-
1
-
-
84904428138
-
-
ANONYMOUS. AMA. April
-
ANONYMOUS. IAmA a malware coder and botnet operator, AMA. http://www.reddit.com/r/IAmA/comments/sq7cy/iama-a-malware-coder-and-botnet- operator-ama/, April 2012.
-
(2012)
IAmA a Malware Coder and Botnet Operator
-
-
-
2
-
-
79959681025
-
Low-resource routing attacks against Tor
-
P. Ning and T. Yu, Eds., ACM, .
-
BAUER, K. S., MCCOY, D., GRUNWALD, D., KOHNO, T., AND SICKER, D. C. Low-resource routing attacks against Tor. In WPES (2007), P. Ning and T. Yu, Eds., ACM, pp. 11-20.
-
(2007)
WPES
, pp. 11-20
-
-
Bauer, K.S.1
Mccoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.C.5
-
3
-
-
84865601908
-
TorScan: Tracing long-lived connections and differential scanning attacks
-
ESORICS 2012, S. Foresti, M. Yung, and F. Martinelli, Eds., Springer
-
BIRYUKOV, A., PUSTOGAROV, I., AND WEINMANN, R.-P. TorScan: Tracing long-lived connections and differential scanning attacks. In ESORICS 2012, S. Foresti, M. Yung, and F. Martinelli, Eds., vol. 7459 of LNCS. Springer, 2012, pp. 469-486.
-
(2012)
LNCS
, vol.7459
, pp. 469-486
-
-
Biryukov, A.1
Pustogarov, I.2
Weinmann, R.-P.3
-
5
-
-
84881262254
-
Traveling the silk road: A measurement analysis of a large anonymous online marketplace
-
abs/1207.7139
-
CHRISTIN, N. Traveling the silk road: A measurement analysis of a large anonymous online marketplace. CoRR abs/1207.7139 (2012).
-
(2012)
CoRR
-
-
Christin, N.1
-
6
-
-
0001383449
-
On quasi-stationary distributions in absorbing continuous-time finite Markov chains
-
DARROCH, J. N., AND SENETA, E. On quasi-stationary distributions in absorbing continuous-time finite Markov chains. Journal of Applied Probability 4, 1 (1967), pp. 192-196.
-
(1967)
Journal of Applied Probability
, vol.4
, Issue.1
, pp. 192-196
-
-
Darroch, J.N.1
Seneta, E.2
-
7
-
-
85084161366
-
Tor: The second-generation onion router
-
DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. F. Tor: The second-generation onion router. In USENIX Security Symposium (2004), USENIX, pp. 303-320.
-
USENIX Security Symposium (2004), USENIX
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
8
-
-
84947273682
-
The Sybil attack
-
IPTPS 2002 - Peer-to-Peer Systems, First International Worksho (2002), P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, Eds., Springer, .
-
DOUCEUR, J. R. The Sybil attack. In IPTPS 2002 - Peer-to-Peer Systems, First International Worksho (2002), P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, Eds., vol. 2429 of Lecture Notes in Computer Science, Springer, pp. 251-260.
-
Lecture Notes in Computer Science
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
9
-
-
84869175529
-
Changing of the guards: A framework for understanding and improving entry guard selection in Tor
-
ACM
-
ELAHI, T., BAUER, K., A L S ABAH, M., DINGLEDINE, R., AND GOLDBERG, I. Changing of the guards: A framework for understanding and improving entry guard selection in Tor. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012) (2012), ACM, pp. 43-54.
-
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2012) (2012)
, pp. 43-54
-
-
Elahi, T.1
Bauer, K.2
AlSabah, K.3
Dingledine, R.4
Goldberg, I.5
-
10
-
-
84856433583
-
Fingerprinting Tor's Hidden Service Log Files Using a Timing Channel
-
ELICES, J., PEREZ-GONZALEZ, F., AND TRONCOSO, C. Fingerprinting Tor's Hidden Service Log Files Using a Timing Channel. In WIFS 2011 - 3rd IEEE International Workshop on Information Forensics and Security (2011), IEEE.
