@book{Schreiber1973,
author = {Flora Rheta Schreiber},
publisher = {Henry Regnery},
year = {1973},
title = {Sybil: The true story of a woman possessed by 16 separate personalities},
}
@article{Levenshtein1966a,
author = {Vladimir Iosifovich Levenshtein},
title = {Binary Codes Capable of Correcting Deletions, Insertions, and Reversals},
url = {https://nymity.ch/sybilhunting/pdf/Levenshtein1966a.pdf},
journal = {Soviet Physics-Doklady},
number = {8},
volume = {10},
year = {1966},
}
@article{Ling2015a,
author = {Zhen Ling and Junzhou Luo and Kui Wu and Wei Yu and Xinwen Fu},
title = {{T}or{W}ard: Discovery, Blocking, and Traceback of Malicious Traffic Over {T}or},
url = {https://nymity.ch/sybilhunting/pdf/Ling2015a.pdf},
journal = {IEEE Transactions on Information Forensics and Security},
number = {12},
volume = {10},
year = {2015},
}
@misc{i2p,
author = {},
url = {https://geti2p.net},
title = {The Invisible {I}nternet Project},
}
@misc{scallion,
author = {Eric Swanson},
url = {https://github.com/lachesis/scallion},
title = {{GPU}-based Onion Hash generator},
}
@misc{path-spec,
author = {Roger Dingledine and Nick Mathewson},
url = {https://gitweb.torproject.org/torspec.git/tree/path-spec.txt},
title = {{T}or Path Specification},
}
@misc{lizards,
author = {},
month = {December},
url = {https://lists.torproject.org/pipermail/tor-talk/2014-December/036197.html},
year = {2014},
title = {Lizards},
}
@inproceedings{Dingledine2004a,
author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
url = {https://nymity.ch/sybilhunting/pdf/Dingledine2004a.pdf},
publisher = {USENIX},
booktitle = {USENIX Security},
year = {2004},
title = {{T}or: The Second-Generation Onion Router},
}
@inproceedings{Konte2015a,
author = {Maria Konte and Roberto Perdisci and Nick Feamster},
url = {https://nymity.ch/sybilhunting/pdf/Konte2015a.pdf},
publisher = {ACM},
booktitle = {SIGCOMM},
year = {2015},
title = {{AS}watch: An {AS} Reputation System to Expose Bulletproof Hosting {AS}es},
}
@article{Pike1983a,
author = {Rob Pike and Brian W. Kernighan},
title = {Program Design in the {UNIX} System Environment},
url = {https://nymity.ch/sybilhunting/pdf/Pike1983a.pdf},
journal = {Bell Labs Technical Journal},
number = {8},
volume = {63},
year = {1983},
}
@misc{skynet,
author = {nex},
month = {December},
url = {https://community.rapid7.com/community/infosec/blog/2012/12/06/skynet-a-tor-powered-botnet-straight-from-reddit},
year = {2012},
title = {{S}kynet, a {T}or-powered botnet straight from {R}eddit},
}
@misc{sefnit,
author = {{msft-mmpc}},
month = {January},
url = {https://blogs.technet.microsoft.com/mmpc/2014/01/09/tackling-the-sefnit-botnet-tor-hazard/},
year = {2014},
title = {Tackling the {S}efnit botnet {T}or hazard},
}
@misc{Bauer2007b,
author = {Kevin Bauer and Damon McCoy},
month = {March},
url = {https://gitweb.torproject.org/torspec.git/tree/proposals/109-no-sharing-ips.txt},
year = {2007},
title = {No more than one server per {IP} address},
}
@techreport{Levine2006a,
author = {Brian Neil Levine and Clay Shields and N. Boris Margolin},
url = {https://nymity.ch/sybilhunting/pdf/Levine2006a.pdf},
year = {2006},
institution = {University of Massachusetts Amherst},
title = {A Survey of Solutions to the {S}ybil Attack},
}
@inproceedings{Yu2008a,
author = {Haifeng Yu and Phillip B. Gibbons Michael Kaminsky and Feng Xiao},
url = {https://nymity.ch/sybilhunting/pdf/Yu2008a.pdf},
publisher = {IEEE},
booktitle = {Security \& Privacy},
year = {2008},
title = {{S}ybil{L}imit: A Near-Optimal Social Network Defense against {S}ybil Attacks},
}
@inproceedings{Thomas2012a,
author = {Kurt Thomas and Chris Grier and Vern Paxson},
url = {https://nymity.ch/sybilhunting/pdf/Thomas2012a.pdf},
publisher = {USENIX},
booktitle = {LEET},
year = {2012},
title = {Adapting Social Spam Infrastructure for Political Censorship},
}
@inproceedings{Johnson2013a,
author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul Syverson},
url = {https://nymity.ch/sybilhunting/pdf/Johnson2013a.pdf},
publisher = {ACM},
booktitle = {CCS},
year = {2013},
title = {Users Get Routed: Traffic Correlation on {T}or by Realistic Adversaries},
}
@inproceedings{Juarez2014a,
author = {Marc Juarez and Sadia Afroz and Gunes Acar and Claudia Diaz and Rachel Greenstadt},
url = {https://nymity.ch/sybilhunting/pdf/Juarez2014a.pdf},
publisher = {ACM},
booktitle = {CCS},
year = {2014},
title = {A Critical Evaluation of Website Fingerprinting Attacks},
}
@misc{Fifield2014a,
author = {David Fifield},
url = {https://bugs.torproject.org/12813},
year = {2014},
title = {\#12813---Look at a bitmap visualization of relay consensus},
}
@inproceedings{Wang2012a,
author = {Liang Wang and Jussi Kangasharju},
url = {https://nymity.ch/sybilhunting/pdf/Wang2012a.pdf},
