@misc{collector,
  author = {{The Tor Project}},
  url = {https://collector.torproject.org},
  title = {{CollecTor}},
}
@misc{ethics-guidelines,
  author = {Kate Krauss},
  month = {November},
  url = {https://blog.torproject.org/blog/ethical-tor-research-guidelines},
  year = {2015},
  title = {Ethical {Tor} Research: Guidelines},
}
@misc{pyasn,
  author = {Hadi Asghari},
  url = {https://github.com/hadiasghari/pyasn},
  title = {pyasn -- {Python} {IP} address to Autonomous System Number lookup module},
}
@misc{Farrell2014a,
  author = {Stephen Farrell and Hannes Tschofenig},
  month = {May},
  url = {https://tools.ietf.org/html/rfc7258},
  year = {2014},
  title = {{RFC} 7258 -- Pervasive Monitoring Is an Attack},
}
@misc{Bortzmeyer2016a,
  author = {Stephane Bortzmeyer},
  url = {https://tools.ietf.org/html/rfc7816},
  month = {March},
  year = {2016},
  title = {{RFC} 7816 -- {DNS} Query Name Minimisation to Improve Privacy},
}
@phdthesis{Wang2015a,
  author = {Tao Wang},
  url = {https://nymity.ch/tor-dns/pdf/Wang2015a.pdf},
  school = {University of Waterloo},
  year = {2015},
  title = {Website Fingerprinting: Attacks and Defenses},
}
@misc{alexatop1k,
  author = {{Amazon Web Services}},
  url = {https://aws.amazon.com/alexa-top-sites/},
  title = {Alexa Top Sites},
}
@misc{ipasn,
  author = {{Team Cymru}},
  url = {https://www.team-cymru.org/IP-ASN-mapping.html},
  title = {{IP} to {ASN} Mapping},
}
@article{Fifield2015a,
  author = {David Fifield and Chang Lan and Rod Hynes and Percy Wegmann and Vern Paxson},
  publisher = {De Gruyter Open},
  title = {Blocking-resistant Communication Through Domain Fronting},
  url = {https://nymity.ch/tor-dns/pdf/Fifield2015a.pdf},
  journal = {PoPETS},
  number = {2},
  volume = {2015},
  year = {2015},
}
@misc{google-proxies,
  author = {Google},
  url = {https://developers.google.com/speed/public-dns/faq?csw=1\#locations},
  title = {Where are your servers currently located?},
}
@misc{tor-spec,
  author = {Roger Dingledine and Nick Mathewson},
  url = {https://spec.torproject.org/tor-spec},
  title = {{Tor} Protocol Specification},
}
@inproceedings{Cai2014a,
  author = {Xiang Cai and Rishab Nithyanand and Rob Johnson},
  url = {https://nymity.ch/tor-dns/pdf/Cai2014a.pdf},
  publisher = {ACM},
  booktitle = {WPES},
  year = {2014},
  title = {{CS-BuFLO}: A Congestion Sensitive Website Fingerprinting Defense},
}
@inproceedings{Juarez2014a,
  author = {Marc Juarez and Sadia Afroz and Gunes Acar and Claudia Diaz and Rachel Greenstadt},
  url = {https://nymity.ch/tor-dns/pdf/Juarez2014a.pdf},
  publisher = {ACM},
  booktitle = {CCS},
  year = {2014},
  title = {A Critical Evaluation of Website Fingerprinting Attacks},
}
@inproceedings{Nithyanand2016a,
  author = {Rishab Nithyanand and Oleksii Starov and Adva Zair and Phillipa Gill and Michael Schapira},
  url = {https://nymity.ch/tor-dns/pdf/Nithyanand2016a.pdf},
  publisher = {The Internet Society},
  booktitle = {NDSS},
  year = {2016},
  title = {Measuring and Mitigating {AS}-level Adversaries Against {Tor}},
}
@inproceedings{Johnson2013a,
  author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul Syverson},
  url = {https://nymity.ch/tor-dns/pdf/Johnson2013a.pdf},
  publisher = {ACM},
  booktitle = {CCS},
  year = {2013},
