Application-Aware Anonymity (A3) is an extensible platform for applications to deploy anonymity-based services on the Internet. A3 allows applications to tailor their anonymity properties and performance characteristics according to their specific communication requirements. For example, A3 permits an anonymous voice-over-IP application to produce anonymous paths with low latency and jitter, while providing anonymous file transfer applications with high bandwidth (but not necessarily low latency or jitter) routes.
To support flexible path construction, A3 exposes a declarative language (A3Log) that enables applications to compactly specify path selection and instantiation policies which are then executed using a declarative networking engine. We demonstrate that our declarative language is sufficiently versatile to represent novel multi-metric performance constraints as well as existing relay selection algorithms used by Tor and other anonymity systems, using only a few lines of concise code. In addition to specifying relay selection strategies, senders are able to use our declarative techniques to construct anonymous tunnels according to their specifications (for example, via Onion Routing or Crowds). We experimentally evaluate the A3 system using a combination of trace-driven simulations and deployment on PlanetLab. Our experimental results demonstrate that the A3 system can flexibly support a wide range of path selection and instantiation strategies at low performance overhead.
An experimental release of A3 is now available for download. Please note that this release is designed for research purposes, and should not be relied upon for strong anonymity.
A3 is released under the GPLv2 license.
A3 is a collaborative effort between Georgetown University and the University of Pennsylvania.
- Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, and Matt Blaze. A3: An Extensible Platform for Application-Aware Anonymity. In 17th Annual Network and Distributed System Security Symposium (NDSS), February 2010.
- Micah Sherr. Coordinate-Based Routing for High Performance Anonymity. PhD Thesis, University of Pennsylvania, July 2009.
- Micah Sherr, Matt Blaze, and Boon Thau Loo. Scalable Link-Based Relay Selection for Anonymous Routing. In Privacy Enhancing Technologies Symposium (PETS), August 2009
- Micah Sherr, Matt Blaze, and Boon Thau Loo. Veracity: Practical Secure Network Coordinates via Vote-based Agreements. In USENIX Annual Technical Conference (USENIX-ATC), June 2009.
- Micah Sherr, Boon Thau Loo, and Matt Blaze. Veracity: A fully decentralized service for securing network coordinate systems. In 7th International Workshop on Peer-to-Peer Systems (IPTPS), February 2008.
- Micah Sherr, Boon Thau Loo, and Matt Blaze. Towards Application-Aware Anonymous Routing. In Second USENIX Workshop on Hot Topics in Security (HotSec), August 2007.
Contact InfoFor more information, please email Micah Sherr.
VeracityPlease see the Veracity website for more information.