Open access bibliography for the paper
“Identifying and characterizing Sybils in the Tor network”
Sort by: (
reverse
)
year
, (
reverse
)
author
Feedback:
phw@nymity.ch
(
OpenPGP
)
Last updated: 2016-06-17
ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes
[
pdf
,
bib
]
Maria Konte, Roberto Perdisci, Nick Feamster
In Proc. of:
SIGCOMM
,
2015
, ACM
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor
[
pdf
,
bib
]
Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu
Article in:
IEEE Transactions on Information Forensics and Security
,
2015
,
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
[
pdf
,
bib
]
Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu
Article in:
IEEE Transactions on Parallel and Distributed Systems
,
2015
,
Did the FBI Pay a University to Attack Tor Users?
[
url
,
bib
]
Roger Dingledine
Miscellaneous
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
,
2014
, Springer
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
bib
]
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, Rachel Greenstadt
In Proc. of:
CCS
,
2014
, ACM
Lizards
[
html
,
bib
]
Miscellaneous
Tackling the Sefnit botnet Tor hazard
[
url
,
bib
]
msft-mmpc
Miscellaneous
#12813—Look at a bitmap visualization of relay consensus
[
url
,
bib
]
David Fifield
Miscellaneous
Tor security advisory: “relay early” traffic confirmation attack
[
url
,
bib
]
Roger Dingledine
Miscellaneous
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
[
pdf
,
bib
]
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
In Proc. of:
Security & Privacy
,
2013
, IEEE
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
bib
]
Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, Paul Syverson
In Proc. of:
CCS
,
2013
, ACM
SybilControl: Practical Sybil Defense with Computational Puzzles
[
pdf
,
bib
]
Frank Li, Prateek Mittal, Matthew Caesar, Nikita Borisov
In Proc. of:
Scalable Trusted Computing
,
2012
, ACM
Adapting Social Spam Infrastructure for Political Censorship
[
pdf
,
bib
]
Kurt Thomas, Chris Grier, Vern Paxson
In Proc. of:
LEET
,
2012
, USENIX
Real-World Sybil Attacks in BitTorrent Mainline DHT
[
pdf
,
bib
]
Liang Wang, Jussi Kangasharju
In Proc. of:
Globecom
,
2012
, IEEE
Skynet, a Tor-powered botnet straight from Reddit
[
url
,
bib
]
nex
Miscellaneous
June 2010 Progress Report
[
url
,
bib
]
Andrew Lewman
Miscellaneous
SybilInfer: Detecting Sybil Nodes using Social Networks
[
pdf
,
bib
]
George Danezis, Prateek Mittal
In Proc. of:
NDSS
,
2009
, The Internet Society
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
[
pdf
,
bib
]
Haifeng Yu, Phillip B. Gibbons Michael Kaminsky, Feng Xiao
In Proc. of:
Security & Privacy
,
2008
, IEEE
Low-Resource Routing Attacks Against Tor
[
pdf
,
bib
]
Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
In Proc. of:
WPES
,
2007
, ACM
No more than one server per IP address
[
txt
,
bib
]
Kevin Bauer, Damon McCoy
Miscellaneous
Minimizing Churn in Distributed Systems
[
pdf
,
bib
]
P. Brighten Godfrey, Scott Shenker, Ion Stoica
In Proc. of:
SIGCOMM
,
2006
, ACM
SybilGuard: Defending Against Sybil Attack via Social Networks
[
pdf
,
bib
]
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman
In Proc. of:
SIGCOMM
,
2006
, ACM
A Survey of Solutions to the Sybil Attack
[
pdf
,
bib
]
Brian Neil Levine, Clay Shields, N. Boris Margolin
Technical Report
,
2006
, University of Massachusetts Amherst
Computational Puzzles as Sybil Defenses
[
pdf
,
bib
]
Nikita Borisov
In Proc. of:
Peer-to-Peer Computing
,
2005
, IEEE
Tor: The Second-Generation Onion Router
[
pdf
,
bib
]
Roger Dingledine, Nick Mathewson, Paul Syverson
In Proc. of:
USENIX Security
,
2004
, USENIX
The Sybil Attack
[
pdf
,
bib
]
John R. Douceur
In Proc. of:
Peer-to-Peer Systems
,
2002
,
Topology Inference from BGP Routing Dynamics
[
pdf
,
bib
]
David G. Andersen, Nick Feamster, Steve Bauer, Hari Balakrishnan
In Proc. of:
Internet Measurement Workshop
,
2002
, ACM
Program Design in the UNIX System Environment
[
pdf
,
bib
]
Rob Pike, Brian W. Kernighan
Article in:
Bell Labs Technical Journal
,
1983
,
Sybil: The true story of a woman possessed by 16 separate personalities
[
bib
]
Flora Rheta Schreiber
Book
, Henry Regnery,
1973
Binary Codes Capable of Correcting Deletions, Insertions, and Reversals
[
pdf
,
bib
]
Vladimir Iosifovich Levenshtein
Article in:
Soviet Physics-Doklady
,
1966
,
The Invisible Internet Project
[
url
,
bib
]
Miscellaneous
GPU-based Onion Hash generator
[
url
,
bib
]
Eric Swanson
Miscellaneous
Tor Path Specification
[
txt
,
bib
]
Roger Dingledine, Nick Mathewson
Miscellaneous
doctor – service that periodically checks the Tor network for consensus conflicts and other hiccups
[
url
,
bib
]
Damian Johnson
Miscellaneous
zoossh – Parsing library for Tor-specific data formats
[
url
,
bib
]
Philipp Winter
Miscellaneous
CollecTor – Your friendly data-collecting service in the Tor network
[
url
,
bib
]
The Tor Project
Miscellaneous
sslstrip
[
url
,
bib
]
Moxie Marlinspike
Miscellaneous
Tor Metrics
[
url
,
bib
]
The Tor Project
Miscellaneous
Bibliography generated by
bibliograpy
.