@book{Schreiber1973,
  author = {Flora Rheta Schreiber},
  publisher = {Henry Regnery},
  year = {1973},
  title = {Sybil: The true story of a woman possessed by 16 separate personalities},
}
@article{Levenshtein1966a,
  author = {Vladimir Iosifovich Levenshtein},
  title = {Binary Codes Capable of Correcting Deletions, Insertions, and Reversals},
  url = {https://nymity.ch/sybilhunting/pdf/Levenshtein1966a.pdf},
  journal = {Soviet Physics-Doklady},
  number = {8},
  volume = {10},
  year = {1966},
}
@article{Ling2015a,
  author = {Zhen Ling and Junzhou Luo and Kui Wu and Wei Yu and Xinwen Fu},
  title = {{T}or{W}ard: Discovery, Blocking, and Traceback of Malicious Traffic Over {T}or},
  url = {https://nymity.ch/sybilhunting/pdf/Ling2015a.pdf},
  journal = {IEEE Transactions on Information Forensics and Security},
  number = {12},
  volume = {10},
  year = {2015},
}
@misc{i2p,
  author = {},
  url = {https://geti2p.net},
  title = {The Invisible {I}nternet Project},
}
@misc{scallion,
  author = {Eric Swanson},
  url = {https://github.com/lachesis/scallion},
  title = {{GPU}-based Onion Hash generator},
}
@misc{path-spec,
  author = {Roger Dingledine and Nick Mathewson},
  url = {https://gitweb.torproject.org/torspec.git/tree/path-spec.txt},
  title = {{T}or Path Specification},
}
@misc{lizards,
  author = {},
  month = {December},
  url = {https://lists.torproject.org/pipermail/tor-talk/2014-December/036197.html},
  year = {2014},
  title = {Lizards},
}
@inproceedings{Dingledine2004a,
  author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  url = {https://nymity.ch/sybilhunting/pdf/Dingledine2004a.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security},
  year = {2004},
  title = {{T}or: The Second-Generation Onion Router},
}
@inproceedings{Konte2015a,
  author = {Maria Konte and Roberto Perdisci and Nick Feamster},
  url = {https://nymity.ch/sybilhunting/pdf/Konte2015a.pdf},
  publisher = {ACM},
  booktitle = {SIGCOMM},
  year = {2015},
  title = {{AS}watch: An {AS} Reputation System to Expose Bulletproof Hosting {AS}es},
}
@article{Pike1983a,
  author = {Rob Pike and Brian W. Kernighan},
  title = {Program Design in the {UNIX} System Environment},
  url = {https://nymity.ch/sybilhunting/pdf/Pike1983a.pdf},
  journal = {Bell Labs Technical Journal},
  number = {8},
  volume = {63},
  year = {1983},
}
@misc{skynet,
  author = {nex},
  month = {December},
  url = {https://community.rapid7.com/community/infosec/blog/2012/12/06/skynet-a-tor-powered-botnet-straight-from-reddit},
  year = {2012},
  title = {{S}kynet, a {T}or-powered botnet straight from {R}eddit},
}
@misc{sefnit,
  author = {{msft-mmpc}},
  month = {January},
  url = {https://blogs.technet.microsoft.com/mmpc/2014/01/09/tackling-the-sefnit-botnet-tor-hazard/},
  year = {2014},
  title = {Tackling the {S}efnit botnet {T}or hazard},
}
@misc{Bauer2007b,
  author = {Kevin Bauer and Damon McCoy},
  month = {March},
  url = {https://gitweb.torproject.org/torspec.git/tree/proposals/109-no-sharing-ips.txt},
  year = {2007},
  title = {No more than one server per {IP} address},
}
@techreport{Levine2006a,
  author = {Brian Neil Levine and Clay Shields and N. Boris Margolin},
  url = {https://nymity.ch/sybilhunting/pdf/Levine2006a.pdf},
  year = {2006},
  institution = {University of Massachusetts Amherst},
