-
1
-
-
85180620047
-
-
“OOM Killer,” http://linux-mm.org/OOM_Killer.
-
OOM Killer
-
-
-
2
-
-
85180628625
-
-
“R-U-Dead-Yet (RUDY),” https://code.google.com/p/r-u-dead-yet/.
-
R-U-Dead-Yet (RUDY)
-
-
-
4
-
-
84903982848
-
-
Acc. June 2013
-
“TC: A Tor control protocol (Version 1),” https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=control-spec.txt, Acc. June 2013.
-
TC: A Tor control protocol (Version 1)
-
-
-
6
-
-
84870651248
-
-
“The Tor Project,” https://www.torproject.org/.
-
The Tor Project
-
-
-
7
-
-
84949970109
-
-
Acc. July 2013
-
“Tor directory protocol, version 3,” https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=dir-spec.txt, Acc. July 2013.
-
Tor directory protocol, version 3
-
-
-
9
-
-
84872359093
-
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver
-
Oct
-
F. Adamsky, S. A. Khayam, R. Jager, and M. Rajarajan, “Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver,” in CyberC’12, Oct. 2012.
-
(2012)
CyberC’12
-
-
Adamsky, F.1
Khayam, S. A.2
Jager, R.3
Rajarajan, M.4
-
10
-
-
84910608702
-
DefenestraTor: Throwing out Windows in Tor
-
Jul
-
M. AlSabah, K. Bauer, I. Goldberg, D. Grunwald, D. McCoy, S. Savage, and G. Voelker, “DefenestraTor: Throwing out Windows in Tor,” in PETS’11, Jul. 2011.
-
(2011)
PETS’11
-
-
AlSabah, M.1
Bauer, K.2
Goldberg, I.3
Grunwald, D.4
McCoy, D.5
Savage, S.6
Voelker, G.7
-
11
-
-
79959681025
-
Low-Resource Routing Attacks Against Tor
-
Oct
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, “Low-Resource Routing Attacks Against Tor,” in WPES’07, Oct. 2007.
-
(2007)
WPES’07
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
12
-
-
84881248798
-
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
-
May
-
A. Biryukov, I. Pustogarov, and R.-P. Weinmann, “Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization,” in SP’13, May 2013.
-
(2013)
SP’13
-
-
Biryukov, A.1
Pustogarov, I.2
Weinmann, R.-P.3
-
15
-
-
84872008887
-
Effectiveness and Detection of Denial-of-Service Attacks in Tor
-
Nov
-
N. Danner, S. Defabbia-Kane, D. Krizanc, and M. Liberatore, “Effectiveness and Detection of Denial-of-Service Attacks in Tor,” ACM TISSEC, vol. 15, no. 3, Nov. 2012.
-
(2012)
ACM TISSEC
, vol.15
, Issue.3
-
-
Danner, N.1
Defabbia-Kane, S.2
Krizanc, D.3
Liberatore, M.4
-
16
-
-
85180621908
-
Securing Anonymous Communication Channels under the Selective DoS Attack
-
A. Das and N. Borisov, “Securing Anonymous Communication Channels under the Selective DoS Attack,” in FC’13.
-
FC’13
-
-
Das, A.1
Borisov, N.2
-
20
-
-
61849089615
-
TCP SYN Flooding Attacks and Common Mitigations
-
IETF, Aug
-
W. Eddy, “TCP SYN Flooding Attacks and Common Mitigations,” RFC 4987, IETF, Aug. 2007.
-
(2007)
RFC 4987
-
-
Eddy, W.1
-
21
-
-
85056899231
-
Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor
-
Oct
-
T. Elahi, K. Bauer, M. AlSabah, R. Dingledine, and I. Goldberg, “Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor,” in WPES’12, Oct. 2012.
-
(2012)
WPES’12
-
-
Elahi, T.1
Bauer, K.2
AlSabah, M.3
Dingledine, R.4
Goldberg, I.5
-
24
-
-
84922420033
-
How Low Can You Go: Balancing Performance with Anonymity in Tor
-
Jul
-
J. Geddes, R. Jansen, and N. Hopper, “How Low Can You Go: Balancing Performance with Anonymity in Tor,” in PETS’13, Jul. 2013.
-
(2013)
PETS’13
-
-
Geddes, J.1
Jansen, R.2
Hopper, N.3
-
26
-
-
85180621554
-
Exploiting TCP and the Persist Timer Infiniteness
-
ithilgore, 0x0d 0x42, Jun
-
ithilgore, “Exploiting TCP and the Persist Timer Infiniteness,” Phrack Magazine, vol. 0x0d, no. 0x42, Jun. 2009.
