-
2
-
-
85080525071
-
-
Emulab. http://www.emulab.net
-
Emulab. http://www.emulab.net.
-
-
-
-
3
-
-
85080470934
-
-
Inet. http://topology.eecs.umich.edu/inet
-
Inet. http://topology.eecs.umich.edu/inet.
-
-
-
-
4
-
-
85080611494
-
-
lighttpd. http://www.lighttpd.net
-
lighttpd. http://www.lighttpd.net.
-
-
-
-
6
-
-
85080616648
-
-
SSFNet. http://www.ssfnet.org/homePage.html
-
SSFNet. http://www.ssfnet.org/homePage.html.
-
-
-
-
8
-
-
84910608702
-
Defenestrator: Throwing out windows in tor
-
ALSABAH, M., BAUER, K., GOLDBERG, I., GRUNWALD, D., MCCOY, D., SAVAGE, S., AND VOELKER, G. M. DefenestraTor: Throwing out windows in Tor. In PETS (2011).
-
(2011)
PETS
-
-
Alsabah, M.1
Bauer, K.2
Goldberg, I.3
Grunwald, D.4
McCoy, D.5
Savage, S.6
Voelker, G.M.7
-
9
-
-
79959681025
-
Low-resource routing attacks against tor
-
BAUER, K., MCCOY, D., GRUNWALD, D., KOHNO, T., AND SICKER, D. Low-resource routing attacks against Tor. In WPES (2007).
-
(2007)
WPES
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
10
-
-
56649105529
-
Denial of service or denial of security? how attacks on reliability can compromise anonymity
-
BORISOV, N., DANEZIS, G., MITTAL, P., AND TABRIZ, P. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In CCS (2007).
-
(2007)
CCS
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
12
-
-
80755145232
-
Traffic analysis against low-latency anonymity networks using available bandwidth estimation
-
CHAKRAVARTY, S., STAVROU, A., AND KEROMYTIS, A. D. Traffic analysis against low-latency anonymity networks using available bandwidth estimation. In ESORICS (2010).
-
(2010)
ESORICS
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.D.3
-
14
-
-
4544382846
-
King: Estimating latency between arbitrary internet end hosts
-
GUMMADI, K. P., SAROIU, S., AND GRIBBLE, S. D. King: Estimating latency between arbitrary Internet end hosts. SIGCOMM Comput. Commun. Rev. 32, 3 (2002).
-
(2002)
SIGCOMM Comput. Commun. Rev.
, vol.32
, pp. 3
-
-
Gummadi, K.P.1
Saroiu, S.2
Gribble, S.D.3
-
16
-
-
70349692738
-
How much anonymity does network latency leak?
-
HOPPER, N., VASSERMAN, E. Y., AND CHAN-TIN, E. How much anonymity does network latency leak? In CCS (2007).
-
(2007)
CCS
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
17
-
-
78650009813
-
Recruiting new tor relays with BRAIDS
-
JANSEN, R., HOPPER, N., AND KIM, Y. Recruiting new Tor relays with BRAIDS. In CCS (2010).
-
(2010)
CCS
-
-
Jansen, R.1
Hopper, N.2
Kim, Y.3
-
18
-
-
85084096178
-
One bad apple spoils the bunch: Exploiting P2P applications to trace and profile tor users
-
LE BLOND, S., MANILS, P., ABDELBERI, C., KAAFAR, M. A., CASTELLUCCIA, C., LEGOUT, A., AND DABBOUS, W. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In LEET (2011).
-
(2011)
LEET
-
-
Le Blond, S.1
Manils, P.2
Abdelberi, C.3
Kaafar, M.A.4
Castelluccia, C.5
Legout, A.6
Dabbous, W.7
-
19
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
LEVINE, B. N., REITER, M. K., WANG, C., AND WRIGHT, M. K. Timing attacks in low-latency mix-based systems. In FC (2004).
-
(2004)
FC
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
21
-
-
84878363071
-
A case study on measuring statistical data in the tor anonymity network
-
LOESING, K., MURDOCH, S., AND DINGLEDINE, R. A case study on measuring statistical data in the Tor anonymity network. In WECSR (2010).
-
(2010)
WECSR
-
-
Loesing, K.1
Murdoch, S.2
Dingledine, R.3
-
22
-
-
70350228716
-
Shining light in dark places: Understanding the tor network
-
MCCOY, D., BAUER, K., GRUNWALD, D., KOHNO, T., AND SICKER, D. Shining light in dark places: Understanding the Tor network. In PETS (2008).
