@book{Schreiber1973, author = {Flora Rheta Schreiber}, publisher = {Henry Regnery}, year = {1973}, title = {Sybil: The true story of a woman possessed by 16 separate personalities}, }
@article{Levenshtein1966a, author = {Vladimir Iosifovich Levenshtein}, title = {Binary Codes Capable of Correcting Deletions, Insertions, and Reversals}, url = {https://nymity.ch/sybilhunting/pdf/Levenshtein1966a.pdf}, journal = {Soviet Physics-Doklady}, number = {8}, volume = {10}, year = {1966}, }
@article{Ling2015a, author = {Zhen Ling and Junzhou Luo and Kui Wu and Wei Yu and Xinwen Fu}, title = {{T}or{W}ard: Discovery, Blocking, and Traceback of Malicious Traffic Over {T}or}, url = {https://nymity.ch/sybilhunting/pdf/Ling2015a.pdf}, journal = {IEEE Transactions on Information Forensics and Security}, number = {12}, volume = {10}, year = {2015}, }
@misc{i2p, author = {}, url = {https://geti2p.net}, title = {The Invisible {I}nternet Project}, }
@misc{scallion, author = {Eric Swanson}, url = {https://github.com/lachesis/scallion}, title = {{GPU}-based Onion Hash generator}, }
@misc{path-spec, author = {Roger Dingledine and Nick Mathewson}, url = {https://gitweb.torproject.org/torspec.git/tree/path-spec.txt}, title = {{T}or Path Specification}, }
@misc{lizards, author = {}, month = {December}, url = {https://lists.torproject.org/pipermail/tor-talk/2014-December/036197.html}, year = {2014}, title = {Lizards}, }
@inproceedings{Dingledine2004a, author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, url = {https://nymity.ch/sybilhunting/pdf/Dingledine2004a.pdf}, publisher = {USENIX}, booktitle = {USENIX Security}, year = {2004}, title = {{T}or: The Second-Generation Onion Router}, }
@inproceedings{Konte2015a, author = {Maria Konte and Roberto Perdisci and Nick Feamster}, url = {https://nymity.ch/sybilhunting/pdf/Konte2015a.pdf}, publisher = {ACM}, booktitle = {SIGCOMM}, year = {2015}, title = {{AS}watch: An {AS} Reputation System to Expose Bulletproof Hosting {AS}es}, }
@article{Pike1983a, author = {Rob Pike and Brian W. Kernighan}, title = {Program Design in the {UNIX} System Environment}, url = {https://nymity.ch/sybilhunting/pdf/Pike1983a.pdf}, journal = {Bell Labs Technical Journal}, number = {8}, volume = {63}, year = {1983}, }
@misc{skynet, author = {nex}, month = {December}, url = {https://community.rapid7.com/community/infosec/blog/2012/12/06/skynet-a-tor-powered-botnet-straight-from-reddit}, year = {2012}, title = {{S}kynet, a {T}or-powered botnet straight from {R}eddit}, }
@misc{sefnit, author = {{msft-mmpc}}, month = {January}, url = {https://blogs.technet.microsoft.com/mmpc/2014/01/09/tackling-the-sefnit-botnet-tor-hazard/}, year = {2014}, title = {Tackling the {S}efnit botnet {T}or hazard}, }
@misc{Bauer2007b, author = {Kevin Bauer and Damon McCoy}, month = {March}, url = {https://gitweb.torproject.org/torspec.git/tree/proposals/109-no-sharing-ips.txt}, year = {2007}, title = {No more than one server per {IP} address}, }
@techreport{Levine2006a, author = {Brian Neil Levine and Clay Shields and N. Boris Margolin}, url = {https://nymity.ch/sybilhunting/pdf/Levine2006a.pdf}, year = {2006}, institution = {University of Massachusetts Amherst}, title = {A Survey of Solutions to the {S}ybil Attack}, }
@inproceedings{Yu2008a, author = {Haifeng Yu and Phillip B. Gibbons Michael Kaminsky and Feng Xiao}, url = {https://nymity.ch/sybilhunting/pdf/Yu2008a.pdf}, publisher = {IEEE}, booktitle = {Security \& Privacy}, year = {2008}, title = {{S}ybil{L}imit: A Near-Optimal Social Network Defense against {S}ybil Attacks}, }
@inproceedings{Thomas2012a, author = {Kurt Thomas and Chris Grier and Vern Paxson}, url = {https://nymity.ch/sybilhunting/pdf/Thomas2012a.pdf}, publisher = {USENIX}, booktitle = {LEET}, year = {2012}, title = {Adapting Social Spam Infrastructure for Political Censorship}, }
@inproceedings{Johnson2013a, author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul Syverson}, url = {https://nymity.ch/sybilhunting/pdf/Johnson2013a.pdf}, publisher = {ACM}, booktitle = {CCS}, year = {2013}, title = {Users Get Routed: Traffic Correlation on {T}or by Realistic Adversaries}, }
@inproceedings{Juarez2014a, author = {Marc Juarez and Sadia Afroz and Gunes Acar and Claudia Diaz and Rachel Greenstadt}, url = {https://nymity.ch/sybilhunting/pdf/Juarez2014a.pdf}, publisher = {ACM}, booktitle = {CCS}, year = {2014}, title = {A Critical Evaluation of Website Fingerprinting Attacks}, }
@misc{Fifield2014a, author = {David Fifield}, url = {https://bugs.torproject.org/12813}, year = {2014}, title = {\#12813---Look at a bitmap visualization of relay consensus}, }