  title = {Users Get Routed: Traffic Correlation on {Tor} by Realistic Adversaries},
}
@inproceedings{Murdoch2007a,
  author = {Steven J. Murdoch and Piotr Zieli{\'n}ski},
  url = {https://nymity.ch/tor-dns/pdf/Murdoch2007a.pdf},
  publisher = {Springer},
  booktitle = {PET},
  year = {2007},
  title = {Sampled Traffic Analysis by {Internet}-Exchange-Level Adversaries},
}
@inproceedings{Feamster2004a,
  author = {Nick Feamster and Roger Dingledine},
  url = {https://nymity.ch/tor-dns/pdf/Feamster2004a.pdf},
  publisher = {ACM},
  booktitle = {WPES},
  year = {2004},
  title = {Location Diversity in Anonymity Networks},
}
@article{Juen2015a,
  author = {Joshua Juen and Aaron Johnson and Anupam Das and Nikita Borisov and Matthew Caesar},
  publisher = {De Gruyter Open},
  title = {Defending {Tor} from Network Adversaries: A Case Study of Network Path Prediction},
  url = {https://nymity.ch/tor-dns/pdf/Juen2015a.pdf},
  journal = {PoPETS},
  number = {2},
  volume = {2015},
  year = {2015},
}
@inproceedings{Winter2014b,
  author = {Philipp Winter and Richard K\"{o}wer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar Weippl},
  url = {https://nymity.ch/tor-dns/pdf/Winter2014b.pdf},
  publisher = {Springer},
  booktitle = {PETS},
  year = {2014},
  title = {Spoiled Onions: Exposing Malicious {Tor} Exit Relays},
}
@inproceedings{Panchenko2011a,
  author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel},
  url = {https://nymity.ch/tor-dns/pdf/Panchenko2011a.pdf},
  publisher = {ACM},
  booktitle = {WPES},
  year = {2011},
  title = {Website Fingerprinting in Onion Routing Based Anonymization Networls},
}
@inproceedings{Panchenko2016a,
  author = {Andriy Panchenko and Fabian Lanze and Andreas Zinnen and Martin Henze and Jan Pennekamp and Klaus Wehrle and Thomas Engel},
  url = {https://nymity.ch/tor-dns/pdf/Panchenko2016a.pdf},
  publisher = {The Internet Society},
  booktitle = {NDSS},
  year = {2016},
  title = {Website Fingerprinting at {Internet} Scale},
}
@inproceedings{Dingledine2004a,
  author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  url = {https://nymity.ch/tor-dns/pdf/Dingledine2004a.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security},
  year = {2004},
  title = {{Tor}: The Second-Generation Onion Router},
}
@inproceedings{Sun2015a,
  author = {Yixin Sun and Anne Edmundson and Laurent Vanbever and Oscar Li and Jennifer Rexford and Mung Chiang and Prateek Mittal},
  url = {https://nymity.ch/tor-dns/pdf/Sun2015a.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security},
  year = {2015},
  title = {{RAPTOR}: Routing Attacks on Privacy in {Tor}},
}
@misc{exitmap,
  author = {Philipp Winter},
  url = {https://github.com/NullHypothesis/exitmap},
  title = {exitmap---A fast and modular scanner for Tor exit relays},
}
@inproceedings{Khattak2016a,
  author = {Sheharbano Khattak and David Fifield and Sadia Afroz and Mobin Javed and Srikanth Sundaresan and Damon McCoy and Vern Paxson and Steven J. Murdoch},
  url = {https://nymity.ch/tor-dns/pdf/Khattak2016a.pdf},
  publisher = {The Internet Society},
  booktitle = {NDSS},
  year = {2016},
  title = {Do You See What I See? Differential Treatment of Anonymous Users},
}
@misc{TorPS,
  author = {Aaron Johnson},
  url = {https://github.com/torps/torps},