-
(2008)
PETS
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
24
-
-
84855690631
-
Metrics for security and performance in low-latency anonymity systems
-
MURDOCH, S. J., AND WATSON, R. N. M. Metrics for security and performance in low-latency anonymity systems. In PETS (2008).
-
(2008)
PETS
-
-
Murdoch, S.J.1
Watson, R.N.M.2
-
26
-
-
84893760266
-
Large scale simulation of tor: Modelling a global passive adversary
-
O’GORMAN, G., AND BLOTT, S. Large scale simulation of Tor: Modelling a global passive adversary. In ASIAN (2007).
-
(2007)
ASIAN
-
-
O’Gorman, G.1
Blott, S.2
-
27
-
-
85013350011
-
Wide-area traffic: The failure of poisson modeling
-
October
-
PAXSON, V., AND FLOYD, S. Wide-area traffic: The failure of Poisson modeling. SIGCOMM Comput. Commun. Rev. 24 (October 1994), 257–268.
-
(1994)
SIGCOMM Comput. Commun. Rev.
, vol.24
, pp. 257-268
-
-
Paxson, V.1
Floyd, S.2
-
28
-
-
33745457223
-
-
PDN-05-028, June
-
PETERSON, L., PAI, V., SPRING, N., AND BAVIER, A. Using PlanetLab for network research: Myths, realities, and best practices. PDN-05-028, June 2005.
-
(2005)
Using PlanetLab for Network Research: Myths, Realities, and Best Practices
-
-
Peterson, L.1
Pai, V.2
Spring, N.3
Bavier, A.4
-
29
-
-
78349298553
-
Improving tor using a TCP-over-DTLS tunnel
-
REARDON, J., AND GOLDBERG, I. Improving Tor using a TCP-over-DTLS tunnel. In USENIX Security (2009).
-
(2009)
USENIX Security
-
-
Reardon, J.1
Goldberg, I.2
-
30
-
-
78649319710
-
Scalable link-based relay selection for anonymous routing
-
SHERR, M., BLAZE, M., AND LOO, B. T. Scalable link-based relay selection for anonymous routing. In PETS (2009).
-
(2009)
PETS
-
-
Sherr, M.1
Blaze, M.2
Loo, B.T.3
-
31
-
-
56649125035
-
A tune-up for tor: Improving security and performance in the tor network
-
SNADER, R., AND BORISOV, N. A tune-up for Tor: Improving security and performance in the Tor network. In NDSS (2008).
-
(2008)
NDSS
-
-
Snader, R.1
Borisov, N.2
-
32
-
-
84893776621
-
Enforced community standards for research on users of the tor anonymity network
-
SOGHOIAN, C. Enforced community standards for research on users of the Tor anonymity network. In WECSR (2011).
-
(2011)
WECSR
-
-
Soghoian, C.1
-
33
-
-
14944374980
-
Self-configuring network traffic generation
-
SOMMERS, J., AND BARFORD, P. Self-configuring network traffic generation. In IMC (2004).
-
(2004)
IMC
-
-
Sommers, J.1
Barford, P.2
-
35
-
-
78649993140
-
An improved algorithm for tor circuit scheduling
-
TANG, C., AND GOLDBERG, I. An improved algorithm for Tor circuit scheduling. In CCS (2010).
-
(2010)
CCS
-
-
Tang, C.1
Goldberg, I.2
-
36
-
-
27544432494
-
Scalability and accuracy in a large-scale network emulator
-
VAHDAT, A., YOCUM, K., WALSH, K., MAHADEVAN, P., KOSTIĆ, D., CHASE, J., AND BECKER, D. Scalability and accuracy in a large-scale network emulator. In OSDI (2002).
-
(2002)
OSDI
-
-
Vahdat, A.1
Yocum, K.2
Walsh, K.3
Mahadevan, P.4
Kostić, D.5
Chase, J.6
Becker, D.7
-
37
-
-
36949026829
-
Realistic and responsive network traffic generation
-
VISHWANATH, K. V., AND VAHDAT, A. Realistic and responsive network traffic generation. In SIGCOMM (2006).
-
(2006)
SIGCOMM
-
-
Vishwanath, K.V.1
Vahdat, A.2
|