메뉴 건너뛰기




Volumn , Issue , 2015, Pages 271-286

Raptor: Routing attacks on privacy in tor

Author keywords

[No Author keywords available]

Indexed keywords

SEA ICE;

EID: 85069201566     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (184)

References (54)
  • 1
    • 84950284306 scopus 로고    scopus 로고
    • BGP hijacking for cryptocurrency profit. http://www.secureworks.com/ cyber-threat-intelligence/threats/ bgp-hijacking-for-cryptocurrency-profit/.
    • BGP Hijacking for Cryptocurrency Profit
  • 5
    • 85076281648 scopus 로고    scopus 로고
    • RIPE Atlas. https://atlas.ripe.net/.
    • RIPE Atlas
  • 6
    • 84871972422 scopus 로고    scopus 로고
    • RIPE RIS Raw Data. https://www.ripe.net/data-tools/stats/ris/ris-raw-data.
    • RIPE RIS Raw Data
  • 7
    • 85076301147 scopus 로고    scopus 로고
    • Routeviews. http://www.routeviews.org/.
  • 8
    • 84870633783 scopus 로고    scopus 로고
    • Accessed, February 2015
    • Tor metrics portal. https://metrics.torproject.org. Accessed, February 2015.
    • Tor Metrics Portal
  • 9
    • 77954750419 scopus 로고    scopus 로고
    • Accessed, February 2015
    • Who uses Tor? https://www.torproject.org/about/torusers.html.en. Accessed, February 2015.
    • Who Uses Tor?
  • 12
    • 84896481372 scopus 로고    scopus 로고
    • Oct
    • Tor stinks. http://www.theguardian.com/world/interactive/2013/oct/04/ tor-stinks-nsa-presentation-document, Oct. 2013.
    • (2013) Tor Stinks
  • 14
    • 84914686357 scopus 로고    scopus 로고
    • Loopholes for circumventing the constitution: Warrantless bulk surveillance on americans by collecting network traffic abroad
    • ARNBAK, A., AND GOLDBERG, S. Loopholes for circumventing the constitution: Warrantless bulk surveillance on americans by collecting network traffic abroad. In HotPETs (2014). Available at http://ssrn.com/abstract=2460462.
    • (2014) HotPETs
    • Arnbak, A.1    Goldberg, S.2
  • 17
    • 84869398114 scopus 로고    scopus 로고
    • Provable security of S-BGP and other path vector protocols: Model, analysis and extensions
    • New York, NY, USA, CCS’12, ACM
    • BOLDYREVA, A., AND LYCHEV, R. Provable security of S-BGP and other path vector protocols: Model, analysis and extensions. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (New York, NY, USA, 2012), CCS’12, ACM, pp. 541–552.
    • (2012) Proceedings of the 2012 ACM Conference on Computer and Communications Security , pp. 541-552
    • Boldyreva, A.1    Lychev, R.2
  • 22
    • 35248866624 scopus 로고    scopus 로고
    • Mix-networks with restricted routes
    • R. Dingledine, Ed.,. of Lecture Notes in Computer Science. Springer Berlin Heidelberg
    • DANEZIS, G. Mix-networks with restricted routes. In Privacy Enhancing Technologies, R. Dingledine, Ed., vol. 2760 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003, pp. 1–17.
    • (2003) Privacy Enhancing Technologies , vol.2760 , pp. 1-17
    • Danezis, G.1
  • 29
    • 80053146502 scopus 로고    scopus 로고
    • Let the market drive deployment: A strategy for transitioning to BGP security
    • New York, NY, USA, SIGCOMM’11, ACM
    • GILL, P., SCHAPIRA, M., AND GOLDBERG, S. Let the market drive deployment: A strategy for transitioning to BGP security. In Proceedings of the ACM SIGCOMM 2011 Conference (New York, NY, USA, 2011), SIGCOMM’11, ACM, pp. 14–25.
    • (2011) Proceedings of the ACM SIGCOMM 2011 Conference , pp. 14-25
    • Gill, P.1    Schapira, M.2    Goldberg, S.3
  • 31
  • 41
    • 34547504417 scopus 로고    scopus 로고
    • On interdomain routing security and pretty secure BGP (psBGP)
    • July
    • OORSCHOT, P. V., WAN, T., AND KRANAKIS, E. On interdomain routing security and pretty secure BGP (psBGP). ACM Trans. Inf. Syst. Secur. 10, 3 (July 2007).
    • (2007) ACM Trans. Inf. Syst. Secur. , vol.10 , pp. 3
    • Oorschot, P.V.1    Wan, T.2    Kranakis, E.3
  • 50
    • 85076300686 scopus 로고    scopus 로고
    • Open source column: Tribler: P2P search, share and stream
    • Mar
    • ZEILEMAKER, N., AND POUWELSE, J. Open source column: Tribler: P2P search, share and stream. SIGMultimedia Rec. 4, 1 (Mar. 2012), 20–24.
    • (2012) SIGMultimedia Rec , vol.4 , Issue.1 , pp. 20-24
    • Zeilemaker, N.1    Pouwelse, J.2
  • 52
    • 84877928848 scopus 로고    scopus 로고
    • ISPY: Detecting IP prefix hijacking on my own
    • Dec
    • ZHANG, Z., ZHANG, Y., HU, Y. C., MAO, Z. M., AND BUSH, R. iSPY: Detecting IP prefix hijacking on my own. IEEE/ACM Trans. Netw. 18, 6 (Dec. 2010), 1815–1828.
    • (2010) IEEE/ACM Trans. Netw. , vol.18 , Issue.6 , pp. 1815-1828
    • Zhang, Z.1    Zhang, Y.2    Hu, Y.C.3    Mao, Z.M.4    Bush, R.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.