메뉴 건너뛰기




Volumn 8555 LNCS, Issue , 2014, Pages 304-331

Spoiled onions: Exposing malicious Tor exit relays

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 84903973934     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-08506-7_16     Document Type: Conference Paper
Times cited : (35)

References (37)
  • 2
    • 33745965912 scopus 로고    scopus 로고
    • Curve25519: New Diffie-Hellman speed records
    • Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
    • Bernstein, D.J.: Curve25519: New Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207-228. Springer, Heidelberg (2006), http://cr.yp.to/ecdh/curve25519-20060209. pdf
    • (2006) LNCS , vol.3958 , pp. 207-228
    • Bernstein, D.J.1
  • 3
    • 85084096178 scopus 로고    scopus 로고
    • One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
    • Le Blond, S., et al.: One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In: LEET. USENIX (2011), https://www.usenix.org/legacy/events/leet11/tech/ full-papers/LeBlond.pdf
    • (2011) LEET
    • Le Blond, S.1
  • 4
    • 85084096676 scopus 로고    scopus 로고
    • Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
    • Le Blond, S., et al.: Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. In: LEET. USENIX (2010), https://www.usenix.org/legacy/event/leet10/tech/ full-papers/LeBlond.pdf
    • (2010) LEET
    • Le Blond, S.1
  • 5
    • 84857297875 scopus 로고    scopus 로고
    • Detecting Traffic Snooping in Tor Using Decoys
    • Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. Springer, Heidelberg
    • Chakravarty, S., Portokalidis, G., Polychronakis, M., Keromytis, A.D.: Detecting Traffic Snooping in Tor Using Decoys. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 222-241. Springer, Heidelberg (2011), http://www.cs.columbia.edu/~mikepo/papers/ tordecoys.raid11.pdf
    • (2011) LNCS , vol.6961 , pp. 222-241
    • Chakravarty, S.1    Portokalidis, G.2    Polychronakis, M.3    Keromytis, A.D.4
  • 6
    • 84904007386 scopus 로고    scopus 로고
    • Crossbear, http://www.crossbear.org
  • 8
    • 38149068722 scopus 로고    scopus 로고
    • Anonymity Loves Company: Usability and the Network Effect
    • Dingledine, R., Mathewson, N.: Anonymity Loves Company: Usability and the Network Effect. In: WEIS (2006), http://freehaven.net/doc/wupss04/usability.pdf
    • (2006) WEIS
    • Dingledine, R.1    Mathewson, N.2
  • 10
    • 85084161366 scopus 로고    scopus 로고
    • Tor: The Second-Generation Onion Router
    • Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: USENIX Security. USENIX (2004), http://static.usenix.org/ event/sec04/tech/full-papers/ dingledine/dingledine.pdf
    • (2004) USENIX Security
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.3
  • 11
    • 84903991836 scopus 로고    scopus 로고
    • Electronic Frontier Foundation. HTTPS Everywhere (2013), https://www.eff.org/https-everywhere
    • (2013) HTTPS Everywhere
  • 12
    • 72849147698 scopus 로고    scopus 로고
    • On the Security of the Tor Authentication Protocol
    • Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
    • Goldberg, I.: On the Security of the Tor Authentication Protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 316-331. Springer, Heidelberg (2006), http://freehaven.net/anonbib/cache/tap:pet2006.pdf
    • (2006) LNCS , vol.4258 , pp. 316-331
    • Goldberg, I.1
  • 16
    • 77954649872 scopus 로고    scopus 로고
    • Tor HTTP Usage and Information Leakage
    • De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. Springer, Heidelberg
    • Huber, M., Mulazzani, M.,Weippl, E.: Tor HTTP Usage and Information Leakage. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 245-255. Springer, Heidelberg (2010), http://freehaven.net/ anonbib/cache/huber2010tor.pdf
    • (2010) LNCS , vol.6109 , pp. 245-255
    • Huber, M.1    Mulazzani, M.2    Weippl, E.3
  • 17
    • 84904007391 scopus 로고    scopus 로고
    • InformAction. NoScript (2013), http://noscript.net
    • (2013) InformAction
  • 18
    • 84904007377 scopus 로고    scopus 로고
    • Known Bad Relays, https://trac.torproject.org/projects/tor/wiki/doc/ badRelays
    • Known Bad Relays
  • 19
    • 84904007379 scopus 로고    scopus 로고
    • Thoughtcrime Labs. Convergence (2011), http://convergence.io
    • (2011) Thoughtcrime Labs
  • 24
    • 50249133191 scopus 로고    scopus 로고
    • Shining Light in Dark Places: Understanding the Tor Network
    • Borisov, N., Goldberg, I. (eds.) PETS 2008. Springer, Heidelberg
    • McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63-76. Springer, Heidelberg (2008), http://homes.cs.washington.edu/~yoshi/papers/ Tor/PETS2008-37.pdf
    • (2008) LNCS , vol.5134 , pp. 63-76
    • McCoy, D.1    Bauer, K.2    Grunwald, D.3    Kohno, T.4    Sicker, D.C.5
  • 27
    • 84904022122 scopus 로고    scopus 로고
    • SkullSecurity. Passwords (2011), https://wiki.skullsecurity.org/Passwords
    • (2011) Passwords
  • 29
    • 84903946903 scopus 로고    scopus 로고
    • The Tor Project. ExoneraTor, https://exonerator.torproject.org
    • ExoneraTor
  • 31
    • 84904007282 scopus 로고    scopus 로고
    • The Tor Project. Snakes on a Tor, https://gitweb.torproject.org/ torflow.git/tree/HEAD:/NetworkScanners/ExitAuthority
    • Snakes on a Tor
  • 32
    • 84904007283 scopus 로고    scopus 로고
    • The Tor Project. Stem Docs, https://stem.torproject.org
    • Stem Docs
  • 35
    • 84904007285 scopus 로고    scopus 로고
    • Torscanner, https://code.google.com/p/torscanner/
    • Torscanner
  • 37
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: Improving SSHstyle Host Authentication with Multi-Path Probing
    • Wendlandt, D., Andersen, D.G., Perrig, A.: Perspectives: Improving SSHstyle Host Authentication with Multi-Path Probing. In: ATC. USENIX (2008), http://perspectivessecurity.files.wordpress.com/ 2011/07/perspectives-usenix08. pdf
    • (2008) ATC
    • Wendlandt, D.1    Andersen, D.G.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.