-
1
-
-
38149139318
-
Browser-based attacks on tor
-
Berlin, Heidelberg, Springer-Verlag
-
ABBOTT, T. G., LAI, K. J., LIEBERMAN, M. R., AND PRICE, E. C. Browser-based Attacks on Tor. In Proceedings of the 7th International Conference on Privacy Enhancing Technologies (Berlin, Heidelberg, 2007), Springer-Verlag, pp. 184-199.
-
(2007)
Proceedings of the 7th International Conference on Privacy Enhancing Technologies
, pp. 184-199
-
-
Abbott, T.G.1
Lai, K.J.2
Lieberman, M.R.3
Price, E.C.4
-
4
-
-
79959681025
-
Low-resource routing attacks against tor
-
October
-
BAUER, K., MCCOY, D., GRUNWALD, D., KOHNO, T., AND SICKER, D. Low-Resource Routing Attacks against Tor. In Proceedings of the Workshop on Privacy in the Electronic Society (October 2007), pp. 11-20.
-
(2007)
Proceedings of the Workshop on Privacy in the Electronic Society
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
5
-
-
50249119735
-
Denial of service or denial of security?
-
New York, NY, USA, 2007), CCS '07, ACM
-
BORISOV, N., DANEZIS, G., MITTAL, P., AND TABRIZ, P. Denial of service or denial of security? In Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, 2007), CCS '07, ACM, pp. 92-102.
-
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
7
-
-
74049145915
-
Bridging and fingerprinting: Epistemic attacks on route selection
-
Leuven, Belgium, July, N. Borisov and I. Goldberg, Eds. Springer
-
DANEZIS, G., AND SYVERSON, P. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 133-150.
-
(2008)
Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)
, pp. 133-150
-
-
Danezis, G.1
Syverson, P.2
-
9
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX Association
-
DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. Tor: The second-generation onion router. In Proceedings of the 13th conference on USENIX Security Symposium-Volume 13 (2004), USENIX Association, pp. 303-320.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
10
-
-
74049136866
-
AS-awareness in tor path selection
-
Chicago, Illinois, USA, November 9-13, 2009, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM
-
EDMAN, M., AND SYVERSON, P. F. AS-awareness in tor path selection. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 (2009), E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds., ACM, pp. 380-389.
-
(2009)
Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009
, pp. 380-389
-
-
Edman, M.1
Syverson, P.F.2
-
11
-
-
50249161218
-
Metrics for security and performance in low-latency anonymity networks
-
Leuven, Belgium, July, N. Borisov and I. Goldberg, Eds. Springer
-
MURDOCH, S. J., AND WATSON, R. N. M. Metrics for security and performance in low-latency anonymity networks. In Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008) (Leuven, Belgium, July 2008), N. Borisov and I. Goldberg, Eds., Springer, pp. 115-132.
-
(2008)
Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)
, pp. 115-132
-
-
Murdoch, S.J.1
Watson, R.N.M.2
-
12
-
-
50249160688
-
Sampled traffic analysis by internet-exchange-level adversaries
-
Ottawa, Canada, June, N. Borisov and P. Golle, Eds. Springer
-
MURDOCH, S. J., AND ZIELIN ́ SKI, P. Sampled traffic analysis by internet-exchange-level adversaries. In Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007) (Ottawa, Canada, June 2007), N. Borisov and P. Golle, Eds., Springer.
-
(2007)
Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)
-
-
Murdoch, S.J.1
Zieliński, P.2
-
14
-
-
77955330802
-
Torflow: Tor network analysis
-
PERRY, M. Torflow: Tor network analysis. HotPETS, 2009.
-
(2009)
HotPETS
-
-
Perry, M.1
-
15
-
-
84870455958
-
-
Version 3. Accessed May
-
THE TOR PROJECT. Tor Directory Protocol, Version 3. https://gitweb. torproject.org/torspec.git?a=blob-plain;hb=HEAD;f=dir-spec.txt. Accessed May 2012.
-
(2012)
Tor Directory Protocol
-
-
-
16
-
-
84869385204
-
-
Accessed January
-
THE TOR PROJECT. Tor Metrics Portal: Data. https://metrics.torproject. org/data.html#performance. Accessed January 2012.
-
(2012)
Tor Metrics Portal: Data
-
-
-
17
-
-
0038148416
-
Defending anonymous communications against passive logging attacks
-
WRIGHT, M., ADLER, M., LEVINE, B., AND SHIELDS, C. Defending Anonymous Communications against Passive Logging Attacks. In Proceedings of the IEEE Symposium on Security and Privacy (2003), pp. 28-41.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 28-41
-
-
Wright, M.1
Adler, M.2
Levine, B.3
Shields, C.4
-
18
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
WRIGHT, M., ADLER, M., LEVINE, B., AND SHIELDS, C. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Transactions on Information and System Security (TISSEC) 7, 4 (2004), 489-522.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
, Issue.4
, pp. 489-522
-
-
Wright, M.1
Adler, M.2
Levine, B.3
Shields, C.4
|