-
1
-
-
84950284306
-
-
BGP hijacking for cryptocurrency profit. http://www.secureworks.com/ cyber-threat-intelligence/threats/ bgp-hijacking-for-cryptocurrency-profit/.
-
BGP Hijacking for Cryptocurrency Profit
-
-
-
5
-
-
85076281648
-
-
RIPE Atlas. https://atlas.ripe.net/.
-
RIPE Atlas
-
-
-
6
-
-
84871972422
-
-
RIPE RIS Raw Data. https://www.ripe.net/data-tools/stats/ris/ris-raw-data.
-
RIPE RIS Raw Data
-
-
-
7
-
-
85076301147
-
-
Routeviews. http://www.routeviews.org/.
-
-
-
-
8
-
-
84870633783
-
-
Accessed, February 2015
-
Tor metrics portal. https://metrics.torproject.org. Accessed, February 2015.
-
Tor Metrics Portal
-
-
-
9
-
-
77954750419
-
-
Accessed, February 2015
-
Who uses Tor? https://www.torproject.org/about/torusers.html.en. Accessed, February 2015.
-
Who Uses Tor?
-
-
-
12
-
-
84896481372
-
-
Oct
-
Tor stinks. http://www.theguardian.com/world/interactive/2013/oct/04/ tor-stinks-nsa-presentation-document, Oct. 2013.
-
(2013)
Tor Stinks
-
-
-
13
-
-
84878356050
-
Lastor: A low-latency AS-aware Tor client
-
Washington, DC, USA, SP’12, IEEE Computer Society
-
AKHOONDI, M., YU, C., AND MADHYASTHA, H. V. Lastor: A low-latency AS-aware Tor client. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2012), SP’12, IEEE Computer Society, pp. 476–490.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy
, pp. 476-490
-
-
Akhoondi, M.1
Yu, C.2
Madhyastha, H.V.3
-
14
-
-
84914686357
-
Loopholes for circumventing the constitution: Warrantless bulk surveillance on americans by collecting network traffic abroad
-
ARNBAK, A., AND GOLDBERG, S. Loopholes for circumventing the constitution: Warrantless bulk surveillance on americans by collecting network traffic abroad. In HotPETs (2014). Available at http://ssrn.com/abstract=2460462.
-
(2014)
HotPETs
-
-
Arnbak, A.1
Goldberg, S.2
-
16
-
-
36949014918
-
A study of prefix hijacking and interception in the Internet
-
New York, NY, USA, SIGCOMM’07, ACM
-
BALLANI, H., FRANCIS, P., AND ZHANG, X. A study of prefix hijacking and interception in the Internet. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, andProtocols for Computer Communications (New York, NY, USA, 2007), SIGCOMM’07, ACM, pp. 265–276.
-
(2007)
Proceedings of the 2007 Conference on Applications, Technologies, Architectures, andProtocols for Computer Communications
, pp. 265-276
-
-
Ballani, H.1
Francis, P.2
Zhang, X.3
-
17
-
-
84869398114
-
Provable security of S-BGP and other path vector protocols: Model, analysis and extensions
-
New York, NY, USA, CCS’12, ACM
-
BOLDYREVA, A., AND LYCHEV, R. Provable security of S-BGP and other path vector protocols: Model, analysis and extensions. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (New York, NY, USA, 2012), CCS’12, ACM, pp. 541–552.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 541-552
-
-
Boldyreva, A.1
Lychev, R.2
-
19
-
-
33750380201
-
Modeling adoptability of secure BGP protocol
-
New York, NY, USA, SIGCOMM’06, ACM
-
CHAN, H., DASH, D., PERRIG, A., AND ZHANG, H. Modeling adoptability of secure BGP protocol. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, andProtocols for Computer Communications (New York, NY, USA, 2006), SIGCOMM’06, ACM, pp. 279–290.
