MoneroResearch.info

WIKINDX Resources  

Shi, R., Ge, Y., Lan, L., Peng, Z., Lin, S., & Li, L. 2024, Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes. Paper presented at Companion Proceedings of the ACM on Web Conference 2024. 
Added by: Rucknium (22/05/2024, 21:26)   
Resource type: Proceedings Article
DOI: 10.1145/3589335.3651487
ID no. (ISBN etc.): 9798400701726
BibTeX citation key: Shi2024
View all bibliographic details
Categories: Monero-focused
Keywords: cryptocurrency, Monero, tor network, transaction deanonymization
Creators: Ge, Lan, Li, Lin, Peng, Shi
Publisher: Association for Computing Machinery
Collection: Companion Proceedings of the ACM on Web Conference 2024
Views: 271/1785
Attachments   3589335.3651487.pdf [40/249] URLs   https://doi.org/10.1145/3589335.3651487
Abstract
Monero is a privacy-focused cryptocurrency that incorporates anonymity networks (such as Tor and I2P) and deploys the Dandelion++ protocol to prevent malicious attackers from linking transactions with their source IPs. However, this paper highlights a vulnerability in Monero's integration of the Tor network, which allows an attacker to successfully deanonymize transactions originating from Monero Tor hidden service nodes at the network-layer level. Our approach involves injecting malicious Monero Tor hidden service nodes into the Monero P2P network to correlate the onion addresses of incoming Monero Tor hidden service peers with their originating transactions. And by sending a signal watermark embedded with the onion address to the Tor circuit, we establish a correlation between the onion address and IP address of a Monero Tor hidden service node. Ultimately, we correlate transactions and IPs of Monero Tor hidden service nodes. Through experimentation on the Monero testnet, we provide empirical evidence of the effectiveness of our approach in successfully deanonymizing transactions originating from Monero Tor hidden service nodes.
Added by: Rucknium  
Notes
 

https://libera.monerologs.net/monero-research-lab/20240516#c378118

vtnerd said "we can definitely improve the time_sync request message which is leaking the remote tor address in certain situations. Also, randomly select whether a tx is related over tor another time instead of always forwarding over clearnet."

More discussion at https://libera.monerologs.net/monero-research-lab/20240517

 


Added by: Rucknium  Last edited by: Rucknium
WIKINDX 6.10.2 | Total resources: 233 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced