Open access bibliography for the paper
The Effect of DNS on Tor’s Anonymity
Sort by: (
reverse
)
year
, (
reverse
)
author
Website Fingerprinting in Onion Routing Based Anonymization Networls
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko, Lukas Niessen,
Andreas Zinnen
, Thomas Engel
In Proc. of:
WPES
, 2011, ACM
Website Fingerprinting at Internet Scale
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko, Fabian Lanze,
Andreas Zinnen
, Martin Henze, Jan Pennekamp, Klaus Wehrle, Thomas Engel
In Proc. of:
NDSS
, 2016, The Internet Society
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries
[
pdf
,
cached pdf
,
bib
]
Steven J. Murdoch, Piotr Zieliński
In Proc. of:
PET
, 2007, Springer
Connection-Oriented DNS to Improve Privacy and Security
[
pdf
,
cached pdf
,
bib
]
Liang Zhu
, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya
In Proc. of:
Security & Privacy
, 2015, IEEE
Touching from a Distance: Website Fingerprinting Attacks and Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai,
Xin Cheng Zhang
, Brijesh Joshi, Rob Johnson
In Proc. of:
CCS
, 2012, ACM
Measuring and Mitigating AS-level Adversaries Against Tor
[
pdf
,
cached pdf
,
bib
]
Rishab Nithyanand, Oleksii Starov,
Adva Zair
, Phillipa Gill, Michael Schapira
In Proc. of:
NDSS
, 2016, The Internet Society
Toward an Efficient Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz,
Matthew Wright
Miscellaneous
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
cached pdf
,
bib
]
Philipp Winter
, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
exitmap—A fast and modular scanner for Tor exit relays
[
url
,
bib
]
Philipp Winter
Miscellaneous
A Tale of the Tails: Power-Laws in Internet Measurements
[
pdf
,
cached pdf
,
bib
]
Aniket Mahanti, Niklas Carlsson, Anirban Mahanti, Martin Arlitt,
Carey Williamson
Article in:
IEEE Network
, 2013, IEEE
Connection-Oriented DNS to Improve Privacy and Security
[
pdf
,
cached pdf
,
bib
]
Liang Zhu, Zi Hu, John Heidemann,
Duane Wessels
, Allison Mankin, Nikita Somaiya
In Proc. of:
Security & Privacy
, 2015, IEEE
Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Na\"ıve-Bayes Classifier
[
pdf
,
cached pdf
,
bib
]
Dominik Herrmann,
Rolf Wendolsky
, Hannes Federrath
In Proc. of:
CCSW
, 2009, ACM
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
cached pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog,
Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
Website Fingerprinting at Internet Scale
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp,
Klaus Wehrle
, Thomas Engel
In Proc. of:
NDSS
, 2016, The Internet Society
Blocking-resistant Communication Through Domain Fronting
[
pdf
,
cached pdf
,
bib
]
David Fifield, Chang Lan, Rod Hynes,
Percy Wegmann
, Vern Paxson
Article in:
PoPETS
, 2015, De Gruyter Open
Website Fingerprinting: Attacks and Defenses
[
pdf
,
cached pdf
,
bib
]
Tao Wang
Ph.D thesis:
University of Waterloo
, 2015
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai, Rishab Nithyanand,
Tao Wang
, Rob Johnson, Ian Goldberg
In Proc. of:
CCS
, 2014, ACM
Improved Website Fingerprinting on Tor
[
pdf
,
cached pdf
,
bib
]
Tao Wang
, Ian Goldberg
In Proc. of:
WPES
, 2013, ACM
Effective Attacks and Provable Defenses for Website Fingerprinting
[
pdf
,
cached pdf
,
bib
]
Tao Wang
, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg
In Proc. of:
USENIX Security
