Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Philipp Winter is active.

Publication


Featured researches published by Philipp Winter.


workshop on privacy in the electronic society | 2013

ScrambleSuit: a polymorphic network protocol to circumvent censorship

Philipp Winter; Tobias Pulls; Juergen Fuss

Deep packet inspection technology became a cornerstone of Internet censorship by facilitating cheap and effective filtering of what censors consider undesired information. Moreover, filtering is not limited to simple pattern matching but makes use of sophisticated techniques such as active probing and protocol classification to block access to popular circumvention tools such as Tor. In this paper, we propose ScrambleSuit; a thin protocol layer above TCP whose purpose is to obfuscate the transported application data. By using morphing techniques and a secret exchanged out-of-band, we show that ScrambleSuit can defend against active probing and other fingerprinting techniques such as protocol classification and regular expressions. We finally demonstrate that our prototype exhibits little overhead and enables effective and lightweight obfuscation for application layer protocols.


privacy enhancing technologies | 2014

Spoiled Onions: Exposing Malicious Tor Exit Relays

Philipp Winter; Richard Köwer; Martin Mulazzani; Markus Huber; Sebastian Schrittwieser; Stefan Lindskog; Edgar R. Weippl

Tor exit relays are operated by volunteers and together push more than 1 GiB/s of network traffic. By design, these volunteers are able to inspect and modify the anonymized network traffic. In this paper, we seek to expose such malicious exit relays and document their actions. First, we monitored the Tor network after developing two fast and modular exit relay scanners—one for credential sniffing and one for active MitM attacks. We implemented several scanning modules for detecting common attacks and used them to probe all exit relays over a period of several months. We discovered numerous malicious exit relays engaging in a multitude of different attacks. To reduce the attack surface users are exposed to, we patched Torbutton, an existing browser extension and part of the Tor Browser Bundle, to fetch and compare suspicious X.509 certificates over independent Tor circuits. Our work makes it possible to continuously and systematically monitor Tor exit relays. We are able to detect and thwart many man-in-the-middle attacks, thereby making the network safer for its users. All our source code is available under a free license.


privacy enhancing technologies | 2015

Analyzing the Great Firewall of China Over Space and Time

Roya Ensafi; Philipp Winter; Abdullah Mueen; Jedidiah R. Crandall

Abstract A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements many different types of censorship and content filtering to control China’s Internet traffic. Past work has shown that the firewall occasionally fails. In other words, sometimes clients in China are able to reach blacklisted servers outside of China. This phenomenon has not yet been characterized because it is infeasible to find a large and geographically diverse set of clients in China from which to test connectivity. In this paper, we overcome this challenge by using a hybrid idle scan technique that is able to measure connectivity between a remote client and an arbitrary server, neither of which are under the control of the researcher performing measurements. In addition to hybrid idle scans, we present and employ a novel side channel in the Linux kernel’s SYN backlog. We show that both techniques are practical by measuring the reachability of the Tor network which is known to be blocked in China. Our measurements reveal that failures in the firewall occur throughout the entire country without any conspicuous geographical patterns.We give some evidence that routing plays a role, but other factors (such as how the GFW maintains its list of IP/port pairs to block) may also be important.


international conference on network protocols | 2017

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Zhuotao Liu; Yushan Liu; Philipp Winter; Prateek Mittal; Yih Chun Hu

Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables abuse-plagued service providers such as Yelp to enforce access rules to police and throttle malicious requests coming from Tor while still providing service to legitimate Tor users. Further, TorPolice equips Tor with global access control for relays, enhancing Tors resilience to botnet abuse. We show that TorPolice preserves the privacy of Tor users, implement a prototype of TorPolice, and perform extensive evaluations to validate our design goals.


foundations of computational intelligence | 2012

How the Great Firewall of China is Blocking Tor

Philipp Winter; Stefan Lindskog


internet measurement conference | 2015

Examining How the Great Firewall Discovers Hidden Circumvention Servers

Roya Ensafi; David Fifield; Philipp Winter; Nick Feamster; Nicholas Weaver; Vern Paxson


arXiv: Cryptography and Security | 2012

How China Is Blocking Tor

Philipp Winter; Stefan Lindskog


foundations of computational intelligence | 2014

Global Network Interference Detection Over the RIPE Atlas Network

Collin Anderson; Philipp Winter; Roya


foundations of computational intelligence | 2013

Towards a Censorship Analyser for Tor

Philipp Winter


;login:: the magazine of USENIX & SAGE | 2012

The great firewall of China : how it blocks Tor and why it is hard to pinpoint

Philipp Winter; Jedidiah R. Crandall

Collaboration


Dive into the Philipp Winter's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abdullah Mueen

University of New Mexico

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Benjamin Greschbach

Royal Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge