Open access bibliography for the paper
“Identifying and characterizing Sybils in the Tor network”
Sort by: (
reverse
)
year
, (
reverse
)
author
Feedback:
phw@nymity.ch
(
OpenPGP
)
Last updated: 2016-06-17
Tackling the Sefnit botnet Tor hazard
[
url
,
bib
]
msft-mmpc
Miscellaneous
Skynet, a Tor-powered botnet straight from Reddit
[
url
,
bib
]
nex
Miscellaneous
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
[
pdf
,
bib
]
Haifeng Yu
, Phillip B. Gibbons Michael Kaminsky, Feng Xiao
In Proc. of:
Security & Privacy
, 2008, IEEE
SybilGuard: Defending Against Sybil Attack via Social Networks
[
pdf
,
bib
]
Haifeng Yu
, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman
In Proc. of:
SIGCOMM
, 2006, ACM
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor
[
pdf
,
bib
]
Zhen Ling, Junzhou Luo, Kui Wu,
Wei Yu
, Xinwen Fu
Article in:
IEEE Transactions on Information Forensics and Security
, 2015,
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
[
pdf
,
bib
]
Zhen Ling, Junzhou Luo,
Wei Yu
, Ming Yang, Xinwen Fu
Article in:
IEEE Transactions on Parallel and Distributed Systems
, 2015,
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
[
pdf
,
bib
]
Zhen Ling, Junzhou Luo, Wei Yu,
Ming Yang
, Xinwen Fu
Article in:
IEEE Transactions on Parallel and Distributed Systems
, 2015,
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
[
pdf
,
bib
]
Haifeng Yu, Phillip B. Gibbons Michael Kaminsky,
Feng Xiao
In Proc. of:
Security & Privacy
, 2008, IEEE
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor
[
pdf
,
bib
]
Zhen Ling, Junzhou Luo,
Kui Wu
, Wei Yu, Xinwen Fu
Article in:
IEEE Transactions on Information Forensics and Security
, 2015,
zoossh – Parsing library for Tor-specific data formats
[
url
,
bib
]
Philipp Winter
Miscellaneous
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
bib
]
Philipp Winter
, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog,
Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
[
pdf
,
bib
]
Alex Biryukov, Ivan Pustogarov,
Ralf-Philipp Weinmann
In Proc. of:
Security & Privacy
, 2013, IEEE
Real-World Sybil Attacks in BitTorrent Mainline DHT
[
pdf
,
bib
]
Liang Wang
, Jussi Kangasharju
In Proc. of:
Globecom
, 2012, IEEE
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
bib
]
Aaron Johnson,
Chris Wacek
, Rob Jansen, Micah Sherr, Paul Syverson
In Proc. of:
CCS
, 2013, ACM
Adapting Social Spam Infrastructure for Political Censorship
[
pdf
,
bib
]
Kurt Thomas
, Chris Grier, Vern Paxson
In Proc. of:
LEET
, 2012, USENIX
Tor: The Second-Generation Onion Router
[
pdf
,
bib
]
Roger Dingledine, Nick Mathewson,
Paul Syverson
In Proc. of:
USENIX Security
, 2004, USENIX
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
bib
]
Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr,
Paul Syverson
In Proc. of:
CCS
, 2013, ACM
GPU-based Onion Hash generator
[
url
,
bib
]
Eric Swanson
Miscellaneous
Minimizing Churn in Distributed Systems
[
pdf
,
bib
]
P. Brighten Godfrey, Scott Shenker,
Ion Stoica
In Proc. of:
SIGCOMM
, 2006, ACM
Low-Resource Routing Attacks Against Tor
[
pdf
,
bib
]
Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno,
Douglas Sicker
In Proc. of:
WPES
, 2007, ACM
A Survey of Solutions to the Sybil Attack
[
pdf
,
bib
]
Brian Neil Levine,
Clay Shields
, N. Boris Margolin
Technical Report
, 2006, University of Massachusetts Amherst