, 2014, USENIX
On Realistically Attacking Tor with Website Fingerprinting
[
pdf
,
cached pdf
,
bib
]
Tao Wang
, Ian Goldberg
Article in:
PoPETs
, 2016, De Gruyter Open
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
cached pdf
,
bib
]
Aaron Johnson,
Chris Wacek
, Rob Jansen, Micah Sherr, Paul Syverson
In Proc. of:
CCS
, 2013, ACM
RAPTOR: Routing Attacks on Privacy in Tor
[
pdf
,
cached pdf
,
bib
]
Yixin Sun, Anne Edmundson,
Laurent Vanbever
, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
In Proc. of:
USENIX Security
, 2015, USENIX
RFC 7258 – Pervasive Monitoring Is an Attack
[
url
,
bib
]
Stephen Farrell,
Hannes Tschofenig
Miscellaneous
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
cached pdf
,
bib
]
Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr,
Paul Syverson
In Proc. of:
CCS
, 2013, ACM
Tor: The Second-Generation Onion Router
[
pdf
,
cached pdf
,
bib
]
Roger Dingledine, Nick Mathewson,
Paul Syverson
In Proc. of:
USENIX Security
, 2004, USENIX
Do You See What I See? Differential Treatment of Anonymous Users
[
pdf
,
cached pdf
,
bib
]
Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed,
Srikanth Sundaresan
, Damon McCoy, Vern Paxson, Steven J. Murdoch
In Proc. of:
NDSS
, 2016, The Internet Society
RAPTOR: Routing Attacks on Privacy in Tor
[
pdf
,
cached pdf
,
bib
]
Yixin Sun
, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
In Proc. of:
USENIX Security
, 2015, USENIX
Measuring and Mitigating AS-level Adversaries Against Tor
[
pdf
,
cached pdf
,
bib
]
Rishab Nithyanand,
Oleksii Starov
, Adva Zair, Phillipa Gill, Michael Schapira
In Proc. of:
NDSS
, 2016, The Internet Society
Connection-Oriented DNS to Improve Privacy and Security
[
pdf
,
cached pdf
,
bib
]
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin,
Nikita Somaiya
In Proc. of:
Security & Privacy
, 2015, IEEE
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
cached pdf
,
bib
]
Aaron Johnson, Chris Wacek, Rob Jansen,
Micah Sherr
, Paul Syverson
In Proc. of:
CCS
, 2013, ACM
Power-Law Distributions in Empirical Data
[
url
,
cached pdf
,
bib
]
Aaron Clauset,
Cosma Rohilla Shalizi
, Mark E. J. Newman
Article in:
SIAM Review
, 2009,
Alexa Top Sites
[
url
,
bib
]
Amazon Web Services
Miscellaneous
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
cached pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber,
Sebastian Schrittwieser
, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
Measuring and Mitigating AS-level Adversaries Against Tor
[
pdf
,
cached pdf
,
bib
]
Rishab Nithyanand, Oleksii Starov, Adva Zair, Phillipa Gill,
Michael Schapira
In Proc. of:
NDSS
, 2016, The Internet Society
Robust Methodologies for Modeling Web Click Distributions
[
pdf
,
cached pdf
,
bib
]
Kamal Ali,
Mark Scarr
In Proc. of:
WWW
, 2007, ACM
RAPTOR: Routing Attacks on Privacy in Tor
[
pdf
,
cached pdf
,
bib
]
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li,
Jennifer Rexford
, Mung Chiang, Prateek Mittal
In Proc. of:
USENIX Security
, 2015, USENIX
CollecTor
[
url
,
bib
]
The Tor Project
Miscellaneous
Tor Metrics–Top-10 countries by directly connecting users
[
html
,
bib
]
The Tor Project
Miscellaneous
powerlaw: A Python Package for Analysis of Heavy-Tailed Distributions
[
pdf
,
cached pdf
,
bib
]
Jeff Alstott, Ed Bullmore,
Dietmar Plenz
Article in:
PLoS ONE
, 2014,
The Interdomain Connectivity of PlanetLab Nodes
[
pdf
