write an actual research pa...
Roger Dingledine authored 14 years ago
|
12) <p>
13) Many people around the world are doing research on how to improve the Tor
14) design, what's going on in the Tor network, and more generally on attacks
15) and defenses for anonymous communication systems. This page summarizes
16) the resources we provide to help make your Tor research more effective.
17) The best way to reach us about research is through the <a href="<page
18) contact>">tor-assistants</a> list.
19) </p>
20)
21) <ul>
22)
23) <li>
24) <b>Data.</b>
25) We've been <a href="http://metrics.torproject.org/data.html">collecting
26) data to learn more about the Tor network</a>: how many relays and
27) clients there are in the network, what capabilities they have, how
28) fast the network is, how many clients are connecting via bridges,
29) what traffic exits the network, etc. We are also developing
30) tools to process these huge data archives and come up with
31) <a href="http://metrics.torproject.org/graphs.html">useful
32) statistics</a>. For example, we provide a <a
33) href="https://gitweb.torproject.org//ernie.git?a=blob_plain;f=doc/manual.pdf">tool
34) called Ernie</a> that can import relay descriptors into a local database
35) to perform analyses. Let us know what other information you'd like to
36) see, and we can work with you to help make sure it gets collected safely
37) and robustly.
38) </li>
39)
40) <li>
41) <b>Analysis.</b>
42) If you're investigating Tor, or solving a Tor-related problem,
43) <i>_please_</i> talk to us somewhere along the way — the earlier
44) the better. These days we review too many conference paper submissions
45) that make bad assumptions and end up solving the wrong problem. Since
46) the Tor protocol and the Tor network are both moving targets, measuring
47) things without understanding what's going on behind the scenes is going
48) to result in bad conclusions. In particular, different groups often
49) unwittingly run a variety of experiments in parallel, and at the same
50) time we're constantly modifying the design to try new approaches. If
51) you let us know what you're doing and what you're trying to learn,
52) we can help you understand what other variables to expect and how to
53) interpret your results.
54) </li>
55)
56) <li>
57) <b>Measurement and attack tools.</b>
58) We're building a <a
59) href="http://metrics.torproject.org/tools.html">repository</a> of tools
60) that can be used to measure, analyze, or perform attacks on Tor. Many
61) research groups end up needing to do similar measurements (for example,
62) change the Tor design in some way and then see if latency improves),
63) and we hope to help everybody standardize on a few tools and then make
64) them really good. Also, while there are some really neat Tor attacks
65) that people have published about, it's hard to track down a copy of
66) the code they used. Let us know if you have new tools we should list,
67) or improvements to the existing ones. The more the better, at this stage.
68) </li>
69)
70) <li>
71) <b>In-person help.</b>
72) If you're doing interesting and important Tor research and need help
73) understanding how the Tor network or design works, interpreting your
74) data, crafting your experiments, etc, we can send a Tor researcher to
75) your doorstep. As you might expect, we don't have a lot of free time;
76) but making sure that research is done in a way that's useful to us is
77) really important. So let us know, and we'll work something out.
78) </li>
79)
80) </ul>
81)
82) <a id="Groups"></a>
83) <h2><a class="anchor" href="#Ideas">Research Groups</a></h2>
84)
85) <p>Interested to find other anonymity researchers? Here are some
86) research groups you should take a look at.</p>
87)
88) <ul>
89) <li>Ian Goldberg's <a href="http://crysp.uwaterloo.ca/">CrySP</a> group
90) at Waterloo.
91) </li>
92) <li><a href="http://www-users.cs.umn.edu/~hopper/">Nick Hopper</a>'s
93) group at UMN.
94) </li>
95) <li><a href="http://www.hatswitch.org/~nikita/">Nikita Borisov</a>'s
96) group at Illinois.
97) </li>
98) <li>Matt Wright's <a href="http://isec.uta.edu/">iSec</a> group at
99) UTA.
100) </li
101) </ul>
102)
103) <a id="Ideas"></a>
104) <h2><a class="anchor" href="#Ideas">Research Ideas</a></h2>
105)
106) <p>
107) If you're interested in anonymity research, you must make it to the
108) <a href="http://petsymposium.org/">Privacy Enhancing Technologies
109) Symposium</a>. Everybody who's anybody in the anonymity research world
110) will be there. The 2010 conference is in Berlin in July. Stipends are
111) available for people whose presence will benefit the community.
112) </p>
113)
114) <p>To get up to speed on anonymity research, read <a
115) href="http://freehaven.net/anonbib/">these papers</a> (especially the
116) ones in boxes).</p>
|