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
bib
]
Aaron Johnson, Chris Wacek, Rob Jansen,
Micah Sherr
, Paul Syverson
In Proc. of:
CCS
, 2013, ACM
Minimizing Churn in Distributed Systems
[
pdf
,
bib
]
P. Brighten Godfrey,
Scott Shenker
, Ion Stoica
In Proc. of:
SIGCOMM
, 2006, ACM
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber,
Sebastian Schrittwieser
, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
Sybil: The true story of a woman possessed by 16 separate personalities
[
bib
]
Flora Rheta Schreiber
Book
, Henry Regnery, 1973
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
[
pdf
,
bib
]
Alex Biryukov,
Ivan Pustogarov
, Ralf-Philipp Weinmann
In Proc. of:
Security & Privacy
, 2013, IEEE
CollecTor – Your friendly data-collecting service in the Tor network
[
url
,
bib
]
The Tor Project
Miscellaneous
Tor Metrics
[
url
,
bib
]
The Tor Project
Miscellaneous
Program Design in the UNIX System Environment
[
pdf
,
bib
]
Rob Pike
, Brian W. Kernighan
Article in:
Bell Labs Technical Journal
, 1983,
ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes
[
pdf
,
bib
]
Maria Konte,
Roberto Perdisci
, Nick Feamster
In Proc. of:
SIGCOMM
, 2015, ACM
Adapting Social Spam Infrastructure for Political Censorship
[
pdf
,
bib
]
Kurt Thomas, Chris Grier,
Vern Paxson
In Proc. of:
LEET
, 2012, USENIX
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
bib
]
Philipp Winter, Richard Köwer,
Martin Mulazzani
, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
SybilInfer: Detecting Sybil Nodes using Social Networks
[
pdf
,
bib
]
George Danezis,
Prateek Mittal
In Proc. of:
NDSS
, 2009, The Internet Society
SybilControl: Practical Sybil Defense with Computational Puzzles
[
pdf
,
bib
]
Frank Li,
Prateek Mittal
, Matthew Caesar, Nikita Borisov
In Proc. of:
Scalable Trusted Computing
, 2012, ACM
No more than one server per IP address
[
txt
,
bib
]
Kevin Bauer,
Damon McCoy
Miscellaneous
Low-Resource Routing Attacks Against Tor
[
pdf
,
bib
]
Kevin Bauer,
Damon McCoy
, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
In Proc. of:
WPES
, 2007, ACM
Tor Path Specification
[
txt
,
bib
]
Roger Dingledine,
Nick Mathewson
Miscellaneous
Tor: The Second-Generation Onion Router
[
pdf
,
bib
]
Roger Dingledine,
Nick Mathewson
, Paul Syverson
In Proc. of:
USENIX Security
, 2004, USENIX
sslstrip
[
url
,
bib
]
Moxie Marlinspike
Miscellaneous
A Survey of Solutions to the Sybil Attack
[
pdf
,
bib
]
Brian Neil Levine, Clay Shields,
N. Boris Margolin
Technical Report
, 2006, University of Massachusetts Amherst
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor
[
pdf
,
bib
]
Zhen Ling,
Junzhou Luo
, Kui Wu, Wei Yu, Xinwen Fu
Article in:
IEEE Transactions on Information Forensics and Security
, 2015,
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
[
pdf
,
bib
]
Zhen Ling,
Junzhou Luo
, Wei Yu, Ming Yang, Xinwen Fu
Article in:
IEEE Transactions on Parallel and Distributed Systems
, 2015,
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor
[
pdf
,
bib
]
Zhen Ling
, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu
Article in:
IEEE Transactions on Information Forensics and Security
, 2015,
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
[
pdf
,
bib
]
Zhen Ling
, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu
Article in:
IEEE Transactions on Parallel and Distributed Systems
, 2015,
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser,