,
cached pdf
,
bib
]
Suman Banerjee, Timothy G. Griffin,
Marcelo Pias
In Proc. of:
PAM
, 2004, Springer
Toward an Efficient Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Marc Juarez, Mohsen Imani,
Mike Perry
, Claudia Diaz, Matthew Wright
Miscellaneous
Padding Negotiation
[
txt
,
bib
]
Mike Perry
Miscellaneous
Website Fingerprinting at Internet Scale
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze,
Jan Pennekamp
, Klaus Wehrle, Thomas Engel
In Proc. of:
NDSS
, 2016, The Internet Society
Blocking-resistant Communication Through Domain Fronting
[
pdf
,
cached pdf
,
bib
]
David Fifield, Chang Lan, Rod Hynes, Percy Wegmann,
Vern Paxson
Article in:
PoPETS
, 2015, De Gruyter Open
Do You See What I See? Differential Treatment of Anonymous Users
[
pdf
,
cached pdf
,
bib
]
Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy,
Vern Paxson
, Steven J. Murdoch
In Proc. of:
NDSS
, 2016, The Internet Society
Website Fingerprinting in Onion Routing Based Anonymization Networls
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko
, Lukas Niessen, Andreas Zinnen, Thomas Engel
In Proc. of:
WPES
, 2011, ACM
Website Fingerprinting at Internet Scale
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko
, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle, Thomas Engel
In Proc. of:
NDSS
, 2016, The Internet Society
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Xiang Cai,
Rishab Nithyanand
, Rob Johnson
In Proc. of:
WPES
, 2014, ACM
Measuring and Mitigating AS-level Adversaries Against Tor
[
pdf
,
cached pdf
,
bib
]
Rishab Nithyanand
, Oleksii Starov, Adva Zair, Phillipa Gill, Michael Schapira
In Proc. of:
NDSS
, 2016, The Internet Society
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai,
Rishab Nithyanand
, Tao Wang, Rob Johnson, Ian Goldberg
In Proc. of:
CCS
, 2014, ACM
Effective Attacks and Provable Defenses for Website Fingerprinting
[
pdf
,
cached pdf
,
bib
]
Tao Wang, Xiang Cai,
Rishab Nithyanand
, Rob Johnson, Ian Goldberg
In Proc. of:
USENIX Security
, 2014, USENIX
Website Fingerprinting in Onion Routing Based Anonymization Networls
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko,
Lukas Niessen
, Andreas Zinnen, Thomas Engel
In Proc. of:
WPES
, 2011, ACM
Power-Law Distributions in Empirical Data
[
url
,
cached pdf
,
bib
]
Aaron Clauset, Cosma Rohilla Shalizi,
Mark E. J. Newman
Article in:
SIAM Review
, 2009,
July 2016 Web Server Survey
[
html
,
bib
]
Netcraft
Miscellaneous
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries
[
pdf
,
cached pdf
,
bib
]
Steven J. Murdoch
, Piotr Zieliński
In Proc. of:
PET
, 2007, Springer
Do You See What I See? Differential Treatment of Anonymous Users
[
pdf
,
cached pdf
,
bib
]
Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson,
Steven J. Murdoch
In Proc. of:
NDSS
, 2016, The Internet Society
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
cached pdf
,
bib
]
Philipp Winter, Richard Köwer,
Martin Mulazzani
, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
RAPTOR: Routing Attacks on Privacy in Tor
[
pdf
,
cached pdf
,
bib
]
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang,
Prateek Mittal
In Proc. of:
USENIX Security
, 2015, USENIX
Do You See What I See? Differential Treatment of Anonymous Users
[
pdf
,
cached pdf
,
bib
]
Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan,
Damon McCoy
, Vern Paxson, Steven J. Murdoch