-
(2009)
Phrack Magazine
-
-
-
27
-
-
85084163714
-
Methodically Modeling the Tor Network
-
Aug
-
R. Jansen, K. Bauer, N. Hopper, and R. Dingledine, “Methodically Modeling the Tor Network,” in CSET’12, Aug. 2012.
-
(2012)
CSET’12
-
-
Jansen, R.1
Bauer, K.2
Hopper, N.3
Dingledine, R.4
-
28
-
-
85180760932
-
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
-
Feb
-
R. Jansen and N. Hopper, “Shadow: Running Tor in a Box for Accurate and Efficient Experimentation,” in NDSS’12, Feb. 2012.
-
(2012)
NDSS’12
-
-
Jansen, R.1
Hopper, N.2
-
30
-
-
33744524845
-
Low-rate TCP-targeted Denial of Service Attacks and Counter Strategies
-
A. Kuzmanovic and E. W. Knightly, “Low-rate TCP-targeted Denial of Service Attacks and Counter Strategies,” IEEE/ACM TON, vol. 14, no. 4, 2006.
-
(2006)
IEEE/ACM TON
, vol.14
, Issue.4
-
-
Kuzmanovic, A.1
Knightly, E. W.2
-
33
-
-
80755187817
-
Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
-
Oct
-
P. Mittal, A. Khurshid, J. Juen, M. Caesar, and N. Borisov, “Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting,” in CCS’11, Oct. 2011.
-
(2011)
CCS’11
-
-
Mittal, P.1
Khurshid, A.2
Juen, J.3
Caesar, M.4
Borisov, N.5
-
34
-
-
33750277833
-
Locating Hidden Servers
-
May
-
L. Øverlier and P. Syverson, “Locating Hidden Servers,” in SP’06, May 2006.
-
(2006)
SP’06
-
-
Øverlier, L.1
Syverson, P.2
-
35
-
-
84866638923
-
Valet Services: Improving Hidden Servers with a Personal Touch
-
Jun
-
L. Øverlier and P. Syverson, “Valet Services: Improving Hidden Servers with a Personal Touch,” in PETS’06, Jun. 2006.
-
(2006)
PETS’06
-
-
Øverlier, L.1
Syverson, P.2
-
36
-
-
85180626769
-
Compromising Anonymity Using Packet Spinning
-
Sep
-
V. Pappas, E. Athanasopoulos, S. Ioannidis, and E. P. Markatos, “Compromising Anonymity Using Packet Spinning,” in ISC 08, Sep. 2008.
-
(2008)
ISC 08
-
-
Pappas, V.1
Athanasopoulos, E.2
Ioannidis, S.3
Markatos, E. P.4
-
37
-
-
0003973018
-
Computing TCP’s Retransmission Timer
-
IETF, Jun
-
V. Paxson, M. Allman, J. Chu, and M. Sargent, “Computing TCP’s Retransmission Timer,” RFC 6298, IETF, Jun. 2011.
-
(2011)
RFC 6298
-
-
Paxson, V.1
Allman, M.2
Chu, J.3
Sargent, M.4
-
38
-
-
84905280236
-
-
RSnake
-
RSnake, “Slowloris HTTP DoS,” http://ha.ckers.org/slowloris/.
-
Slowloris HTTP DoS
-
-
-
39
-
-
0002098559
-
TCP Congestion Control with a Misbehaving Receiver
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Congestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR, vol. 29, no. 5, 1999.
-
(1999)
ACM SIGCOMM CCR
, vol.29
, Issue.5
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
41
-
-
33745803440
-
Misbehaving TCP Receivers Can Cause Internet-wide Congestion Collapse
-
Nov
-
R. Sherwood, B. Bhattacharjee, and R. Braud, “Misbehaving TCP Receivers Can Cause Internet-wide Congestion Collapse,” in CCS’05, Nov. 2005.
-
(2005)
CCS’05
-
-
Sherwood, R.1
Bhattacharjee, B.2
Braud, R.3
-
42
-
-
0038311861
-
Towards an Analysis of Onion Routing Security
-
Jul
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, “Towards an Analysis of Onion Routing Security,” in DIAU’00, Jul. 2000.
-
(2000)
DIAU’00
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
43
-
-
84856133258
-
Tor is unfair – and what to do about it
-
Oct
-
F. Tschorsch and B. Scheuermann, “Tor is unfair – and what to do about it,” in LCN’11, Oct. 2011.
-
(2011)
LCN’11
-
-
Tschorsch, F.1
Scheuermann, B.2
-
44
-
-
85084161332
-
How the Great Firewall of China is blocking Tor
-
Aug
-
P. Winter and S. Lindskog, “How the Great Firewall of China is blocking Tor,” in FOCI’12, Aug. 2012.
-
(2012)
FOCI’12
-
-
Winter, P.1
Lindskog, S.2
-
45
-
-
0023829320
-
A Formal Specification and Verification Method for the Prevention of Denial of Service
-
May
-
C.-F. Yu and V. D. Gligor, “A Formal Specification and Verification Method for the Prevention of Denial of Service,” in SP’88, May 1988.
-
(1988)
SP’88
-
-
Yu, C.-F.1
Gligor, V. D.2
|