-
WIFS 2011 - 3rd IEEE International Workshop on Information Forensics and Security (2011), IEEE
-
-
Elices, J.1
Perez-Gonzalez, F.2
Troncoso, C.3
-
11
-
-
84881239867
-
-
September
-
G DATA SECURITY. Botnet command server hidden in Tor. http://blog.gdatasoftware.com/blog/article/botnet-command-server-hidden-in-tor. html, September 2012.
-
(2012)
Botnet Command Server Hidden in Tor
-
-
-
16
-
-
0010346868
-
Sur le comportement asymptotique des probabilites dans les ensembles de etats dune chaine de Markov homogeene
-
Russian.
-
MANDL, P. Sur le comportement asymptotique des probabilites dans les ensembles de etats dune chaine de Markov homogeene (Russian). Casopis Pest. Mat. 84 (1959), pp. 140-149.
-
(1959)
Casopis Pest. Mat.
, vol.84
, pp. 140-149
-
-
Mandl, P.1
-
17
-
-
0038148416
-
Defending anonymous communications against passive logging attacks
-
MICAH, M. W., WRIGHT, M., ADLER, M., AND LEVINE, B. N. Defending anonymous communications against passive logging attacks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (2003), pp. 28-41.
-
Proceedings of the 2003 IEEE Symposium on Security and Privacy (2003)
, pp. 28-41
-
-
Micah, M.W.1
Wright, M.2
Adler, M.3
Levine, B.N.4
-
20
-
-
77049121293
-
Valet services: Improving hidden servers with a personal touch
-
PET 2006 - Privacy Enhancing Technologies G. Danezis and P. Golle, Eds., Springer, .
-
ØVERLIER, L., AND SYVERSON, P. F. Valet services: Improving hidden servers with a personal touch. In PET 2006 - Privacy Enhancing Technologies (2006), G. Danezis and P. Golle, Eds., vol. 4258 of Lecture Notes in Computer Science, Springer, pp. 223-244.
-
(2006)
Lecture Notes in Computer Science
, vol.4258
, pp. 223-244
-
-
Øverlier, L.1
Syverson, P.F.2
-
23
-
-
0003046508
-
Quasi-stationary behaviour in the random walk with continuous time
-
SENETA, E. Quasi-stationary behaviour in the random walk with continuous time. Australian Journal of Statistics 8, 2 (1966), 92-98.
-
(1966)
Australian Journal of Statistics
, vol.8
, Issue.2
, pp. 92-98
-
-
Seneta, E.1
-
24
-
-
77955395852
-
Leaving timing-channel fingerprints in hidden service log files
-
SHEBARO, B., PEREZ-GONZALEZ, F., AND CRANDALL, J. R. Leaving timing-channel fingerprints in hidden service log files. Digital Investigation 7 (2010), pp. 104-113.
-
(2010)
Digital Investigation
, vol.7
, pp. 104-113
-
-
Shebaro, B.1
Perez-Gonzalez, F.2
Crandall, J.R.3
-
25
-
-
84881243096
-
-
accessed on November 13th, 2012
-
THE TOR PROJECT. Tor Rendezvous Specification. https://gitweb.torproject. org/torspec.git?a=blob plain;hb=HEAD;f=rend-spec.txt, accessed on November 13th, 2012.
-
Tor Rendezvous Specification
-
-
-
26
-
-
65249165857
-
An improved clockskew measurement technique for revealing hidden services
-
ZANDER, S., AND MURDOCH, S. J. An improved clockskew measurement technique for revealing hidden services. In USENIX Security Symposium (2008), pp. 211-226.
-
USENIX Security Symposium (2008)
, pp. 211-226
-
-
Zander, S.1
Murdoch, S.J.2
|