In Proc. of:
NDSS
, 2016, The Internet Society
Tor Protocol Specification
[
url
,
bib
]
Roger Dingledine,
Nick Mathewson
Miscellaneous
Tor: The Second-Generation Onion Router
[
pdf
,
cached pdf
,
bib
]
Roger Dingledine,
Nick Mathewson
, Paul Syverson
In Proc. of:
USENIX Security
, 2004, USENIX
Mixminion: Design of a Type III Anonymous Remailer Protocol
[
pdf
,
cached pdf
,
bib
]
George Danezis, Roger Dingledine,
Nick Mathewson
In Proc. of:
Security & Privacy
, 2003, IEEE
Remove Global Client-side DNS Caching
[
txt
,
bib
]
Nick Mathewson
Miscellaneous
Connection-Oriented DNS to Improve Privacy and Security
[
pdf
,
cached pdf
,
bib
]
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels,
Allison Mankin
, Nikita Somaiya
In Proc. of:
Security & Privacy
, 2015, IEEE
A Tale of the Tails: Power-Laws in Internet Measurements
[
pdf
,
cached pdf
,
bib
]
Aniket Mahanti
, Niklas Carlsson, Anirban Mahanti, Martin Arlitt, Carey Williamson
Article in:
IEEE Network
, 2013, IEEE
A Tale of the Tails: Power-Laws in Internet Measurements
[
pdf
,
cached pdf
,
bib
]
Aniket Mahanti, Niklas Carlsson,
Anirban Mahanti
, Martin Arlitt, Carey Williamson
Article in:
IEEE Network
, 2013, IEEE
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
cached pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser,
Stefan Lindskog
, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
RAPTOR: Routing Attacks on Privacy in Tor
[
pdf
,
cached pdf
,
bib
]
Yixin Sun, Anne Edmundson, Laurent Vanbever,
Oscar Li
, Jennifer Rexford, Mung Chiang, Prateek Mittal
In Proc. of:
USENIX Security
, 2015, USENIX
Website Fingerprinting at Internet Scale
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko,
Fabian Lanze
, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle, Thomas Engel
In Proc. of:
NDSS
, 2016, The Internet Society
Blocking-resistant Communication Through Domain Fronting
[
pdf
,
cached pdf
,
bib
]
David Fifield,
Chang Lan
, Rod Hynes, Percy Wegmann, Vern Paxson
Article in:
PoPETS
, 2015, De Gruyter Open
Ethical Tor Research: Guidelines
[
url
,
bib
]
Kate Krauss
Miscellaneous
Do You See What I See? Differential Treatment of Anonymous Users
[
pdf
,
cached pdf
,
bib
]
Sheharbano Khattak
, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch
In Proc. of:
NDSS
, 2016, The Internet Society
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
cached pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
[
pdf
,
cached pdf
,
bib
]
Joshua Juen
, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar
Article in:
PoPETS
, 2015, De Gruyter Open
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
cached pdf
,
bib
]
Marc Juarez
, Sadia Afroz, Gunes Acar, Claudia Diaz, Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
Toward an Efficient Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Marc Juarez
, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright
Miscellaneous
Touching from a Distance: Website Fingerprinting Attacks and Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai, Xin Cheng Zhang,
Brijesh Joshi
, Rob Johnson
In Proc. of:
CCS
, 2012, ACM
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
cached pdf
,
bib
]
Aaron Johnson
, Chris Wacek, Rob Jansen, Micah Sherr, Paul Syverson
In Proc. of:
CCS
, 2013, ACM
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
[
pdf
,
cached pdf
,
bib
]
Joshua Juen,
Aaron Johnson