Stefan Lindskog
, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
SybilControl: Practical Sybil Defense with Computational Puzzles
[
pdf
,
bib
]
Frank Li
, Prateek Mittal, Matthew Caesar, Nikita Borisov
In Proc. of:
Scalable Trusted Computing
, 2012, ACM
June 2010 Progress Report
[
url
,
bib
]
Andrew Lewman
Miscellaneous
A Survey of Solutions to the Sybil Attack
[
pdf
,
bib
]
Brian Neil Levine
, Clay Shields, N. Boris Margolin
Technical Report
, 2006, University of Massachusetts Amherst
Binary Codes Capable of Correcting Deletions, Insertions, and Reversals
[
pdf
,
bib
]
Vladimir Iosifovich Levenshtein
Article in:
Soviet Physics-Doklady
, 1966,
ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes
[
pdf
,
bib
]
Maria Konte
, Roberto Perdisci, Nick Feamster
In Proc. of:
SIGCOMM
, 2015, ACM
Low-Resource Routing Attacks Against Tor
[
pdf
,
bib
]
Kevin Bauer, Damon McCoy, Dirk Grunwald,
Tadayoshi Kohno
, Douglas Sicker
In Proc. of:
WPES
, 2007, ACM
Program Design in the UNIX System Environment
[
pdf
,
bib
]
Rob Pike,
Brian W. Kernighan
Article in:
Bell Labs Technical Journal
, 1983,
Real-World Sybil Attacks in BitTorrent Mainline DHT
[
pdf
,
bib
]
Liang Wang,
Jussi Kangasharju
In Proc. of:
Globecom
, 2012, IEEE
SybilGuard: Defending Against Sybil Attack via Social Networks
[
pdf
,
bib
]
Haifeng Yu,
Michael Kaminsky
, Phillip B. Gibbons, Abraham Flaxman
In Proc. of:
SIGCOMM
, 2006, ACM
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
[
pdf
,
bib
]
Haifeng Yu,
Phillip B. Gibbons Michael Kaminsky
, Feng Xiao
In Proc. of:
Security & Privacy
, 2008, IEEE
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
bib
]
Marc Juarez
, Sadia Afroz, Gunes Acar, Claudia Diaz, Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
bib
]
Aaron Johnson
, Chris Wacek, Rob Jansen, Micah Sherr, Paul Syverson
In Proc. of:
CCS
, 2013, ACM
doctor – service that periodically checks the Tor network for consensus conflicts and other hiccups
[
url
,
bib
]
Damian Johnson
Miscellaneous
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
bib
]
Aaron Johnson, Chris Wacek,
Rob Jansen
, Micah Sherr, Paul Syverson
In Proc. of:
CCS
, 2013, ACM
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani,
Markus Huber
, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
Low-Resource Routing Attacks Against Tor
[
pdf
,
bib
]
Kevin Bauer, Damon McCoy,
Dirk Grunwald
, Tadayoshi Kohno, Douglas Sicker
In Proc. of:
WPES
, 2007, ACM
Adapting Social Spam Infrastructure for Political Censorship
[
pdf
,
bib
]
Kurt Thomas,
Chris Grier
, Vern Paxson
In Proc. of:
LEET
, 2012, USENIX
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
bib
]
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz,
Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
Minimizing Churn in Distributed Systems
[
pdf
,
bib
]
P. Brighten Godfrey
, Scott Shenker, Ion Stoica
In Proc. of:
SIGCOMM
, 2006, ACM
SybilGuard: Defending Against Sybil Attack via Social Networks
[
pdf
,
bib
]
Haifeng Yu, Michael Kaminsky,
Phillip B. Gibbons
, Abraham Flaxman
In Proc. of:
SIGCOMM
, 2006, ACM
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor
[
pdf
,
bib
]
Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu,
Xinwen Fu
Article in:
IEEE Transactions on Information Forensics and Security
, 2015,
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
[
pdf