-
(2006)
Proceedings of the 2006 Conference on Applications, Technologies, Architectures, andProtocols for Computer Communications
, pp. 279-290
-
-
Chan, H.1
Dash, D.2
Perrig, A.3
Zhang, H.4
-
20
-
-
85076312211
-
Longitudinal study of BGP monitor session failures
-
April
-
CHUN CHENG, P., ZHAO, X., ZHANG, B., AND ZHANG, L. Longitudinal Study of BGP Monitor Session Failures. ACM SIGCOMM Computer Communication Review (CCR) (April 2010).
-
(2010)
ACM SIGCOMM Computer Communication Review (CCR)
-
-
Chun Cheng, P.1
Zhao, X.2
Zhang, B.3
Zhang, L.4
-
21
-
-
33744479345
-
FreeNet: A distributed anonymous information storage and retrieval system
-
New York, NY, USA, Springer-Verlag New York, Inc.
-
CLARKE, I., SANDBERG, O., WILEY, B., AND HONG, T. W. Freenet: A distributed anonymous information storage and retrieval system. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability (New York, NY, USA, 2001), Springer-Verlag New York, Inc., pp. 46–66.
-
(2001)
International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
22
-
-
35248866624
-
Mix-networks with restricted routes
-
R. Dingledine, Ed.,. of Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
DANEZIS, G. Mix-networks with restricted routes. In Privacy Enhancing Technologies, R. Dingledine, Ed., vol. 2760 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003, pp. 1–17.
-
(2003)
Privacy Enhancing Technologies
, vol.2760
, pp. 1-17
-
-
Danezis, G.1
-
23
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
Washington, DC, USA, SP’03, IEEE Computer Society,. –
-
DANEZIS, G., DINGLEDINE, R., AND MATHEWSON, N. Mixminion: Design of a type iii anonymous remailer protocol. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2003), SP’03, IEEE Computer Society, pp. 2–.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 2
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
24
-
-
84941579649
-
One fast guard for life (or 9 months)
-
DINGLEDINE, R., HOPPER, N., KADIANAKIS, G., AND MATHEWSON, N. One fast guard for life (or 9 months). In HotPETs (2014).
-
(2014)
HotPETs
-
-
Dingledine, R.1
Hopper, N.2
Kadianakis, G.3
Mathewson, N.4
-
25
-
-
85084161366
-
ToR: The second-generation onion router
-
Berkeley, CA, USA, SSYM’04, USENIX Association
-
DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (Berkeley, CA, USA, 2004), SSYM’04, USENIX Association.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium - Volume
, vol.13
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
26
-
-
74049136866
-
AS-awareness in Tor path selection
-
New York, NY, USA, CCS ’09, ACM
-
EDMAN, M., AND SYVERSON, P. AS-awareness in Tor path selection. In Proceedings of the 16th ACM Conference on Computer and Communications Security (New York, NY, USA, 2009), CCS ’09, ACM, pp. 380–389.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 380-389
-
-
Edman, M.1
Syverson, P.2
-
27
-
-
85076290610
-
A practical congestion attack on Tor using long paths
-
Berkeley, CA, USA, SSYM’09, USENIX Association
-
EVANS, N. S., DINGLEDINE, R., AND GROTHOFF, C. A practical congestion attack on Tor using long paths. In Proceedings of the 18th Conference on USENIX Security Symposium (Berkeley, CA, USA, 2009), SSYM’09, USENIX Association, pp. 33–50.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium
, pp. 33-50
-
-
Evans, N.S.1
Dingledine, R.2
Grothoff, C.3
-
28
-
-
20444439634
-
Location diversity in anonymity networks
-
New York, NY, USA, WPES ’04, ACM
-
FEAMSTER, N., AND DINGLEDINE, R. Location diversity in anonymity networks. In Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (New York, NY, USA, 2004), WPES ’04, ACM, pp. 66–76.
-
(2004)
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
, pp. 66-76
-
-
Feamster, N.1
Dingledine, R.2
-
29
-
-
80053146502
-
Let the market drive deployment: A strategy for transitioning to BGP security
-
New York, NY, USA, SIGCOMM’11, ACM
-
GILL, P., SCHAPIRA, M., AND GOLDBERG, S. Let the market drive deployment: A strategy for transitioning to BGP security. In Proceedings of the ACM SIGCOMM 2011 Conference (New York, NY, USA, 2011), SIGCOMM’11, ACM, pp. 14–25.
