A Policy based approach for the management of Web browser resources to prevent anonymity attacks in Tor

Guillermo Navarro-Arribas, Joaquin Garcia-Alfaro

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Web browsers are becoming the universal interface to reach applications and services related with these systems. Different browsing contexts may be required in order to reach them, e.g., use of VPN tunnels, corporate proxies, anonymisers, etc. By browsing context we mean how the user browsers the Web, including mainly the concrete configuration of its browser. When the context of the browser changes, its security requirements also change. In this work, we present the use of authorisation policies to automatise the process of controlling the resources of a Web browser when its context changes. The objective of our proposal is oriented towards easing the adaptation to the security requirements of the new context and enforce them in the browser without the need for user intervention. We present a concrete application of our work as a plug-in for the adaption of security requirements in Mozilla/Firefox browser when a context of anonymous navigation through the Tor network is enabled.

Original languageEnglish
Title of host publicationEmerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Proceedings
Pages164-175
Number of pages12
DOIs
Publication statusPublished - 1 Dec 2009
Externally publishedYes
Event24th IFIP TC11 International Information Security Conference, SEC 2009 - Pafos, Cyprus
Duration: 18 May 200920 May 2009

Publication series

NameIFIP Advances in Information and Communication Technology
Volume297
ISSN (Print)1868-4238

Conference

Conference24th IFIP TC11 International Information Security Conference, SEC 2009
Country/TerritoryCyprus
CityPafos
Period18/05/0920/05/09

Fingerprint

Dive into the research topics of 'A Policy based approach for the management of Web browser resources to prevent anonymity attacks in Tor'. Together they form a unique fingerprint.

Cite this