-
1
-
-
80755145235
-
-
http://netfiles.uiuc.edu/mittal2/www/throughput-fingerprinting.html.
-
-
-
-
2
-
-
56449096542
-
-
Cisco Systems, Inc., Cisco IOS Netflow. http://www.cisco.com/en/US/ products/ps6601/products-ios-protocol-group-home.html.
-
Cisco IOS Netflow
-
-
-
3
-
-
80755134970
-
-
Symantec data loss prevention. http://www.Symantec.com/business/products/ family.jsp?familyid=data-loss-prevention.
-
-
-
-
4
-
-
80955131913
-
Browser-based attacks on tor
-
ABBOTT, T., LAI, K., LIEBERMAN, M., AND PRICE, E. Browser-based attacks on Tor. In PETS (2007).
-
(2007)
PETS
-
-
Abbott, T.1
Lai, K.2
Lieberman, M.3
Price, E.4
-
5
-
-
84910608702
-
DefenestraTor: Throwing out windows in tor
-
ALSABAH, M., BAUER, K., GOLDBERG, I., GRUNWALD, D., MCCOY, D., SAVAGE, S., AND VOELKER, G. DefenestraTor: Throwing out windows in Tor. Tech. rep., University of Waterloo, 2011.
-
(2011)
Tech. Rep., University of Waterloo
-
-
Alsabah, M.1
Bauer, K.2
Goldberg, I.3
Grunwald, D.4
Mccoy, D.5
Savage, S.6
Voelker, G.7
-
6
-
-
50249095096
-
Freedom systems 2.1 security issues and analysis
-
May
-
BACK, A., GOLDBERG, I., AND SHOSTACK, A. Freedom systems 2.1 security issues and analysis. White paper, Zero Knowledge Systems, Inc., May 2001.
-
(2001)
White Paper, Zero Knowledge Systems, Inc.
-
-
Back, A.1
Goldberg, I.2
Shostack, A.3
-
7
-
-
0038650844
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In IH (2001).
-
(2001)
IH
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
8
-
-
84963503600
-
Anonymity and unobservability in the internet
-
Project
-
BERTHOLD, O., FEDERRATH, H., AND KÖHNTOPP, M. Project "anonymity and unobservability in the Internet". In 10th Conf. on Computers, Freedom and Privacy (2000).
-
(2000)
10th Conf. on Computers, Freedom and Privacy
-
-
Berthold, O.1
Federrath, H.2
Köhntopp, M.3
-
10
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
BORISOV, N., DANEZIS, G., MITTAL, P., AND TABRIZ, P. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In CCS (2007).
-
(2007)
CCS
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
11
-
-
80755145232
-
Traffic analysis against low-latency anonymity networks using available bandwidth estimation
-
CHAKRAVARTY, S., STAVROU, A., AND KEROMYTIS, A. D. Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In ESORICS (2010).
-
(2010)
ESORICS
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.D.3
-
12
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
CHAUM, D. Untraceable electronic mail, return addresses, and digital pseudonyms. CACM 24, 2 (1981).
-
(1981)
CACM
, vol.24
, pp. 2
-
-
Chaum, D.1
-
14
-
-
80755134967
-
Mixminion: Design of a type III anonymous remailer protocol
-
DANEZIS, G., DINGLEDINE, R., AND MATHEWSON, N. Mixminion: Design of a Type III anonymous remailer protocol. In IEEE S&P (2003).
-
(2003)
IEEE S&P
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
15
-
-
3242815149
-
Towards measuring anonymity
-
DIAZ, C., SEYS, S., CLAESSENS, J., AND PRENEEL, B. Towards measuring anonymity. In PETS (2002).
-
(2002)
PETS
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
17
-
-
74049136866
-
AS-awareness in tor path selection
-
EDMAN, M., AND SYVERSON, P. AS-awareness in Tor path selection. In CCS (2009).
-
(2009)
CCS
-
-
Edman, M.1
Syverson, P.2
-
20
-
-
20444439634
-
Location diversity in anonymity networks
-
FEAMSTER, N., AND DINGLEDINE, R. Location diversity in anonymity networks. In WPES (2004).
