메뉴 건너뛰기




Volumn 4776 LNCS, Issue , 2007, Pages 184-199

Browser-based attacks on tor

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; ONLINE SEARCHING; SIGNAL PROCESSING; TELECOMMUNICATION TRAFFIC;

EID: 38149139318     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75551-7_12     Document Type: Conference Paper
Times cited : (58)

References (20)
  • 1
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2) (February 1981)
    • (1981) Communications of the ACM , vol.24 , Issue.2
    • Chaum, D.1
  • 2
    • 84943605031 scopus 로고    scopus 로고
    • Practical Onion Hacking: Find the real address of Tor clients
    • October
    • Christensen, A., et al.: Practical Onion Hacking: Find the real address of Tor clients. FortConsult (October 2006), http://www.fortconsult.net/images/ pdf/Practical_Onion_Hacking. pdf
    • (2006) FortConsult
    • Christensen, A.1
  • 6
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil Attack
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Douceur, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429
    • Douceur, J.1
  • 7
    • 38149092212 scopus 로고    scopus 로고
    • Hintz, A.: Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 229-233. Springer, Heidelberg (2003)
    • Hintz, A.: Fingerprinting Websites Using Traffic Analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 229-233. Springer, Heidelberg (2003)
  • 8
    • 33846288517 scopus 로고    scopus 로고
    • Timing Attacks in Low-Latency Mix Systems (extended abstract)
    • Juels, A, ed, FC, Springer, Heidelberg
    • Levine, B.N., Reiter, M., Wang, C., Wright, M.: Timing Attacks in Low-Latency Mix Systems (extended abstract). In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251-265. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3110 , pp. 251-265
    • Levine, B.N.1    Reiter, M.2    Wang, C.3    Wright, M.4
  • 10
    • 38149098250 scopus 로고    scopus 로고
    • AOL search data identified individuals
    • August
    • Martin, K.: AOL search data identified individuals. SecurityFocus (August 2006), http://www.securityfocus.com/brief/277
    • (2006) SecurityFocus
    • Martin, K.1
  • 13
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Raymond, J.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10-29. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 10-29
    • Raymond, J.1
  • 14
    • 0142250280 scopus 로고    scopus 로고
    • Passive Attack Analysis for Connection-Based Anonymity Systems
    • Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
    • Serjantov, A., Sewell, P.: Passive Attack Analysis for Connection-Based Anonymity Systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116-131. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2808 , pp. 116-131
    • Serjantov, A.1    Sewell, P.2
  • 15
    • 84937565289 scopus 로고    scopus 로고
    • Towards an Analysis of Onion Routing Security
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4
  • 18
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • Wright, M., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. In: ACM Trans. Inf. Syst. Secur., pp. 489-522 (2004)
    • (2004) ACM Trans. Inf. Syst. Secur , pp. 489-522
    • Wright, M.1    Adler, M.2    Levine, B.N.3    Shields, C.4
  • 19
    • 38149022331 scopus 로고    scopus 로고
    • Squires, S.: Firefox Add-ons: Torbutton (February 2007), https://addons.mozilla.org/firefox/2275/
    • Squires, S.: Firefox Add-ons: Torbutton (February 2007), https://addons.mozilla.org/firefox/2275/
  • 20
    • 38149072095 scopus 로고    scopus 로고
    • TheOnionRouter/TorFAQ (November 2006), http://wiki.noreply.org/noreply/ TheOnionRouter/TorFAQ
    • TheOnionRouter/TorFAQ (November 2006), http://wiki.noreply.org/noreply/ TheOnionRouter/TorFAQ


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.