-
(2011)
Proceedings of the ACM SIGCOMM 2011 Conference
, pp. 14-25
-
-
Gill, P.1
Schapira, M.2
Goldberg, S.3
-
30
-
-
70349692738
-
How much anonymity does network latency leak?
-
New York, NY, USA, CCS’07, ACM
-
HOPPER, N., VASSERMAN, E. Y., AND CHAN-TIN, E. How much anonymity does network latency leak? In Proceedings of the 14th ACM Conference on Computer and Communications Security (New York, NY, USA, 2007), CCS’07, ACM, pp. 82–91.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 82-91
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
31
-
-
77949464624
-
How much anonymity does network latency leak?
-
Mar
-
HOPPER, N., VASSERMAN, E. Y., AND CHAN-TIN, E. How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur. 13, 2 (Mar. 2010), 13:1–13:28.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.2
, pp. 1301-1328
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
32
-
-
21844463097
-
SPV: Secure path vector routing for securing BGP
-
New York, NY, USA, SIGCOMM’04, ACM
-
HU, Y.-C., PERRIG, A., AND SIRBU, M. Spv: Secure path vector routing for securing BGP. In Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (New York, NY, USA, 2004), SIGCOMM’04, ACM, pp. 179–192.
-
(2004)
Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 179-192
-
-
Hu, Y.-C.1
Perrig, A.2
Sirbu, M.3
-
33
-
-
84940476471
-
The sniper attack: Anonymously deanonymizing and disabling the Tor network
-
Internet Society
-
JANSEN, R., TSCHORSCH, F., JOHNSON, A., AND SCHEUERMANN, B. The sniper attack: Anonymously deanonymizing and disabling the Tor network. In Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS’14) (2014), Internet Society.
-
(2014)
Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS’14)
-
-
Jansen, R.1
Tschorsch, F.2
Johnson, A.3
Scheuermann, B.4
-
34
-
-
84889028646
-
Users get routed: Traffic correlation on Tor by realistic adversaries
-
New York, NY, USA, CCS’13, ACM
-
JOHNSON, A., WACEK, C., JANSEN, R., SHERR, M., AND SYVERSON, P. Users get routed: Traffic correlation on Tor by realistic adversaries. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2013), CCS’13, ACM, pp. 337–348.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security
, pp. 337-348
-
-
Johnson, A.1
Wacek, C.2
Jansen, R.3
Sherr, M.4
Syverson, P.5
-
36
-
-
84896449644
-
-
June
-
MACASKILL, E., BORGER, J., HOPKINS, N., DAVIES, N., AND BALL, J. GCHQ taps fibre-optic cables for secret access to world’s communications. http://www.theguardian.com/uk/2013/jun/21/ gchq-cables-secret-world-communications-nsa, June 2013.
-
(2013)
GCHQ Taps Fibre-Optic Cables for Secret Access to World’S Communications
-
-
Macaskill, E.1
Borger, J.2
Hopkins, N.3
Davies, N.4
Ball, J.5
-
37
-
-
80755187817
-
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
-
New York, NY, USA, CCS ’11, ACM
-
MITTAL, P., KHURSHID, A., JUEN, J., CAESAR, M., AND BORISOV, N. Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. In Proceedings of the 18th ACM Conference on Computer and Communications Security (New York, NY, USA, 2011), CCS ’11, ACM, pp. 215–226.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 215-226
-
-
Mittal, P.1
Khurshid, A.2
Juen, J.3
Caesar, M.4
Borisov, N.5
-
38
-
-
20444447364
-
-
IETF Internet Draft, July
-
MÖLLER, U., COTTRELL, L., PALFRADER, P., AND SASSAMAN, L. Mixmaster Protocol — Version 2. IETF Internet Draft, July 2003.