  title = {A Survey of Solutions to the {S}ybil Attack},
}
@inproceedings{Yu2008a,
  author = {Haifeng Yu and Phillip B. Gibbons Michael Kaminsky and Feng Xiao},
  url = {https://nymity.ch/sybilhunting/pdf/Yu2008a.pdf},
  publisher = {IEEE},
  booktitle = {Security \& Privacy},
  year = {2008},
  title = {{S}ybil{L}imit: A Near-Optimal Social Network Defense against {S}ybil Attacks},
}
@inproceedings{Thomas2012a,
  author = {Kurt Thomas and Chris Grier and Vern Paxson},
  url = {https://nymity.ch/sybilhunting/pdf/Thomas2012a.pdf},
  publisher = {USENIX},
  booktitle = {LEET},
  year = {2012},
  title = {Adapting Social Spam Infrastructure for Political Censorship},
}
@inproceedings{Johnson2013a,
  author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul Syverson},
  url = {https://nymity.ch/sybilhunting/pdf/Johnson2013a.pdf},
  publisher = {ACM},
  booktitle = {CCS},
  year = {2013},
  title = {Users Get Routed: Traffic Correlation on {T}or by Realistic Adversaries},
}
@inproceedings{Juarez2014a,
  author = {Marc Juarez and Sadia Afroz and Gunes Acar and Claudia Diaz and Rachel Greenstadt},
  url = {https://nymity.ch/sybilhunting/pdf/Juarez2014a.pdf},
  publisher = {ACM},
  booktitle = {CCS},
  year = {2014},
  title = {A Critical Evaluation of Website Fingerprinting Attacks},
}
@misc{Fifield2014a,
  author = {David Fifield},
  url = {https://bugs.torproject.org/12813},
  year = {2014},
  title = {\#12813---Look at a bitmap visualization of relay consensus},
}
@inproceedings{Wang2012a,
  author = {Liang Wang and Jussi Kangasharju},
  url = {https://nymity.ch/sybilhunting/pdf/Wang2012a.pdf},
  publisher = {IEEE},
  booktitle = {Globecom},
  year = {2012},
  title = {Real-World {S}ybil Attacks in {B}it{T}orrent Mainline {DHT}},
}
@article{Ling2015b,
  author = {Zhen Ling and Junzhou Luo and Wei Yu and Ming Yang and Xinwen Fu},
  title = {{T}or Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation},
  url = {https://nymity.ch/sybilhunting/pdf/Ling2015b.pdf},
  journal = {IEEE Transactions on Parallel and Distributed Systems},
  number = {7},
  volume = {26},
  year = {2015},
}
@misc{cmucert,
  author = {Roger Dingledine},
  month = {July},
  url = {https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack},
  year = {2014},
  title = {{T}or security advisory: ``relay early'' traffic confirmation attack},
}
@misc{cmucert2,
  author = {Roger Dingledine},
  month = {November},
  url = {https://blog.torproject.org/blog/did-fbi-pay-university-attack-tor-users},
  year = {2015},
  title = {Did the {FBI} Pay a University to Attack {T}or Users?},
}
@misc{doctor,
  author = {Damian Johnson},
  url = {https://gitweb.torproject.org/doctor.git/tree/},
  title = {doctor -- service that periodically checks the {T}or network for consensus conflicts and other hiccups},
}
@misc{zoossh,
  author = {Philipp Winter},
  url = {https://gitweb.torproject.org/user/phw/zoossh.git/},
  title = {zoossh -- {P}arsing library for {T}or-specific data formats},
}
@inproceedings{Biryukov2013a,
  author = {Alex Biryukov and Ivan Pustogarov and Ralf-Philipp Weinmann},
  url = {https://nymity.ch/sybilhunting/pdf/Biryukov2013a.pdf},
  publisher = {IEEE},
  booktitle = {Security \& Privacy},
  year = {2013},
  title = {Trawling for {T}or Hidden Services: Detection, Measurement, Deanonymization},
