002","unstructured":"Hintz , A. 2002 . Fingerprinting Web sites using traffic analysis . In Proceedings of the Privacy Enhancing Technologies Workshop (PET'02) . Springer-Verlag, Berlin. Hintz, A. 2002. Fingerprinting Web sites using traffic analysis. In Proceedings of the Privacy Enhancing Technologies Workshop (PET'02). Springer-Verlag, Berlin."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315257"},{"key":"e_1_2_1_22_1","unstructured":"jrandom. 2007. I2P. http:\/\/www.i2p.net\/.  jrandom. 2007. I2P. http:\/\/www.i2p.net\/."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the Information Hiding Workshop (IH'98)","author":"Kesdogan D.","unstructured":"Kesdogan , D. , Egner , J. , and B\u00fcschkes , R . 1998. Stop-and-go MIXes: Providing probabilistic anonymity in an open system . In Proceedings of the Information Hiding Workshop (IH'98) . Springer-Verlag, Berlin. Kesdogan, D., Egner, J., and B\u00fcschkes, R. 1998. Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In Proceedings of the Information Hiding Workshop (IH'98). Springer-Verlag, Berlin."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI). USENIX","author":"Ledlie J.","unstructured":"Ledlie , J. , Gardner , P. , and Seltzer , M . 2007. Network coordinates in the wild . In Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI). USENIX , Berkeley, CA. Ledlie, J., Gardner, P., and Seltzer, M. 2007. Network coordinates in the wild. In Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI). USENIX, Berkeley, CA."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_2"},{"key":"e_1_2_1_26_1","unstructured":"Moeller U. Cottrell L. Palfrader P. and Sassaman L. 2005. IETF draft: Mixmaster protocol version 2. http:\/\/www.ietf.org\/internet-drafts\/draft-sassaman-mixmaster-03. txt.  Moeller U. Cottrell L. Palfrader P. and Sassaman L. 2005. IETF draft: Mixmaster protocol version 2. http:\/\/www.ietf.org\/internet-drafts\/draft-sassaman-mixmaster-03. txt."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the USENIX Conference. USENIX","author":"Ng T. E.","unstructured":"Ng , T. E. and Zhang , H . 2004. A network positioning system for the Internet . In Proceedings of the USENIX Conference. USENIX , Berkeley, CA. Ng, T. E. and Zhang, H. 2004. A network positioning system for the Internet. In Proceedings of the USENIX Conference. USENIX, Berkeley, CA."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1459"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"e_1_2_1_32_1","unstructured":"Panchenko D. 2006. Lecture Notes of 18.443 Statistics for Applications. MIT Open Courseware Projec. http:\/\/ocw.mit.edu\/OcwWeb\/Mathematics\/18-443Fall-2006\/CourseHome\/index.htm.  Panchenko D. 2006. Lecture Notes of 18.443 Statistics for Applications. MIT Open Courseware Projec. http:\/\/ocw.mit.edu\/OcwWeb\/Mathematics\/18-443Fall-2006\/CourseHome\/index.htm."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3261"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of 8th European Symposium on Research in Computer Security (ESORICS'03)","author":"Serjantov A.","unstructured":"Serjantov , A. and Sewell , P . 2003. Passive attack analysis for connection-based anonymity systems . In Proceedings of 8th European Symposium on Research in Computer Security (ESORICS'03) . Springer, Berlin. Serjantov, A. and Sewell, P. 2003. Passive attack analysis for connection-based anonymity systems. In Proceedings of 8th European Symposium on Research in Computer Security (ESORICS'03). Springer, Berlin."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the USENIX Symposium on Internet Technologies and Systems (USITS). USENIX","author":"Spring N.","unstructured":"Spring , N. , Wetherall , D. , and Anderson , T . 2003. Scriptroute: A public Internet measure-ment facility . In Proceedings of the USENIX Symposium on Internet Technologies and Systems (USITS). USENIX , Berkeley, CA, 225--238. Spring, N., Wetherall, D., and Anderson, T. 2003. Scriptroute: A public Internet measure-ment facility. In Proceedings of the USENIX Symposium on Internet Technologies and Systems (USITS). USENIX, Berkeley, CA, 225--238."},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag","author":"Syverson P.","unstructured":"Syverson , P. , Tsudik , G. , Reed , M. , and Landwehr , C . 2000. Towards an analysis of onion routing security . In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag , Berlin, 96--114. Syverson, P., Tsudik, G., Reed, M., and Landwehr, C. 2000. Towards an analysis of onion routing security. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, Berlin, 96--114."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the USENIX Workshop on Real, Large, Distributed Systems. USENIX","author":"Wong B.","unstructured":"Wong , B. , Stoyanov , I. , and Sirer , E. G . 2006. Geolocalization on the Internet through constraint satisfaction . In Proceedings of the USENIX Workshop on Real, Large, Distributed Systems. USENIX , Berkeley, CA. Wong, B., Stoyanov, I., and Sirer, E. G. 2006. Geolocalization on the Internet through constraint satisfaction. In Proceedings of the USENIX Workshop on Real, Large, Distributed Systems. USENIX, Berkeley, CA."},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE","author":"Wright M.","unstructured":"Wright , M. , Adler , M. , Levine , B. N. , and Shields , C . 2003. Defending anonymous communication against passive logging attacks . In Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE , Los Alamtios, CA. Wright, M., Adler, M., Levine, B. N., and Shields, C. 2003. Defending anonymous communication against passive logging attacks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE, Los Alamtios, CA."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1698750.1698753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1698750.1698753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:58Z","timestamp":1750278178000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1698750.1698753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,2]]}},"alternative-id":["10.1145\/1698750.1698753"],"URL":"https:\/\/doi.org\/10.1145\/1698750.1698753","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2]]},"assertion":[{"value":"2008-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-03-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}