publisher = {IEEE},
booktitle = {Globecom},
year = {2012},
title = {Real-World {S}ybil Attacks in {B}it{T}orrent Mainline {DHT}},
}
@article{Ling2015b,
author = {Zhen Ling and Junzhou Luo and Wei Yu and Ming Yang and Xinwen Fu},
title = {{T}or Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation},
url = {https://nymity.ch/sybilhunting/pdf/Ling2015b.pdf},
journal = {IEEE Transactions on Parallel and Distributed Systems},
number = {7},
volume = {26},
year = {2015},
}
@misc{cmucert,
author = {Roger Dingledine},
month = {July},
url = {https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack},
year = {2014},
title = {{T}or security advisory: ``relay early'' traffic confirmation attack},
}
@misc{cmucert2,
author = {Roger Dingledine},
month = {November},
url = {https://blog.torproject.org/blog/did-fbi-pay-university-attack-tor-users},
year = {2015},
title = {Did the {FBI} Pay a University to Attack {T}or Users?},
}
@misc{doctor,
author = {Damian Johnson},
url = {https://gitweb.torproject.org/doctor.git/tree/},
title = {doctor -- service that periodically checks the {T}or network for consensus conflicts and other hiccups},
}
@misc{zoossh,
author = {Philipp Winter},
url = {https://gitweb.torproject.org/user/phw/zoossh.git/},
title = {zoossh -- {P}arsing library for {T}or-specific data formats},
}
@inproceedings{Biryukov2013a,
author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann},
url = {https://nymity.ch/sybilhunting/pdf/Biryukov2013a.pdf},
publisher = {IEEE},
booktitle = {Security \& Privacy},
year = {2013},
title = {Trawling for {T}or Hidden Services: Detection, Measurement, Deanonymization},
}
@inproceedings{Godfrey2006a,
author = {P. Brighten Godfrey and Scott Shenker and Ion Stoica},
url = {https://nymity.ch/sybilhunting/pdf/Godfrey2006a.pdf},
publisher = {ACM},
booktitle = {SIGCOMM},
year = {2006},
title = {Minimizing Churn in Distributed Systems},
}
@inproceedings{Yu2006a,
author = {Haifeng Yu and Michael Kaminsky and Phillip B. Gibbons and Abraham Flaxman},
url = {https://nymity.ch/sybilhunting/pdf/Yu2006a.pdf},
publisher = {ACM},
booktitle = {SIGCOMM},
year = {2006},
title = {{S}ybil{G}uard: Defending Against {S}ybil Attack via Social Networks},
}
@inproceedings{Danezis2009a,
author = {George Danezis and Prateek Mittal},
url = {https://nymity.ch/sybilhunting/pdf/Danezis2009a.pdf},
publisher = {The Internet Society},
booktitle = {NDSS},
year = {2009},
title = {{S}ybil{I}nfer: Detecting {S}ybil Nodes using Social Networks},
}
@inproceedings{Borisov2006a,
author = {Nikita Borisov},
url = {https://nymity.ch/sybilhunting/pdf/Borisov2006a.pdf},
publisher = {IEEE},
booktitle = {Peer-to-Peer Computing},
year = {2005},
title = {Computational Puzzles as {S}ybil Defenses},
}
@inproceedings{Li2012a,
author = {Frank Li and Prateek Mittal and Matthew Caesar and Nikita Borisov},
url = {https://nymity.ch/sybilhunting/pdf/Li2012a.pdf},
publisher = {ACM},
booktitle = {Scalable Trusted Computing},
year = {2012},
title = {{S}ybil{C}ontrol: Practical {S}ybil Defense with Computational Puzzles},
}
@misc{progressreport,
author = {Andrew Lewman},
month = {June},
url = {https://blog.torproject.org/blog/june-2010-progress-report},
year = {2010},
title = {June 2010 Progress Report},
}
@inproceedings{Winter2014a,
author = {Philipp Winter and Richard K\"{o}wer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar Weippl},
url = {https://nymity.ch/sybilhunting/pdf/Winter2014a.pdf},
publisher = {Springer},
booktitle = {PETS},
year = {2014},
title = {{S}poiled {O}nions: Exposing Malicious {T}or Exit Relays},
}
@inproceedings{Douceur2002a,
author = {John R. Douceur},
url = {https://nymity.ch/sybilhunting/pdf/Douceur2002a.pdf},
booktitle = {Peer-to-Peer Systems},
year = {2002},
title = {The {S}ybil Attack},
}
@misc{collector,
author = {{The Tor Project}},
url = {https://collector.torproject.org/},
title = {{C}ollec{T}or -- Your friendly data-collecting service in the {T}or network},
}
@inproceedings{Bauer2007a,
author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
url = {https://nymity.ch/sybilhunting/pdf/Bauer2007a.pdf},
publisher = {ACM},
booktitle = {WPES},
year = {2007},
title = {Low-Resource Routing Attacks Against {T}or},
}
@inproceedings{Andersen2002a,
author = {David G. Andersen and Nick Feamster and Steve Bauer and Hari Balakrishnan},
url = {https://nymity.ch/sybilhunting/pdf/Andersen2002a.pdf},
publisher = {ACM},
booktitle = {Internet Measurement Workshop},
year = {2002},
title = {Topology Inference from {BGP} Routing Dynamics},
}
@misc{sslstrip,
author = {Moxie Marlinspike},
url = {https://moxie.org/software/sslstrip/},
title = {sslstrip},
}
@misc{metrics,
author = {{The Tor Project}},
url = {https://metrics.torproject.org},
title = {{T}or Metrics},
}