, Anupam Das, Nikita Borisov, Matthew Caesar
Article in:
PoPETS
, 2015, De Gruyter Open
The Tor Path Simulator
[
url
,
bib
]
Aaron Johnson
Miscellaneous
Safely Measuring Tor
[
pdf
,
cached pdf
,
bib
]
Rob Jansen,
Aaron Johnson
In Proc. of:
CCS
, 2016, ACM
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Xiang Cai, Rishab Nithyanand,
Rob Johnson
In Proc. of:
WPES
, 2014, ACM
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai, Rishab Nithyanand, Tao Wang,
Rob Johnson
, Ian Goldberg
In Proc. of:
CCS
, 2014, ACM
Touching from a Distance: Website Fingerprinting Attacks and Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai, Xin Cheng Zhang, Brijesh Joshi,
Rob Johnson
In Proc. of:
CCS
, 2012, ACM
Effective Attacks and Provable Defenses for Website Fingerprinting
[
pdf
,
cached pdf
,
bib
]
Tao Wang, Xiang Cai, Rishab Nithyanand,
Rob Johnson
, Ian Goldberg
In Proc. of:
USENIX Security
, 2014, USENIX
Do You See What I See? Differential Treatment of Anonymous Users
[
pdf
,
cached pdf
,
bib
]
Sheharbano Khattak, David Fifield, Sadia Afroz,
Mobin Javed
, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch
In Proc. of:
NDSS
, 2016, The Internet Society
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
cached pdf
,
bib
]
Aaron Johnson, Chris Wacek,
Rob Jansen
, Micah Sherr, Paul Syverson
In Proc. of:
CCS
, 2013, ACM
Safely Measuring Tor
[
pdf
,
cached pdf
,
bib
]
Rob Jansen
, Aaron Johnson
In Proc. of:
CCS
, 2016, ACM
Toward an Efficient Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Marc Juarez,
Mohsen Imani
, Mike Perry, Claudia Diaz, Matthew Wright
Miscellaneous
Blocking-resistant Communication Through Domain Fronting
[
pdf
,
cached pdf
,
bib
]
David Fifield, Chang Lan,
Rod Hynes
, Percy Wegmann, Vern Paxson
Article in:
PoPETS
, 2015, De Gruyter Open
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
cached pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani,
Markus Huber
, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
, 2014, Springer
Connection-Oriented DNS to Improve Privacy and Security
[
pdf
,
cached pdf
,
bib
]
Liang Zhu,
Zi Hu
, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya
In Proc. of:
Security & Privacy
, 2015, IEEE
Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Na\"ıve-Bayes Classifier
[
pdf
,
cached pdf
,
bib
]
Dominik Herrmann
, Rolf Wendolsky, Hannes Federrath
In Proc. of:
CCSW
, 2009, ACM
Website Fingerprinting at Internet Scale
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko, Fabian Lanze, Andreas Zinnen,
Martin Henze
, Jan Pennekamp, Klaus Wehrle, Thomas Engel
In Proc. of:
NDSS
, 2016, The Internet Society
Connection-Oriented DNS to Improve Privacy and Security
[
pdf
,
cached pdf
,
bib
]
Liang Zhu, Zi Hu,
John Heidemann
, Duane Wessels, Allison Mankin, Nikita Somaiya
In Proc. of:
Security & Privacy
, 2015, IEEE
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
[
pdf
,
cached pdf
,
bib
]
Jamie Hayes
, George Danezis
In Proc. of:
USENIX Security
, 2016, USENIX
The Interdomain Connectivity of PlanetLab Nodes
[
pdf
,
cached pdf
,
bib
]
Suman Banerjee,
Timothy G. Griffin
, Marcelo Pias
In Proc. of:
PAM
, 2004, Springer
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
cached pdf
,
bib
]
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz,
Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
Where are your servers currently located?
