|Title||Shadow: Running Tor in a Box for Accurate and Efficient Experimentation|
|Publication Type||Conference Paper|
|Year of Publication||2012|
|Authors||Jansen, R., and N. Hopper|
|Conference Name||Symposium on Network and Distributed System Security (NDSS)|
Tor is a large and popular overlay network providing both anonymity to its users and a platform for anonymous communication research. New design proposals and attacks on the system are challenging to test in the live network because of deployment issues and the risk of invading users' privacy, while alternative Tor experimentation techniques are limited in scale, are inaccurate, or create results that are difficult to reproduce or verify. We present the design and implementation of Shadow, an architecture for efficiently running accurate Tor experiments on a single machine. We validate Shadow's accuracy with a private Tor deployment on PlanetLab and a comparison to live network performance statistics. To demonstrate Shadow's powerful capabilities, we investigate circuit scheduling and find that the EWMA circuit scheduler reduces aggregate client performance under certain loads when deployed to the entire Tor network. Our software runs without root privileges, is open source, and is publicly available for download.
|NRL Publication Release Number|| |