-
1
-
-
85055291727
-
-
Retrieved 2012-01-31
-
Alexa top 1 million sites. http://s3.amazonaws.com/alexa-static/top-1m.csv.zip. Retrieved 2012-01-31.
-
Alexa Top 1 Million Sites
-
-
-
2
-
-
85080497342
-
-
CAIDA data. http://www.caida.org/data.
-
-
-
-
3
-
-
84858894791
-
-
DETER testbed. http://www.isi.edu/deter.
-
DETER Testbed
-
-
-
8
-
-
85080571830
-
-
https://github.com/shadow/.
-
-
-
-
10
-
-
85080541463
-
-
TorPerf. https://gitweb.torproject.org/torperf.git/.
-
TorPerf
-
-
-
11
-
-
85080627909
-
-
TorPS homepage. http://torps.github.io/.
-
-
-
-
14
-
-
84899931693
-
The path less travelled: Overcoming tor's bottlenecks with traffic splitting
-
ALSABAH, M., BAUER, K., ELAHI, T., and GOLDBERG, I. The path less travelled: Overcoming Tor's bottlenecks with traffic splitting. In Privacy Enhancing Technologies Symposium (PETS) (2013).
-
(2013)
Privacy Enhancing Technologies Symposium (PETS)
-
-
Alsabah, M.1
Bauer, K.2
Elahi, T.3
Goldberg, I.4
-
16
-
-
84910608702
-
DefenestraTor: Throwing out windows in tor
-
ALSABAH, M., BAUER, K., GOLDBERG, I., GRUNWALD, D., MCCOY, D., SAVAGE, S., and VOELKER, G. DefenestraTor: Throwing out windows in Tor. In Privacy Enhancing Technologies Symposium (PETS) (2011).
-
(2011)
Privacy Enhancing Technologies Symposium (PETS)
-
-
Alsabah, M.1
Bauer, K.2
Goldberg, I.3
Grunwald, D.4
Mccoy, D.5
Savage, S.6
Voelker, G.7
-
20
-
-
84892383749
-
Revisiting circuit clogging attacks on tor
-
CHAN-TIN, E., SHIN, J., and YU, J. Revisiting circuit clogging attacks on Tor. In IEEE Conference on Availability, Reliability and Security (ARES) (2013).
-
(2013)
IEEE Conference on Availability, Reliability and Security (ARES)
-
-
Chan-Tin, E.1
Shin, J.2
Yu, J.3
-
23
-
-
34948854809
-
Deploying low-latency anonymity: Design challenges and social factors
-
Sept./Oct.
-
DINGLEDINE, R., MATHEWSON, N., and SYVERSON, P. Deploying low-latency anonymity: Design challenges and social factors. IEEE Security & Privacy 5, 5 (Sept./Oct. 2007), 83-87.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.5
, pp. 83-87
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
24
-
-
78649999445
-
-
Tech. Rep. 2009-11-001, The Tor Project
-
DINGLEDINE, R., and MURDOCH, S. J. Performance improvements on Tor or, why Tor is slow and what we're going to do about it. Tech. Rep. 2009-11-001, The Tor Project, 2009.
-
(2009)
Performance Improvements on Tor Or, Why Tor Is Slow and What We're Going to do about It
-
-
Dingledine, R.1
Murdoch, S.J.2
-
28
-
-
70449606648
-
CUBIC: A new TCP-friendly high-speed TCP variant
-
HA, S., RHEE, I., and XU, L. CUBIC: a new TCP-friendly high-speed TCP variant. ACM SIGOPS Operating Systems Review 42, 5 (2008), 64-74.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.5
, pp. 64-74
-
-
Ha, S.1
Rhee, I.2
Xu, L.3
-
32
-
-
77949464624
-
How much anonymity does network latency leak?
-
Feb.
-
HOPPER, N., and VASSERMAN., E. Y., and CHAN-TIN, E. How much anonymity does network latency leak? ACM Transactions on Information and System Security (TISSEC) 13, 2 (Feb. 2010), 13-28.
-
(2010)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.2
, pp. 13-28
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
33
-
-
0022776461
-
Packet trains-measurements and a new model for computer network traffic
-
JAIN, R., and ROUTHIER, S. Packet trains-measurements and a new model for computer network traffic. IEEE Selected Areas in Communications 4, 6 (1986), 986-995.
-
(1986)
IEEE Selected Areas in Communications
, vol.4
, Issue.6
, pp. 986-995
-
-
Jain, R.1
Routhier, S.2
-
34
-
-
85084163714
-
Methodically modeling the tor network
-
JANSEN, R., BAUER, K., HOPPER, N., and DINGLEDINE, R. Methodically modeling the Tor network. In USENIX Workshop on Cyber Security Experimentation and Test (CSET) (2012).
-
(2012)
USENIX Workshop on Cyber Security Experimentation and Test (CSET)
-
-
Jansen, R.1
Bauer, K.2
Hopper, N.3
Dingledine, R.4
-
35
-
-
85080534038
-
Appendices to accompany "Never been KIST: Tor's congestion management blossoms with kernel-informed socket transport"
-
Univ. of Minnesota
-
JANSEN, R., GEDDES, J., WACEK, C., SHERR, M., and SYVERSON, P. Appendices to accompany "Never been KIST: Tor's congestion management blossoms with kernel-informed socket transport". Tech. Rep. 14-012, Univ. of Minnesota, 2014. http://www.cs.umn.edu/tech_reports_upload/tr2014/14-012.pdf.
-
(2014)
Tech. Rep. 14-012
-
-
Jansen, R.1
Geddes, J.2
Wacek, C.3
Sherr, M.4
Syverson, P.5
-
36
-
-
84916618341
-
Shadow: Running tor in a box for accurate and efficient experimentation
-
JANSEN, R., and HOPPER, N. Shadow: Running Tor in a box for accurate and efficient experimentation. In USENIX Security Symposium (USENIX) (2012).