-
(2003)
Mixmaster Protocol — Version 2
-
-
Möller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
39
-
-
27544454707
-
Low-cost traffic analysis of Tor
-
Washington, DC, USA, SP’05, IEEE Computer Society
-
MURDOCH, S. J., AND DANEZIS, G. Low-cost traffic analysis of Tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2005), SP’05, IEEE Computer Society, pp. 183–195.
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
40
-
-
38149130456
-
Sampled traffic analysis by Internet-exchange-level adversaries
-
Berlin, Heidelberg, PET’07, Springer-Verlag
-
MURDOCH, S. J., AND ZIELINSKI, P. Sampled traffic analysis by Internet-exchange-level adversaries. In Proceedings of the 7th International Conference on Privacy Enhancing Technologies (Berlin, Heidelberg, 2007), PET’07, Springer-Verlag, pp. 167–183.
-
(2007)
Proceedings of the 7th International Conference on Privacy Enhancing Technologies
, pp. 167-183
-
-
Murdoch, S.J.1
Zielinski, P.2
-
41
-
-
34547504417
-
On interdomain routing security and pretty secure BGP (psBGP)
-
July
-
OORSCHOT, P. V., WAN, T., AND KRANAKIS, E. On interdomain routing security and pretty secure BGP (psBGP). ACM Trans. Inf. Syst. Secur. 10, 3 (July 2007).
-
(2007)
ACM Trans. Inf. Syst. Secur.
, vol.10
, pp. 3
-
-
Oorschot, P.V.1
Wan, T.2
Kranakis, E.3
-
43
-
-
84914694853
-
PeErING: An As for Us
-
New York, NY, USA, HotNets-XIII, ACM
-
SCHLINKER, B., ZARIFIS, K., CUNHA, I., FEAMSTER, N., AND KATZ-BASSETT, E. PEERING: An AS for us. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks (New York, NY, USA, 2014), HotNets-XIII, ACM, pp. 18:1–18:7.
-
(2014)
Proceedings of the 13th ACM Workshop on Hot Topics in Networks
, pp. 181-187
-
-
Schlinker, B.1
Zarifis, K.2
Cunha, I.3
Feamster, N.4
Katz-Bassett, E.5
-
44
-
-
84870868863
-
Detecting prefix hijackings in the Internet with Argus
-
New York, NY, USA, IMC’12, ACM
-
SHI, X., XIANG, Y., WANG, Z., YIN, X., AND WU, J. Detecting prefix hijackings in the Internet with Argus. In Proceedings of the 2012 ACM Conference on Internet Measurement Conference (New York, NY, USA, 2012), IMC’12, ACM, pp. 15–28.
-
(2012)
Proceedings of the 2012 ACM Conference on Internet Measurement Conference
, pp. 15-28
-
-
Shi, X.1
Xiang, Y.2
Wang, Z.3
Yin, X.4
Wu, J.5
-
45
-
-
33750276494
-
Timing analysis in low-latency mix networks: Attacks and defenses
-
Berlin, Heidelberg, ESORICS’06, Springer-Verlag
-
SHMATIKOV, V., AND WANG, M.-H. Timing analysis in low-latency mix networks: Attacks and defenses. In Proceedings of the 11th European Conference on Research in Computer Security (Berlin, Heidelberg, 2006), ESORICS’06, Springer-Verlag, pp. 18–33.
-
(2006)
Proceedings of the 11th European Conference on Research in Computer Security
, pp. 18-33
-
-
Shmatikov, V.1
Wang, M.-H.2
-
46
-
-
84937565289
-
Towards an analysis of onion routing security
-
New York, NY, USA, Springer-Verlag New York, Inc.
-
SYVERSON, P., TSUDIK, G., REED, M., AND LANDWEHR, C. Towards an analysis of onion routing security. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability (New York, NY, USA, 2001), Springer-Verlag New York, Inc., pp. 96–114.
-
(2001)
International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
47
-
-
84871531288
-
A bird’s eye view on the I2P anonymous file-sharing environment
-
Berlin, Heidelberg, NSS’12, Springer-Verlag
-
TIMPANARO, J. P., CHRISMENT, I., AND FES-TOR, O. A bird’s eye view on the I2P anonymous file-sharing environment. In Proceedings of the 6th International Conference on Network and System Security (Berlin, Heidelberg, 2012), NSS’12, Springer-Verlag, pp. 135–148.
