Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus

This paper gives details of a formal analysis of the MUTE system for anonymous file-sharing. We build pi-calculus models of a node that is innocent of sharing files, a node that is guilty of file-sharing and of the network environment. We then test to see if an attacker can distinguish between a connection to a guilty node and a connection to an innocent node. A weak bi-simulation between every guilty network and an innocent network would be required to show possible innocence. We find that such a bi-simulation cannot exist. The point at which the bi-simulation fails leads directly to a previously undiscovered attack on MUTE. We describe a fix for the MUTE system that involves using authentication keys as the nodes’ pseudo identities and give details of its addition to the MUTE system.

[1]  Ramon Puigjaner,et al.  Computer Performance Evaluation , 2000, Lecture Notes in Computer Science.

[2]  Riccardo Poli,et al.  New ideas in optimization , 1999 .

[3]  Vincent Danos,et al.  Transactions in RCCS , 2005, CONCUR.

[4]  Hugo A. López,et al.  Formally Reasoning About Security Issues in P2P Protocols: A Case Study , 2005 .

[5]  Pierre America,et al.  ECOOP'91 European Conference on Object-Oriented Programming , 1991, Lecture Notes in Computer Science.

[6]  Steve A. Schneider,et al.  CSP and Anonymity , 1996, ESORICS.

[7]  Tom Chothia,et al.  A Survey of Anonymous Peer-to-Peer File-Sharing , 2005, EUC Workshops.

[8]  Jun Pang,et al.  Weak Probabilistic Anonymity , 2007, SecCO@CONCUR.

[9]  Catuscia Palamidessi,et al.  Probable Innocence Revisited , 2005, Formal Aspects in Security and Trust.

[10]  Theo Dimitrakos,et al.  Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers , 2007, Formal Aspects in Security and Trust.

[11]  Marco Dorigo,et al.  The ant colony optimization meta-heuristic , 1999 .

[12]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[13]  Marta Z. Kwiatkowska,et al.  PRISM: Probabilistic Symbolic Model Checker , 2002, Computer Performance Evaluation / TOOLS.

[14]  Mark Ryan,et al.  Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.

[15]  Mario Tokoro,et al.  An Object Calculus for Asynchronous Communication , 1991, ECOOP.

[16]  J. Deneubourg,et al.  Trails and U-turns in the Selection of a Path by the Ant Lasius niger , 1992 .

[17]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[18]  M. Dorigo,et al.  The Ant Colony Optimization MetaHeuristic 1 , 1999 .

[19]  Faron Mollerz,et al.  The Mobility Workbench | a Tool for the -calculus | , 1994 .

[20]  Faron Moller,et al.  The Mobility Workbench - A Tool for the pi-Calculus , 1994, CAV.

[21]  J. Bergstra,et al.  Handbook of Process Algebra , 2001 .

[22]  Roger Dingledine,et al.  The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[23]  Hannes Federrath Designing Privacy Enhancing Technologies , 2001, Lecture Notes in Computer Science.

[24]  Robin Milner,et al.  The Polyadic π-Calculus: a Tutorial , 1993 .

[25]  Elisa Bertino,et al.  Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.

[26]  Joachim Parrow,et al.  An introduction to the pi-calculus , 2001 .

[27]  Catuscia Palamidessi,et al.  Probabilistic Anonymity , 2005, CONCUR.

[28]  Ki Chang Kim,et al.  Securing anonymity in P2P network , 2005, sOc-EUSAI '05.

[29]  Laurence T. Yang,et al.  Embedded and Ubiquitous Computing - EUC 2005, International Conference EUC 2005, Nagasaki, Japan, December 6-9, 2005, Proceedings , 2005, EUC.

[30]  Wolter Pieters,et al.  Provable anonymity , 2005, FMSE '05.

[31]  Alwen Tiu Level 0/1 Prover: A Tutorial , 2004 .

[32]  Emin Gün Sirer,et al.  Eluding carnivores: file sharing with strong anonymity , 2004, EW 11.

[33]  Catuscia Palamidessi,et al.  Probabilistic Asynchronous pi-Calculus , 2000, FoSSaCS.

[34]  Imed Bouazizi,et al.  ARA-the ant-colony based routing algorithm for MANETs , 2002, Proceedings. International Conference on Parallel Processing Workshop.