,
bib
]
Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang,
Xinwen Fu
Article in:
IEEE Transactions on Parallel and Distributed Systems
, 2015,
SybilGuard: Defending Against Sybil Attack via Social Networks
[
pdf
,
bib
]
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons,
Abraham Flaxman
In Proc. of:
SIGCOMM
, 2006, ACM
#12813—Look at a bitmap visualization of relay consensus
[
url
,
bib
]
David Fifield
Miscellaneous
ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes
[
pdf
,
bib
]
Maria Konte, Roberto Perdisci,
Nick Feamster
In Proc. of:
SIGCOMM
, 2015, ACM
Topology Inference from BGP Routing Dynamics
[
pdf
,
bib
]
David G. Andersen,
Nick Feamster
, Steve Bauer, Hari Balakrishnan
In Proc. of:
Internet Measurement Workshop
, 2002, ACM
The Sybil Attack
[
pdf
,
bib
]
John R. Douceur
In Proc. of:
Peer-to-Peer Systems
, 2002,
Tor Path Specification
[
txt
,
bib
]
Roger Dingledine
, Nick Mathewson
Miscellaneous
Tor: The Second-Generation Onion Router
[
pdf
,
bib
]
Roger Dingledine
, Nick Mathewson, Paul Syverson
In Proc. of:
USENIX Security
, 2004, USENIX
Tor security advisory: “relay early” traffic confirmation attack
[
url
,
bib
]
Roger Dingledine
Miscellaneous
Did the FBI Pay a University to Attack Tor Users?
[
url
,
bib
]
Roger Dingledine
Miscellaneous
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
bib
]
Marc Juarez, Sadia Afroz, Gunes Acar,
Claudia Diaz
, Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
SybilInfer: Detecting Sybil Nodes using Social Networks
[
pdf
,
bib
]
George Danezis
, Prateek Mittal
In Proc. of:
NDSS
, 2009, The Internet Society
SybilControl: Practical Sybil Defense with Computational Puzzles
[
pdf
,
bib
]
Frank Li, Prateek Mittal,
Matthew Caesar
, Nikita Borisov
In Proc. of:
Scalable Trusted Computing
, 2012, ACM
Computational Puzzles as Sybil Defenses
[
pdf
,
bib
]
Nikita Borisov
In Proc. of:
Peer-to-Peer Computing
, 2005, IEEE
SybilControl: Practical Sybil Defense with Computational Puzzles
[
pdf
,
bib
]
Frank Li, Prateek Mittal, Matthew Caesar,
Nikita Borisov
In Proc. of:
Scalable Trusted Computing
, 2012, ACM
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
[
pdf
,
bib
]
Alex Biryukov
, Ivan Pustogarov, Ralf-Philipp Weinmann
In Proc. of:
Security & Privacy
, 2013, IEEE
Topology Inference from BGP Routing Dynamics
[
pdf
,
bib
]
David G. Andersen, Nick Feamster,
Steve Bauer
, Hari Balakrishnan
In Proc. of:
Internet Measurement Workshop
, 2002, ACM
No more than one server per IP address
[
txt
,
bib
]
Kevin Bauer
, Damon McCoy
Miscellaneous
Low-Resource Routing Attacks Against Tor
[
pdf
,
bib
]
Kevin Bauer
, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
In Proc. of:
WPES
, 2007, ACM
Topology Inference from BGP Routing Dynamics
[
pdf
,
bib
]
David G. Andersen, Nick Feamster, Steve Bauer,
Hari Balakrishnan
In Proc. of:
Internet Measurement Workshop
, 2002, ACM
Topology Inference from BGP Routing Dynamics
[
pdf
,
bib
]
David G. Andersen
, Nick Feamster, Steve Bauer, Hari Balakrishnan
In Proc. of:
Internet Measurement Workshop
, 2002, ACM
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
bib
]
Marc Juarez,
Sadia Afroz
, Gunes Acar, Claudia Diaz, Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
bib
]
Marc Juarez, Sadia Afroz,
Gunes Acar
, Claudia Diaz, Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
Bibliography generated by
bibliograpy
.