@inproceedings{Wang2012a, author = {Liang Wang and Jussi Kangasharju}, url = {https://nymity.ch/sybilhunting/pdf/Wang2012a.pdf}, publisher = {IEEE}, booktitle = {Globecom}, year = {2012}, title = {Real-World {S}ybil Attacks in {B}it{T}orrent Mainline {DHT}}, }
@article{Ling2015b, author = {Zhen Ling and Junzhou Luo and Wei Yu and Ming Yang and Xinwen Fu}, title = {{T}or Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation}, url = {https://nymity.ch/sybilhunting/pdf/Ling2015b.pdf}, journal = {IEEE Transactions on Parallel and Distributed Systems}, number = {7}, volume = {26}, year = {2015}, }
@misc{cmucert, author = {Roger Dingledine}, month = {July}, url = {https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack}, year = {2014}, title = {{T}or security advisory: ``relay early'' traffic confirmation attack}, }
@misc{cmucert2, author = {Roger Dingledine}, month = {November}, url = {https://blog.torproject.org/blog/did-fbi-pay-university-attack-tor-users}, year = {2015}, title = {Did the {FBI} Pay a University to Attack {T}or Users?}, }
@misc{doctor, author = {Damian Johnson}, url = {https://gitweb.torproject.org/doctor.git/tree/}, title = {doctor -- service that periodically checks the {T}or network for consensus conflicts and other hiccups}, }
@misc{zoossh, author = {Philipp Winter}, url = {https://gitweb.torproject.org/user/phw/zoossh.git/}, title = {zoossh -- {P}arsing library for {T}or-specific data formats}, }
@inproceedings{Biryukov2013a, author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann}, url = {https://nymity.ch/sybilhunting/pdf/Biryukov2013a.pdf}, publisher = {IEEE}, booktitle = {Security \& Privacy}, year = {2013}, title = {Trawling for {T}or Hidden Services: Detection, Measurement, Deanonymization}, }
@inproceedings{Godfrey2006a, author = {P. Brighten Godfrey and Scott Shenker and Ion Stoica}, url = {https://nymity.ch/sybilhunting/pdf/Godfrey2006a.pdf}, publisher = {ACM}, booktitle = {SIGCOMM}, year = {2006}, title = {Minimizing Churn in Distributed Systems}, }
@inproceedings{Yu2006a, author = {Haifeng Yu and Michael Kaminsky and Phillip B. Gibbons and Abraham Flaxman}, url = {https://nymity.ch/sybilhunting/pdf/Yu2006a.pdf}, publisher = {ACM}, booktitle = {SIGCOMM}, year = {2006}, title = {{S}ybil{G}uard: Defending Against {S}ybil Attack via Social Networks}, }
@inproceedings{Danezis2009a, author = {George Danezis and Prateek Mittal}, url = {https://nymity.ch/sybilhunting/pdf/Danezis2009a.pdf}, publisher = {The Internet Society}, booktitle = {NDSS}, year = {2009}, title = {{S}ybil{I}nfer: Detecting {S}ybil Nodes using Social Networks}, }
@inproceedings{Borisov2006a, author = {Nikita Borisov}, url = {https://nymity.ch/sybilhunting/pdf/Borisov2006a.pdf}, publisher = {IEEE}, booktitle = {Peer-to-Peer Computing}, year = {2005}, title = {Computational Puzzles as {S}ybil Defenses}, }
@inproceedings{Li2012a, author = {Frank Li and Prateek Mittal and Matthew Caesar and Nikita Borisov}, url = {https://nymity.ch/sybilhunting/pdf/Li2012a.pdf}, publisher = {ACM}, booktitle = {Scalable Trusted Computing}, year = {2012}, title = {{S}ybil{C}ontrol: Practical {S}ybil Defense with Computational Puzzles}, }
@misc{progressreport, author = {Andrew Lewman}, month = {June}, url = {https://blog.torproject.org/blog/june-2010-progress-report}, year = {2010}, title = {June 2010 Progress Report}, }
@inproceedings{Winter2014a, author = {Philipp Winter and Richard K\"{o}wer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar Weippl}, url = {https://nymity.ch/sybilhunting/pdf/Winter2014a.pdf}, publisher = {Springer}, booktitle = {PETS}, year = {2014}, title = {{S}poiled {O}nions: Exposing Malicious {T}or Exit Relays}, }
@inproceedings{Douceur2002a, author = {John R. Douceur}, url = {https://nymity.ch/sybilhunting/pdf/Douceur2002a.pdf}, booktitle = {Peer-to-Peer Systems}, year = {2002}, title = {The {S}ybil Attack}, }
@misc{collector, author = {{The Tor Project}}, url = {https://collector.torproject.org/}, title = {{C}ollec{T}or -- Your friendly data-collecting service in the {T}or network}, }
@inproceedings{Bauer2007a, author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker}, url = {https://nymity.ch/sybilhunting/pdf/Bauer2007a.pdf}, publisher = {ACM}, booktitle = {WPES}, year = {2007}, title = {Low-Resource Routing Attacks Against {T}or}, }
@inproceedings{Andersen2002a, author = {David G. Andersen and Nick Feamster and Steve Bauer and Hari Balakrishnan}, url = {https://nymity.ch/sybilhunting/pdf/Andersen2002a.pdf}, publisher = {ACM}, booktitle = {Internet Measurement Workshop}, year = {2002}, title = {Topology Inference from {BGP} Routing Dynamics}, }
@misc{sslstrip, author = {Moxie Marlinspike}, url = {https://moxie.org/software/sslstrip/}, title = {sslstrip}, }
@misc{metrics, author = {{The Tor Project}}, url = {https://metrics.torproject.org}, title = {{T}or Metrics}, }