-
(2004)
WPES
-
-
Feamster, N.1
Dingledine, R.2
-
21
-
-
0002532939
-
On the probable error of a coefficient of correlation deduced from a small sample
-
FISHER, R. On the probable error of a coefficient of correlation deduced from a small sample. Metron (1921).
-
(1921)
Metron
-
-
Fisher, R.1
-
22
-
-
85031542311
-
Mixing E-mail with babel
-
GULCU, C, AND TSUDIK, G. Mixing E-mail with Babel. In NDSS (1996).
-
(1996)
NDSS
-
-
Gulcu, C.1
Tsudik, G.2
-
23
-
-
56749132464
-
Rethinking internet traffic management: From multiple decompositions to a practical protocol
-
HE, J., SUCHARA, M., BRESLER, M., REXFORD, J., AND CHIANG, M. Rethinking Internet traffic management: From multiple decompositions to a practical protocol. In CoNext (2007).
-
(2007)
CoNext
-
-
He, J.1
Suchara, M.2
Bresler, M.3
Rexford, J.4
Chiang, M.5
-
24
-
-
70349692738
-
HOW much anonymity does network latency leak?
-
HOPPER, N., VASSERMAN, E. Y., AND CHAN-TIN, E. HOW much anonymity does network latency leak? In CCS (2007).
-
(2007)
CCS
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
26
-
-
84906750191
-
A scalable watermark to detect correlated network flows
-
HOUMANSADR, A., AND BORISOV, N. SWIRL: A scalable watermark to detect correlated network flows. In NDSS (2011).
-
(2011)
NDSS
-
-
Houmansadr, A.1
Borisov2
Swirl, N.3
-
27
-
-
25844525571
-
A measurement study of internet bottlenecks
-
Hu, N., LI, L., MAO, Z., STEENKISTE, P., AND WANG, J. A measurement study of Internet bottlenecks. INFOCOM (2005).
-
(2005)
INFOCOM
-
-
Hu, N.1
Li, L.2
Mao, Z.3
Steenkiste, P.4
Wang, J.5
-
28
-
-
80755145229
-
-
I2P. I2P anonymous network. http://www.i2p2.de/index.html, 2003.
-
(2003)
I2P Anonymous Network
-
-
-
29
-
-
0004128169
-
-
JACOBSON, V. Pathchar. http: //www.caida.org/tools/utilities/others/ pathchar/.
-
Pathchar
-
-
Jacobson, V.1
-
30
-
-
1642380665
-
Limits of anonymity in open environments
-
KESDOGAN, D., AGRAWAL, D., AND PENZ, S. Limits of anonymity in open environments. In IH (2002).
-
(2002)
IH
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
32
-
-
77955329300
-
Measuring the tor network from public directory information
-
LOESING, K. Measuring the Tor network from public directory information. In HotPets (2009).
-
(2009)
HotPets
-
-
Loesing, K.1
-
33
-
-
74049120310
-
Don't clog the queue! Circuit clogging and mitigation in P2P anonymity schemes
-
MCLACHLAN, J., AND HOPPER, N. Don't clog the queue! Circuit clogging and mitigation in P2P anonymity schemes. In FC (2008).
-
(2008)
FC
-
-
Mclachlan, J.1
Hopper, N.2
-
34
-
-
80755187817
-
-
MITTAL, P., KHURSHID, A., JUEN, J., CAESAR, M., AND BORISOV, N. Stealthy traffic analysis of low-latency anonymous communication using throughput-fingerprinting, 2011. Available at http://netfiles.uiuc.edu/mittal2/ www/throughput-fingerprinting.pdf.
-
(2011)
Stealthy Traffic Analysis of Low-latency Anonymous Communication Using Throughput-fingerprinting
-
-
Mittal, P.1
Khurshid, A.2
Juen, J.3
Caesar, M.4
Borisov, N.5
-
35
-
-
78149315577
-
Securing mediated trace access using black-box permutation analysis
-
MITTAL, P., PAXSON, V., SOMMER, R., AND WINTERROWD, M. Securing mediated trace access using black-box permutation analysis. In HotNets (2009).