  title = {The {Tor} Path Simulator},
}
@article{Gao2001a,
  author = {Lixin Gao},
  title = {On Inferring Autonomous System Relationships in the {Internet}},
  url = {https://nymity.ch/tor-dns/pdf/Gao2001a.pdf},
  journal = {IEEE/ACM Transactions on Networking},
  number = {6},
  volume = {9},
  year = {2001},
}
@inproceedings{Zhu2015a,
  author = {Liang Zhu and Zi Hu and John Heidemann and Duane Wessels and Allison Mankin and Nikita Somaiya},
  url = {https://nymity.ch/tor-dns/pdf/Zhu2015a.pdf},
  publisher = {IEEE},
  booktitle = {Security \& Privacy},
  year = {2015},
  title = {Connection-Oriented {DNS} to Improve Privacy and Security},
}
@misc{atlas,
  author = {{RIPE Network Coordination Centre}},
  url = {https://atlas.ripe.net/},
  title = {{RIPE} {Atlas}},
}
@inproceedings{Cai2014b,
  author = {Xiang Cai and Rishab Nithyanand and Tao Wang and Rob Johnson and Ian Goldberg},
  url = {https://nymity.ch/tor-dns/pdf/Cai2014b.pdf},
  publisher = {ACM},
  booktitle = {CCS},
  year = {2014},
  title = {A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses},
}
@inproceedings{Herrmann2009a,
  author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath},
  url = {https://nymity.ch/tor-dns/pdf/Herrmann2009a.pdf},
  publisher = {ACM},
  booktitle = {CCSW},
  year = {2009},
  title = {Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Na\"{\i}ve-Bayes Classifier},
}
@inproceedings{Cai2012a,
  author = {Xiang Cai and Xin Cheng Zhang and Brijesh Joshi and Rob Johnson},
  url = {https://nymity.ch/tor-dns/pdf/Cai2012a.pdf},
  publisher = {ACM},
  booktitle = {CCS},
  year = {2012},
  title = {Touching from a Distance: Website Fingerprinting Attacks and Defenses},
}
@inproceedings{Wang2013a,
  author = {Tao Wang and Ian Goldberg},
  url = {https://nymity.ch/tor-dns/pdf/Wang2013a.pdf},
  publisher = {ACM},
  booktitle = {WPES},
  year = {2013},
  title = {Improved Website Fingerprinting on {Tor}},
}
@inproceedings{Wang2014a,
  author = {Tao Wang and Xiang Cai and Rishab Nithyanand and Rob Johnson and Ian Goldberg},
  url = {https://nymity.ch/tor-dns/pdf/Wang2014a.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security},
  year = {2014},
  title = {Effective Attacks and Provable Defenses for Website Fingerprinting},
}
@misc{Juarez2016a,
  author = {Marc Juarez and Mohsen Imani and Mike Perry and Claudia Diaz and Matthew Wright},
  howpublished = {arXiv report},
  url = {https://arxiv.org/pdf/1512.00524v3.pdf},
  year = {2016},
  title = {Toward an Efficient Website Fingerprinting Defense},
}
@article{Mahanti2013a,
  author = {Aniket Mahanti and Niklas Carlsson and Anirban Mahanti and Martin Arlitt and Carey Williamson},
  publisher = {IEEE},
  title = {A Tale of the Tails: Power-Laws in {Internet} Measurements},
  url = {https://nymity.ch/tor-dns/pdf/Mahanti2013a.pdf},
  journal = {IEEE Network},
  number = {1},
  volume = {27},
  year = {2013},
}
@article{Wang2016a,
  author = {Tao Wang and Ian Goldberg},
  publisher = {De Gruyter Open},
  title = {On Realistically Attacking {Tor} with Website Fingerprinting},
  url = {https://nymity.ch/tor-dns/pdf/Wang2016a.pdf},
  journal = {PoPETs},
  number = {4},
  volume = {2016},
  year = {2016},
}
@article{Alstott2014a,
  author = {Jeff Alstott and Ed Bullmore and Dietmar Plenz},