[
url
,
bib
]
Google
Miscellaneous
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson,
Ian Goldberg
In Proc. of:
CCS
, 2014, ACM
Improved Website Fingerprinting on Tor
[
pdf
,
cached pdf
,
bib
]
Tao Wang,
Ian Goldberg
In Proc. of:
WPES
, 2013, ACM
Effective Attacks and Provable Defenses for Website Fingerprinting
[
pdf
,
cached pdf
,
bib
]
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson,
Ian Goldberg
In Proc. of:
USENIX Security
, 2014, USENIX
On Realistically Attacking Tor with Website Fingerprinting
[
pdf
,
cached pdf
,
bib
]
Tao Wang,
Ian Goldberg
Article in:
PoPETs
, 2016, De Gruyter Open
Measuring and Mitigating AS-level Adversaries Against Tor
[
pdf
,
cached pdf
,
bib
]
Rishab Nithyanand, Oleksii Starov, Adva Zair,
Phillipa Gill
, Michael Schapira
In Proc. of:
NDSS
, 2016, The Internet Society
On Inferring Autonomous System Relationships in the Internet
[
pdf
,
cached pdf
,
bib
]
Lixin Gao
Article in:
IEEE/ACM Transactions on Networking
, 2001,
Blocking-resistant Communication Through Domain Fronting
[
pdf
,
cached pdf
,
bib
]
David Fifield
, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
Article in:
PoPETS
, 2015, De Gruyter Open
Do You See What I See? Differential Treatment of Anonymous Users
[
pdf
,
cached pdf
,
bib
]
Sheharbano Khattak,
David Fifield
, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch
In Proc. of:
NDSS
, 2016, The Internet Society
meek-google suspended for terms of service violations (how to set up your own)
[
html
,
bib
]
David Fifield
Miscellaneous
Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Na\"ıve-Bayes Classifier
[
pdf
,
cached pdf
,
bib
]
Dominik Herrmann, Rolf Wendolsky,
Hannes Federrath
In Proc. of:
CCSW
, 2009, ACM
Location Diversity in Anonymity Networks
[
pdf
,
cached pdf
,
bib
]
Nick Feamster
, Roger Dingledine
In Proc. of:
WPES
, 2004, ACM
RFC 7258 – Pervasive Monitoring Is an Attack
[
url
,
bib
]
Stephen Farrell
, Hannes Tschofenig
Miscellaneous
Website Fingerprinting in Onion Routing Based Anonymization Networls
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko, Lukas Niessen, Andreas Zinnen,
Thomas Engel
In Proc. of:
WPES
, 2011, ACM
Website Fingerprinting at Internet Scale
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle,
Thomas Engel
In Proc. of:
NDSS
, 2016, The Internet Society
RAPTOR: Routing Attacks on Privacy in Tor
[
pdf
,
cached pdf
,
bib
]
Yixin Sun,
Anne Edmundson
, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
In Proc. of:
USENIX Security
, 2015, USENIX
Tor Protocol Specification
[
url
,
bib
]
Roger Dingledine
, Nick Mathewson
Miscellaneous
Location Diversity in Anonymity Networks
[
pdf
,
cached pdf
,
bib
]
Nick Feamster,
Roger Dingledine
In Proc. of:
WPES
, 2004, ACM
Tor: The Second-Generation Onion Router
[
pdf
,
cached pdf
,
bib
]
Roger Dingledine
, Nick Mathewson, Paul Syverson
In Proc. of:
USENIX Security
, 2004, USENIX
Mixminion: Design of a Type III Anonymous Remailer Protocol
[
pdf
,
cached pdf
,
bib
]
George Danezis,
Roger Dingledine
, Nick Mathewson
In Proc. of:
Security & Privacy
, 2003, IEEE
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
cached pdf
,
bib
]
Marc Juarez, Sadia Afroz, Gunes Acar,
Claudia Diaz
, Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
Toward an Efficient Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Marc Juarez, Mohsen Imani, Mike Perry,
Claudia Diaz
, Matthew Wright
Miscellaneous
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
[
pdf
,
cached pdf
,
bib
]
Joshua Juen, Aaron Johnson,
Anupam Das
, Nikita Borisov, Matthew Caesar
Article in:
PoPETS
, 2015, De Gruyter Open
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
[
pdf
,
cached pdf
,
bib
]