-
(2009)
HotNets
-
-
Mittal, P.1
Paxson, V.2
Sommer, R.3
Winterrowd, M.4
-
36
-
-
49049097183
-
Mixmaster protocol - Version 2
-
July
-
MOLLER, U., COTTRELL, L., PALFRADER, P., AND SASSAMAN, L. Mixmaster Protocol - Version 2. IETF Internet Draft, July 2003.
-
(2003)
IETF Internet Draft
-
-
Moller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
37
-
-
34547339276
-
Hot or not: Revealing hidden services by their clock skew
-
MURDOCH, S. J. Hot or not: Revealing hidden services by their clock skew. In CCS (2006).
-
(2006)
CCS
-
-
Murdoch, S.J.1
-
38
-
-
80755188449
-
Low-cost traffic analysis of tor
-
MURDOCH, S. J., AND DANEZIS, G. Low-cost traffic analysis of Tor. In IEEE S&P (2005).
-
(2005)
IEEE S&P
-
-
Murdoch, S.J.1
Danezis, G.2
-
39
-
-
50249160688
-
Sampled traffic analysis by internet-exchange-level adversaries
-
MURDOCH, S. J., AND ZIELINSKI, P. Sampled traffic analysis by Internet-exchange-level adversaries. In PETS (2007).
-
(2007)
PETS
-
-
Murdoch, S.J.1
Zielinski, P.2
-
41
-
-
0032178265
-
Modeling TCP throughput: A simple model and its empirical validation
-
PADHYE, J., FIROIU, V., TOWSLEY, D., AND KUROSE, J. Modeling tcp throughput: a simple model and its empirical validation. SIGCOMM Comput. Commun. Rev. 28 (October 1998), 303-314. (Pubitemid 128566467)
-
(1998)
Computer Communication Review
, vol.28
, Issue.4
, pp. 303-314
-
-
Padhye, J.1
Firoiu, V.2
Towsley, D.3
Kurose, J.4
-
42
-
-
77955330802
-
Torflow: Tor network analysis
-
PERRY, M. Torflow: Tor network analysis. In HotPets (2009).
-
(2009)
HotPets
-
-
Perry, M.1
-
43
-
-
0038311863
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
RAYMOND, J.-F. Traffic analysis: Protocols, attacks, design issues, and open problems. In Designing Privacy Enhancing Technologies (2000).
-
(2000)
Designing Privacy Enhancing Technologies
-
-
Raymond, J.-F.1
-
44
-
-
2642543760
-
Towards an information theoretic metric for anonymity
-
SERJANTOV, A., AND DANEZIS, G. Towards an information theoretic metric for anonymity. In PET (2002).
-
(2002)
PET
-
-
Serjantov, A.1
Danezis, G.2
-
45
-
-
80055013636
-
Eigenspeed: Secure peer-to-peer bandwidth evaluation
-
SNADER, R., AND BORISOV, N. Eigenspeed: Secure peer-to-peer bandwidth evaluation. In IPTPS (2009).
-
(2009)
IPTPS
-
-
Snader, R.1
Borisov, N.2
-
46
-
-
84937565289
-
Towards an analysis of onion routing security
-
SYVERSON, P., TSUDIK, G., REED, M., AND LANDWEHR, C. Towards an analysis of onion routing security. In Designing Privacy Enhancing Technologies (2000), pp. 96 - 114.
-
(2000)
Designing Privacy Enhancing Technologies
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
48
-
-
84870633783
-
-
THE TOR PROJECT. Tor metrics portal. http://metrics.torproject.org/.
-
Tor Metrics Portal
-
-
-
49
-
-
84994593259
-
-
Accessed Februrary 2011
-
THE TOR PROJECT. Who uses Tor. http://www.torproject.org/about/torusers. html.en. Accessed Februrary 2011.
-
Who Uses Tor
-
-
-
50
-
-
27944460736
-
An analysis of the degradation of anonymous protocols
-
WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. An analysis of the degradation of anonymous protocols. In NDSS (2002).
-
(2002)
NDSS
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
51
-
-
80755145224
-
Defending anonymous communication against passive logging attacks
-
WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. Defending anonymous communication against passive logging attacks. In IEEE S&P (2003).
-
(2003)
IEEE S&P
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|