메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Experimentor: A testbed for safe and realistic tor experimentation

Author keywords

[No Author keywords available]

Indexed keywords

TESTBEDS;

EID: 85084164002     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (60)

References (37)
  • 2
    • 85080525071 scopus 로고    scopus 로고
    • Emulab. http://www.emulab.net
    • Emulab. http://www.emulab.net.
  • 3
    • 85080470934 scopus 로고    scopus 로고
    • Inet. http://topology.eecs.umich.edu/inet
    • Inet. http://topology.eecs.umich.edu/inet.
  • 4
    • 85080611494 scopus 로고    scopus 로고
    • lighttpd. http://www.lighttpd.net
    • lighttpd. http://www.lighttpd.net.
  • 6
    • 85080616648 scopus 로고    scopus 로고
    • SSFNet. http://www.ssfnet.org/homePage.html
    • SSFNet. http://www.ssfnet.org/homePage.html.
  • 10
    • 56649105529 scopus 로고    scopus 로고
    • Denial of service or denial of security? how attacks on reliability can compromise anonymity
    • BORISOV, N., DANEZIS, G., MITTAL, P., AND TABRIZ, P. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In CCS (2007).
    • (2007) CCS
    • Borisov, N.1    Danezis, G.2    Mittal, P.3    Tabriz, P.4
  • 12
    • 80755145232 scopus 로고    scopus 로고
    • Traffic analysis against low-latency anonymity networks using available bandwidth estimation
    • CHAKRAVARTY, S., STAVROU, A., AND KEROMYTIS, A. D. Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In ESORICS (2010).
    • (2010) ESORICS
    • Chakravarty, S.1    Stavrou, A.2    Keromytis, A.D.3
  • 16
    • 70349692738 scopus 로고    scopus 로고
    • How much anonymity does network latency leak?
    • HOPPER, N., VASSERMAN, E. Y., AND CHAN-TIN, E. How much anonymity does network latency leak? In CCS (2007).
    • (2007) CCS
    • Hopper, N.1    Vasserman, E.Y.2    Chan-Tin, E.3
  • 17
    • 78650009813 scopus 로고    scopus 로고
    • Recruiting new tor relays with BRAIDS
    • JANSEN, R., HOPPER, N., AND KIM, Y. Recruiting new Tor relays with BRAIDS. In CCS (2010).
    • (2010) CCS
    • Jansen, R.1    Hopper, N.2    Kim, Y.3
  • 19
    • 33745798251 scopus 로고    scopus 로고
    • Timing attacks in low-latency mix-based systems
    • LEVINE, B. N., REITER, M. K., WANG, C., AND WRIGHT, M. K. Timing attacks in low-latency mix-based systems. In FC (2004).
    • (2004) FC
    • Levine, B.N.1    Reiter, M.K.2    Wang, C.3    Wright, M.K.4
  • 21
    • 84878363071 scopus 로고    scopus 로고
    • A case study on measuring statistical data in the tor anonymity network
    • LOESING, K., MURDOCH, S., AND DINGLEDINE, R. A case study on measuring statistical data in the Tor anonymity network. In WECSR (2010).
    • (2010) WECSR
    • Loesing, K.1    Murdoch, S.2    Dingledine, R.3
  • 22
    • 70350228716 scopus 로고    scopus 로고
    • Shining light in dark places: Understanding the tor network
    • MCCOY, D., BAUER, K., GRUNWALD, D., KOHNO, T., AND SICKER, D. Shining light in dark places: Understanding the Tor network. In PETS (2008).
    • (2008) PETS
    • McCoy, D.1    Bauer, K.2    Grunwald, D.3    Kohno, T.4    Sicker, D.5
  • 23
  • 24
    • 84855690631 scopus 로고    scopus 로고
    • Metrics for security and performance in low-latency anonymity systems
    • MURDOCH, S. J., AND WATSON, R. N. M. Metrics for security and performance in low-latency anonymity systems. In PETS (2008).
    • (2008) PETS
    • Murdoch, S.J.1    Watson, R.N.M.2
  • 26
    • 84893760266 scopus 로고    scopus 로고
    • Large scale simulation of tor: Modelling a global passive adversary
    • O’GORMAN, G., AND BLOTT, S. Large scale simulation of Tor: Modelling a global passive adversary. In ASIAN (2007).
    • (2007) ASIAN
    • O’Gorman, G.1    Blott, S.2
  • 27
    • 85013350011 scopus 로고
    • Wide-area traffic: The failure of poisson modeling
    • October
    • PAXSON, V., AND FLOYD, S. Wide-area traffic: The failure of Poisson modeling. SIGCOMM Comput. Commun. Rev. 24 (October 1994), 257–268.
    • (1994) SIGCOMM Comput. Commun. Rev. , vol.24 , pp. 257-268
    • Paxson, V.1    Floyd, S.2
  • 29
    • 78349298553 scopus 로고    scopus 로고
    • Improving tor using a TCP-over-DTLS tunnel
    • REARDON, J., AND GOLDBERG, I. Improving Tor using a TCP-over-DTLS tunnel. In USENIX Security (2009).
    • (2009) USENIX Security
    • Reardon, J.1    Goldberg, I.2
  • 30
    • 78649319710 scopus 로고    scopus 로고
    • Scalable link-based relay selection for anonymous routing
    • SHERR, M., BLAZE, M., AND LOO, B. T. Scalable link-based relay selection for anonymous routing. In PETS (2009).
    • (2009) PETS
    • Sherr, M.1    Blaze, M.2    Loo, B.T.3
  • 31
    • 56649125035 scopus 로고    scopus 로고
    • A tune-up for tor: Improving security and performance in the tor network
    • SNADER, R., AND BORISOV, N. A tune-up for Tor: Improving security and performance in the Tor network. In NDSS (2008).
    • (2008) NDSS
    • Snader, R.1    Borisov, N.2
  • 32
    • 84893776621 scopus 로고    scopus 로고
    • Enforced community standards for research on users of the tor anonymity network
    • SOGHOIAN, C. Enforced community standards for research on users of the Tor anonymity network. In WECSR (2011).
    • (2011) WECSR
    • Soghoian, C.1
  • 33
    • 14944374980 scopus 로고    scopus 로고
    • Self-configuring network traffic generation
    • SOMMERS, J., AND BARFORD, P. Self-configuring network traffic generation. In IMC (2004).
    • (2004) IMC
    • Sommers, J.1    Barford, P.2
  • 35
    • 78649993140 scopus 로고    scopus 로고
    • An improved algorithm for tor circuit scheduling
    • TANG, C., AND GOLDBERG, I. An improved algorithm for Tor circuit scheduling. In CCS (2010).
    • (2010) CCS
    • Tang, C.1    Goldberg, I.2
  • 37
    • 36949026829 scopus 로고    scopus 로고
    • Realistic and responsive network traffic generation
    • VISHWANATH, K. V., AND VAHDAT, A. Realistic and responsive network traffic generation. In SIGCOMM (2006).
    • (2006) SIGCOMM
    • Vishwanath, K.V.1    Vahdat, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.