Jamie Hayes,
George Danezis
In Proc. of:
USENIX Security
, 2016, USENIX
Mixminion: Design of a Type III Anonymous Remailer Protocol
[
pdf
,
cached pdf
,
bib
]
George Danezis
, Roger Dingledine, Nick Mathewson
In Proc. of:
Security & Privacy
, 2003, IEEE
IP to ASN Mapping
[
html
,
bib
]
Team Cymru
Miscellaneous
Power-Law Distributions in Empirical Data
[
url
,
cached pdf
,
bib
]
Aaron Clauset
, Cosma Rohilla Shalizi, Mark E. J. Newman
Article in:
SIAM Review
, 2009,
RAPTOR: Routing Attacks on Privacy in Tor
[
pdf
,
cached pdf
,
bib
]
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford,
Mung Chiang
, Prateek Mittal
In Proc. of:
USENIX Security
, 2015, USENIX
RIPE Atlas
[
url
,
bib
]
RIPE Network Coordination Centre
Miscellaneous
A Tale of the Tails: Power-Laws in Internet Measurements
[
pdf
,
cached pdf
,
bib
]
Aniket Mahanti,
Niklas Carlsson
, Anirban Mahanti, Martin Arlitt, Carey Williamson
Article in:
IEEE Network
, 2013, IEEE
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Xiang Cai
, Rishab Nithyanand, Rob Johnson
In Proc. of:
WPES
, 2014, ACM
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai
, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg
In Proc. of:
CCS
, 2014, ACM
Touching from a Distance: Website Fingerprinting Attacks and Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai
, Xin Cheng Zhang, Brijesh Joshi, Rob Johnson
In Proc. of:
CCS
, 2012, ACM
Effective Attacks and Provable Defenses for Website Fingerprinting
[
pdf
,
cached pdf
,
bib
]
Tao Wang,
Xiang Cai
, Rishab Nithyanand, Rob Johnson, Ian Goldberg
In Proc. of:
USENIX Security
, 2014, USENIX
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
[
pdf
,
cached pdf
,
bib
]
Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov,
Matthew Caesar
Article in:
PoPETS
, 2015, De Gruyter Open
powerlaw: A Python Package for Analysis of Heavy-Tailed Distributions
[
pdf
,
cached pdf
,
bib
]
Jeff Alstott,
Ed Bullmore
, Dietmar Plenz
Article in:
PLoS ONE
, 2014,
RFC 7816 – DNS Query Name Minimisation to Improve Privacy
[
url
,
bib
]
Stephane Bortzmeyer
Miscellaneous
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
[
pdf
,
cached pdf
,
bib
]
Joshua Juen, Aaron Johnson, Anupam Das,
Nikita Borisov
, Matthew Caesar
Article in:
PoPETS
, 2015, De Gruyter Open
The Interdomain Connectivity of PlanetLab Nodes
[
pdf
,
cached pdf
,
bib
]
Suman Banerjee
, Timothy G. Griffin, Marcelo Pias
In Proc. of:
PAM
, 2004, Springer
pyasn – Python IP address to Autonomous System Number lookup module
[
url
,
bib
]
Hadi Asghari
Miscellaneous
A Tale of the Tails: Power-Laws in Internet Measurements
[
pdf
,
cached pdf
,
bib
]
Aniket Mahanti, Niklas Carlsson, Anirban Mahanti,
Martin Arlitt
, Carey Williamson
Article in:
IEEE Network
, 2013, IEEE
powerlaw: A Python Package for Analysis of Heavy-Tailed Distributions
[
pdf
,
cached pdf
,
bib
]
Jeff Alstott
, Ed Bullmore, Dietmar Plenz
Article in:
PLoS ONE
, 2014,
Robust Methodologies for Modeling Web Click Distributions
[
pdf
,
cached pdf
,
bib
]
Kamal Ali
, Mark Scarr
In Proc. of:
WWW
, 2007, ACM
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
cached pdf
,
bib
]
Marc Juarez,
Sadia Afroz
, Gunes Acar, Claudia Diaz, Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
Do You See What I See? Differential Treatment of Anonymous Users
[
pdf
,
cached pdf
,
bib
]
Sheharbano Khattak, David Fifield,
Sadia Afroz
, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch
In Proc. of:
NDSS
, 2016, The Internet Society
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
cached pdf
,
bib
]
Marc Juarez, Sadia Afroz,
Gunes Acar
, Claudia Diaz, Rachel Greenstadt
In Proc. of:
CCS
, 2014, ACM
Bibliography generated by
bibliograpy
.