-
(2012)
Proceedings of the 6th International Conference on Network and System Security
, pp. 135-148
-
-
Timpanaro, J.P.1
Chrisment, I.2
Fes-Tor, O.3
-
48
-
-
84914674845
-
Anonymity on quicksand: Using BGP to compromise Tor
-
New York, NY, USA, HotNets-XIII, ACM
-
VANBEVER, L., LI, O., REXFORD, J., AND MITTAL, P. Anonymity on quicksand: Using BGP to compromise Tor. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks (New York, NY, USA, 2014), HotNets-XIII, ACM, pp. 14:1–14:7.
-
(2014)
Proceedings of the 13th ACM Workshop on Hot Topics in Networks
, pp. 141-147
-
-
Vanbever, L.1
Li, O.2
Rexford, J.3
Mittal, P.4
-
49
-
-
84954435745
-
Defending anonymous communications against passive logging attacks
-
Washington, DC, USA, SP’03, IEEE Computer Society
-
WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. Defending anonymous communications against passive logging attacks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2003), SP’03, IEEE Computer Society.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
50
-
-
85076300686
-
Open source column: Tribler: P2P search, share and stream
-
Mar
-
ZEILEMAKER, N., AND POUWELSE, J. Open source column: Tribler: P2P search, share and stream. SIGMultimedia Rec. 4, 1 (Mar. 2012), 20–24.
-
(2012)
SIGMultimedia Rec
, vol.4
, Issue.1
, pp. 20-24
-
-
Zeilemaker, N.1
Pouwelse, J.2
-
51
-
-
56749151567
-
Practical defenses against BGP prefix hijacking
-
New York, NY, USA, CoNEXT ’07, ACM
-
ZHANG, Z., ZHANG, Y., HU, Y. C., AND MAO, Z. M. Practical defenses against BGP prefix hijacking. In Proceedings of the 2007 ACM CoNEXT Conference (New York, NY, USA, 2007), CoNEXT ’07, ACM.
-
(2007)
Proceedings of the 2007 ACM CoNEXT Conference
-
-
Zhang, Z.1
Zhang, Y.2
Hu, Y.C.3
Mao, Z.M.4
-
52
-
-
84877928848
-
ISPY: Detecting IP prefix hijacking on my own
-
Dec
-
ZHANG, Z., ZHANG, Y., HU, Y. C., MAO, Z. M., AND BUSH, R. iSPY: Detecting IP prefix hijacking on my own. IEEE/ACM Trans. Netw. 18, 6 (Dec. 2010), 1815–1828.
-
(2010)
IEEE/ACM Trans. Netw.
, vol.18
, Issue.6
, pp. 1815-1828
-
-
Zhang, Z.1
Zhang, Y.2
Hu, Y.C.3
Mao, Z.M.4
Bush, R.5
-
53
-
-
36949036650
-
A light-weight distributed scheme for detecting IP prefix hijacks in real-time
-
New York, NY, USA, SIGCOMM’07, ACM
-
ZHENG, C., JI, L., PEI, D., WANG, J., AND FRANCIS, P. A light-weight distributed scheme for detecting IP prefix hijacks in real-time. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (New York, NY, USA, 2007), SIGCOMM’07, ACM, pp. 277–288.
-
(2007)
Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 277-288
-
-
Zheng, C.1
Ji, L.2
Pei, D.3
Wang, J.4
Francis, P.5
-
54
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
Berlin, Heidelberg, PET’04, Springer-Verlag
-
ZHU, Y., FU, X., GRAHAM, B., BETTATI, R., AND ZHAO, W. On flow correlation attacks and countermeasures in mix networks. In Proceedings of the 4th International Conference on Privacy Enhancing Technologies (Berlin, Heidelberg, 2005), PET’04, Springer-Verlag, pp. 207–225.
-
(2005)
Proceedings of the 4th International Conference on Privacy Enhancing Technologies
, pp. 207-225
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|