메뉴 건너뛰기




Volumn , Issue , 2013, Pages 80-94

Trawling for tor hidden services: Detection, measurement, deanonymization

Author keywords

anonymity network; hidden services; privacy; Tor

Indexed keywords

ANONYMITY NETWORKS; COMMAND AND CONTROL; DEANONYMIZATION; DESIGN AND IMPLEMENTATIONS; HIDDEN SERVICES; INTERNET SERVICES; SILK ROADS; TOR;

EID: 84881248798     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2013.15     Document Type: Conference Paper
Times cited : (202)

References (26)
  • 1
    • 84904428138 scopus 로고    scopus 로고
    • ANONYMOUS. AMA. April
    • ANONYMOUS. IAmA a malware coder and botnet operator, AMA. http://www.reddit.com/r/IAmA/comments/sq7cy/iama-a-malware-coder-and-botnet- operator-ama/, April 2012.
    • (2012) IAmA a Malware Coder and Botnet Operator
  • 2
    • 79959681025 scopus 로고    scopus 로고
    • Low-resource routing attacks against Tor
    • P. Ning and T. Yu, Eds., ACM, .
    • BAUER, K. S., MCCOY, D., GRUNWALD, D., KOHNO, T., AND SICKER, D. C. Low-resource routing attacks against Tor. In WPES (2007), P. Ning and T. Yu, Eds., ACM, pp. 11-20.
    • (2007) WPES , pp. 11-20
    • Bauer, K.S.1    Mccoy, D.2    Grunwald, D.3    Kohno, T.4    Sicker, D.C.5
  • 3
    • 84865601908 scopus 로고    scopus 로고
    • TorScan: Tracing long-lived connections and differential scanning attacks
    • ESORICS 2012, S. Foresti, M. Yung, and F. Martinelli, Eds., Springer
    • BIRYUKOV, A., PUSTOGAROV, I., AND WEINMANN, R.-P. TorScan: Tracing long-lived connections and differential scanning attacks. In ESORICS 2012, S. Foresti, M. Yung, and F. Martinelli, Eds., vol. 7459 of LNCS. Springer, 2012, pp. 469-486.
    • (2012) LNCS , vol.7459 , pp. 469-486
    • Biryukov, A.1    Pustogarov, I.2    Weinmann, R.-P.3
  • 5
    • 84881262254 scopus 로고    scopus 로고
    • Traveling the silk road: A measurement analysis of a large anonymous online marketplace
    • abs/1207.7139
    • CHRISTIN, N. Traveling the silk road: A measurement analysis of a large anonymous online marketplace. CoRR abs/1207.7139 (2012).
    • (2012) CoRR
    • Christin, N.1
  • 6
    • 0001383449 scopus 로고
    • On quasi-stationary distributions in absorbing continuous-time finite Markov chains
    • DARROCH, J. N., AND SENETA, E. On quasi-stationary distributions in absorbing continuous-time finite Markov chains. Journal of Applied Probability 4, 1 (1967), pp. 192-196.
    • (1967) Journal of Applied Probability , vol.4 , Issue.1 , pp. 192-196
    • Darroch, J.N.1    Seneta, E.2
  • 8
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • IPTPS 2002 - Peer-to-Peer Systems, First International Worksho (2002), P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, Eds., Springer, .
    • DOUCEUR, J. R. The Sybil attack. In IPTPS 2002 - Peer-to-Peer Systems, First International Worksho (2002), P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, Eds., vol. 2429 of Lecture Notes in Computer Science, Springer, pp. 251-260.
    • Lecture Notes in Computer Science , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 11
    • 84881239867 scopus 로고    scopus 로고
    • September
    • G DATA SECURITY. Botnet command server hidden in Tor. http://blog.gdatasoftware.com/blog/article/botnet-command-server-hidden-in-tor. html, September 2012.
    • (2012) Botnet Command Server Hidden in Tor
  • 16
    • 0010346868 scopus 로고
    • Sur le comportement asymptotique des probabilites dans les ensembles de etats dune chaine de Markov homogeene
    • Russian.
    • MANDL, P. Sur le comportement asymptotique des probabilites dans les ensembles de etats dune chaine de Markov homogeene (Russian). Casopis Pest. Mat. 84 (1959), pp. 140-149.
    • (1959) Casopis Pest. Mat. , vol.84 , pp. 140-149
    • Mandl, P.1
  • 20
    • 77049121293 scopus 로고    scopus 로고
    • Valet services: Improving hidden servers with a personal touch
    • PET 2006 - Privacy Enhancing Technologies G. Danezis and P. Golle, Eds., Springer, .
    • ØVERLIER, L., AND SYVERSON, P. F. Valet services: Improving hidden servers with a personal touch. In PET 2006 - Privacy Enhancing Technologies (2006), G. Danezis and P. Golle, Eds., vol. 4258 of Lecture Notes in Computer Science, Springer, pp. 223-244.
    • (2006) Lecture Notes in Computer Science , vol.4258 , pp. 223-244
    • Øverlier, L.1    Syverson, P.F.2
  • 23
    • 0003046508 scopus 로고
    • Quasi-stationary behaviour in the random walk with continuous time
    • SENETA, E. Quasi-stationary behaviour in the random walk with continuous time. Australian Journal of Statistics 8, 2 (1966), 92-98.
    • (1966) Australian Journal of Statistics , vol.8 , Issue.2 , pp. 92-98
    • Seneta, E.1
  • 24
    • 77955395852 scopus 로고    scopus 로고
    • Leaving timing-channel fingerprints in hidden service log files
    • SHEBARO, B., PEREZ-GONZALEZ, F., AND CRANDALL, J. R. Leaving timing-channel fingerprints in hidden service log files. Digital Investigation 7 (2010), pp. 104-113.
    • (2010) Digital Investigation , vol.7 , pp. 104-113
    • Shebaro, B.1    Perez-Gonzalez, F.2    Crandall, J.R.3
  • 25
    • 84881243096 scopus 로고    scopus 로고
    • accessed on November 13th, 2012
    • THE TOR PROJECT. Tor Rendezvous Specification. https://gitweb.torproject. org/torspec.git?a=blob plain;hb=HEAD;f=rend-spec.txt, accessed on November 13th, 2012.
    • Tor Rendezvous Specification
  • 26
    • 65249165857 scopus 로고    scopus 로고
    • An improved clockskew measurement technique for revealing hidden services
    • ZANDER, S., AND MURDOCH, S. J. An improved clockskew measurement technique for revealing hidden services. In USENIX Security Symposium (2008), pp. 211-226.
    • USENIX Security Symposium (2008) , pp. 211-226
    • Zander, S.1    Murdoch, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.