-
(2012)
USENIX Security Symposium (USENIX)
-
-
Jansen, R.1
Hopper, N.2
-
40
-
-
84889028646
-
Users get routed: Traffic correlation on tor by realistic adversaries
-
JOHNSON, A., WACEK, C., JANSEN, R., SHERR, M., and SYVERSON, P. Users get routed: Traffic correlation on tor by realistic adversaries. In ACM Conference on Computer and Communications Security (CCS) (2013).
-
(2013)
ACM Conference on Computer and Communications Security (CCS)
-
-
Johnson, A.1
Wacek, C.2
Jansen, R.3
Sherr, M.4
Syverson, P.5
-
41
-
-
84855711802
-
-
Sept. Listserv posting
-
MATHEWSON, N. Evaluating SCTP for Tor. http://archives.seul.org/or/dev/Sep-2004/msg00002.html, Sept. 2004. Listserv posting.
-
(2004)
Evaluating SCTP for Tor
-
-
Mathewson, N.1
-
42
-
-
0030259607
-
Forward acknowledgement: Refining TCP congestion control
-
MATHIS, M., and MAHDAVI, J. Forward acknowledgement: Refining TCP congestion control. ACM SIGCOMM Computer Communication Review 26, 4 (1996), 281-291.
-
(1996)
ACM SIGCOMM Computer Communication Review
, vol.26
, Issue.4
, pp. 281-291
-
-
Mathis, M.1
Mahdavi, J.2
-
43
-
-
0003424562
-
TCP selective acknowledgment options
-
(Proposed Standard), Oct.
-
MATHIS, M., MAHDAVI, J., FLOYD, S., and ROMANOW, A. TCP Selective Acknowledgment Options. RFC 2018 (Proposed Standard), Oct. 1996.
-
(1996)
RFC 2018
-
-
Mathis, M.1
Mahdavi, J.2
Floyd, S.3
Romanow, A.4
-
44
-
-
70350228716
-
Shining light in dark places: Understanding the tor network
-
MCCOY, D., BAUER, K., GRUNWALD, D., KOHNO, T., and SICKER, D. Shining light in dark places: Understanding the Tor network. In Privacy Enhancing Technologies Symposium (PETS) (2008).
-
(2008)
Privacy Enhancing Technologies Symposium (PETS)
-
-
Mccoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
45
-
-
80755187817
-
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
-
MITTAL, P., KHURSHID, A., JUEN, J., CAESAR, M., and BORISOV, N. Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. In ACM Conference on Computer and Communications Security (CCS) (2011).
-
(2011)
ACM Conference on Computer and Communications Security (CCS)
-
-
Mittal, P.1
Khurshid, A.2
Juen, J.3
Caesar, M.4
Borisov, N.5
-
46
-
-
84855656395
-
Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise
-
MOORE, W. B., WACEK, C., and SHERR, M. Exploring the potential benefits of expanded rate limiting in Tor: Slow and steady wins the race with Tortoise. In Annual Computer Security Applications Conference (ACSAC) (2011).
-
(2011)
Annual Computer Security Applications Conference (ACSAC)
-
-
Moore, W.B.1
Wacek, C.2
Sherr, M.3
-
50
-
-
84870558739
-
Fitting square pegs through round pipes
-
NOWLAN, M. F., TIWARI, N., IYENGAR, J., AMIN, S. O., and FORD, B. Fitting square pegs through round pipes. In USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2012).
-
(2012)
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Nowlan, M.F.1
Tiwari, N.2
Iyengar, J.3
Amin, S.O.4
Ford, B.5
-
53
-
-
0003973018
-
Computing TCP's retransmission timer
-
(Proposed Standard), June
-
PAXSON, V., ALLMAN, M., CHU, J., and SARGENT, M. Computing TCP's Retransmission Timer. RFC 6298 (Proposed Standard), June 2011.
-
(2011)
RFC 6298
-
-
Paxson, V.1
Allman, M.2
Chu, J.3
Sargent, M.4
-
56
-
-
85180538667
-
A3: An extensible platform for application-aware anonymity
-
SHERR, M., MAO, A., MARCZAK, W. R., ZHOU, W., and LOO., B. T., and BLAZE, M. A3: An Extensible Platform for Application-Aware Anonymity. In Network and Distributed System Security Symposium (NDSS) (2010).
-
(2010)
Network and Distributed System Security Symposium (NDSS)
-
-
Sherr, M.1
Mao, A.2
Marczak, W.R.3
Zhou, W.4
Loo, B.T.5
Blaze, M.6
-
59
-
-
84874162920
-
-
Tor network status. http://torstatus.blutmagie.de/index.php.
-
Tor Network Status
-
-
-
60
-
-
84920879462
-
An empirical evaluation of relay selection in tor
-
WACEK, C., TAN, H., BAUER, K., and SHERR, M. An empirical evaluation of relay selection in Tor. In Network and Distributed System Security Symposium (NDSS) (2013).
-
(2013)
Network and Distributed System Security Symposium (NDSS)
-
-
Wacek, C.1
Tan, H.2
Bauer, K.3
Sherr, M.4
-
61
-
-
84910660558
-
Congestion-aware path selection for tor
-
WANG, T., BAUER, K., FORERO, C., and GOLDBERG, I. Congestion-aware path selection for Tor. In Financial Cryptography and Data Security (FC) (2012).
-
(2012)
Financial Cryptography and Data Security (FC)
-
-
Wang, T.1
Bauer, K.2
Forero, C.3
Goldberg, I.4
|