Anonymous Communication Networks

The Tor anonymity network relies heavily on volunteer owned and operated resources to service millions of users each day. We perform research to protect the network from attacks that compromise user anonymity and resource utility/availability.

Our current work focuses on trying to understand how the Tor network is used for the propagation of abuse online and how this abuse can be mitigated without compromising user anonymity. In an other direction, we are also exploring how new networking technologies can be used to mitigate the threats of traffic correlation attacks on Tor users.