  title = {{powerlaw}: A {Python} Package for Analysis of Heavy-Tailed Distributions},
  url = {https://nymity.ch/tor-dns/pdf/Alstott2014a.pdf},
  journal = {PLoS ONE},
  number = {1},
  volume = {9},
  year = {2014},
}
@inproceedings{Hayes2016a,
  author = {Jamie Hayes and George Danezis},
  url = {https://nymity.ch/tor-dns/pdf/Hayes2016a.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security},
  year = {2016},
  title = {k-fingerprinting: A Robust Scalable Website Fingerprinting Technique},
}
@inproceedings{Ali2007a,
  author = {Kamal Ali and Mark Scarr},
  url = {https://nymity.ch/tor-dns/pdf/Ali2007a.pdf},
  publisher = {ACM},
  booktitle = {WWW},
  year = {2007},
  title = {Robust Methodologies for Modeling Web Click Distributions},
}
@article{Clauset2009a,
  author = {Aaron Clauset and Cosma Rohilla Shalizi and Mark E. J. Newman},
  title = {Power-Law Distributions in Empirical Data},
  url = {https://arxiv.org/pdf/0706.1062},
  journal = {SIAM Review},
  number = {4},
  volume = {51},
  year = {2009},
}
@misc{numberofwebsites,
  author = {Netcraft},
  url = {https://news.netcraft.com/archives/2016/07/19/july-2016-web-server-survey.html},
  month = {July},
  year = {2016},
  title = {July 2016 Web Server Survey},
}
@misc{mixmaster,
  author = {},
  url = {http://mixmaster.sourceforge.net},
  key = {mixmaster},
  title = {Mixmaster},
}
@inproceedings{Danezis2003a,
  author = {George Danezis and Roger Dingledine and Nick Mathewson},
  url = {https://nymity.ch/tor-dns/pdf/Danezis2003a.pdf},
  publisher = {IEEE},
  booktitle = {Security \& Privacy},
  year = {2003},
  title = {{Mixminion}: Design of a Type {III} Anonymous Remailer Protocol},
}
@misc{adapativepadding,
  author = {Mike Perry},
  url = {https://gitweb.torproject.org/torspec.git/tree/proposals/254-padding-negotiation.txt},
  month = {September},
  year = {2015},
  title = {Padding Negotiation},
}
@misc{nolocalcache,
  author = {Nick Mathewson},
  url = {https://gitweb.torproject.org/torspec.git/tree/proposals/205-local-dnscache.txt},
  month = {July},
  year = {2012},
  title = {Remove Global Client-side {DNS} Caching},
}
@inproceedings{Jansen2016a,
  author = {Rob Jansen and Aaron Johnson},
  url = {https://nymity.ch/tor-dns/pdf/Jansen2016a.pdf},
  publisher = {ACM},
  booktitle = {CCS},
  year = {2016},
  title = {Safely Measuring {Tor}},
}
@inproceedings{Banerjee2004a,
  author = {Suman Banerjee and Timothy G. Griffin and Marcelo Pias},
  url = {https://nymity.ch/tor-dns/pdf/Banerjee2004a.pdf},
  publisher = {Springer},
  booktitle = {PAM},
  year = {2004},
  title = {The Interdomain Connectivity of {PlanetLab} Nodes},
}
@misc{metrics-countries,
  author = {{The Tor Project}},
  url = {https://metrics.torproject.org/userstats-relay-table.html},
  title = {{Tor Metrics--Top-10 countries by directly connecting users}},
}
@misc{planetlab,
  author = {},
  url = {https://www.planet-lab.org},
  title = {{PlanetLab} -- An open platform for developing, deploying, and accessing planetary-scale services},
}
@misc{meek-shutdown,
  author = {David Fifield},
  url = {https://lists.torproject.org/pipermail/tor-talk/2016-June/041699.html},
  month = {June},
  year = {2016},
  title = {meek-google suspended for terms of service violations (how to set up your own)},
}