}
@inproceedings{Godfrey2006a,
  author = {P. Brighten Godfrey and Scott Shenker and Ion Stoica},
  url = {https://nymity.ch/sybilhunting/pdf/Godfrey2006a.pdf},
  publisher = {ACM},
  booktitle = {SIGCOMM},
  year = {2006},
  title = {Minimizing Churn in Distributed Systems},
}
@inproceedings{Yu2006a,
  author = {Haifeng Yu and Michael Kaminsky and Phillip B. Gibbons and Abraham Flaxman},
  url = {https://nymity.ch/sybilhunting/pdf/Yu2006a.pdf},
  publisher = {ACM},
  booktitle = {SIGCOMM},
  year = {2006},
  title = {{S}ybil{G}uard: Defending Against {S}ybil Attack via Social Networks},
}
@inproceedings{Danezis2009a,
  author = {George Danezis and Prateek Mittal},
  url = {https://nymity.ch/sybilhunting/pdf/Danezis2009a.pdf},
  publisher = {The Internet Society},
  booktitle = {NDSS},
  year = {2009},
  title = {{S}ybil{I}nfer: Detecting {S}ybil Nodes using Social Networks},
}
@inproceedings{Borisov2006a,
  author = {Nikita Borisov},
  url = {https://nymity.ch/sybilhunting/pdf/Borisov2006a.pdf},
  publisher = {IEEE},
  booktitle = {Peer-to-Peer Computing},
  year = {2005},
  title = {Computational Puzzles as {S}ybil Defenses},
}
@inproceedings{Li2012a,
  author = {Frank Li and Prateek Mittal and Matthew Caesar and Nikita Borisov},
  url = {https://nymity.ch/sybilhunting/pdf/Li2012a.pdf},
  publisher = {ACM},
  booktitle = {Scalable Trusted Computing},
  year = {2012},
  title = {{S}ybil{C}ontrol: Practical {S}ybil Defense with Computational Puzzles},
}
@misc{progressreport,
  author = {Andrew Lewman},
  month = {June},
  url = {https://blog.torproject.org/blog/june-2010-progress-report},
  year = {2010},
  title = {June 2010 Progress Report},
}
@inproceedings{Winter2014a,
  author = {Philipp Winter and Richard K\"{o}wer and Martin Mulazzani and Markus Huber and Sebastian Schrittwieser and Stefan Lindskog and Edgar Weippl},
  url = {https://nymity.ch/sybilhunting/pdf/Winter2014a.pdf},
  publisher = {Springer},
  booktitle = {PETS},
  year = {2014},
  title = {{S}poiled {O}nions: Exposing Malicious {T}or Exit Relays},
}
@inproceedings{Douceur2002a,
  author = {John R. Douceur},
  url = {https://nymity.ch/sybilhunting/pdf/Douceur2002a.pdf},
  booktitle = {Peer-to-Peer Systems},
  year = {2002},
  title = {The {S}ybil Attack},
}
@misc{collector,
  author = {{The Tor Project}},
  url = {https://collector.torproject.org/},
  title = {{C}ollec{T}or -- Your friendly data-collecting service in the {T}or network},
}
@inproceedings{Bauer2007a,
  author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
  url = {https://nymity.ch/sybilhunting/pdf/Bauer2007a.pdf},
  publisher = {ACM},
  booktitle = {WPES},
  year = {2007},
  title = {Low-Resource Routing Attacks Against {T}or},
}
@inproceedings{Andersen2002a,
  author = {David G. Andersen and Nick Feamster and Steve Bauer and Hari Balakrishnan},
  url = {https://nymity.ch/sybilhunting/pdf/Andersen2002a.pdf},
  publisher = {ACM},
  booktitle = {Internet Measurement Workshop},
  year = {2002},
  title = {Topology Inference from {BGP} Routing Dynamics},
}
@misc{sslstrip,
  author = {Moxie Marlinspike},
  url = {https://moxie.org/software/sslstrip/},
  title = {sslstrip},
}
@misc{metrics,
  author = {{The Tor Project}},
  url = {https://metrics.torproject.org},
  title = {{T}or Metrics},
}