Open access bibliography for the paper
The Effect of DNS on Tor’s Anonymity
Sort by: (
reverse
)
year
, (
reverse
)
author
CollecTor
[
url
,
bib
]
The Tor Project
Miscellaneous
pyasn – Python IP address to Autonomous System Number lookup module
[
url
,
bib
]
Hadi Asghari
Miscellaneous
Alexa Top Sites
[
url
,
bib
]
Amazon Web Services
Miscellaneous
IP to ASN Mapping
[
html
,
bib
]
Team Cymru
Miscellaneous
Where are your servers currently located?
[
url
,
bib
]
Google
Miscellaneous
Tor Protocol Specification
[
url
,
bib
]
Roger Dingledine, Nick Mathewson
Miscellaneous
exitmap—A fast and modular scanner for Tor exit relays
[
url
,
bib
]
Philipp Winter
Miscellaneous
The Tor Path Simulator
[
url
,
bib
]
Aaron Johnson
Miscellaneous
RIPE Atlas
[
url
,
bib
]
RIPE Network Coordination Centre
Miscellaneous
Mixmaster
[
url
,
bib
]
Miscellaneous
Tor Metrics–Top-10 countries by directly connecting users
[
html
,
bib
]
The Tor Project
Miscellaneous
PlanetLab – An open platform for developing, deploying, and accessing planetary-scale services
[
url
,
bib
]
Miscellaneous
On Inferring Autonomous System Relationships in the Internet
[
pdf
,
cached pdf
,
bib
]
Lixin Gao
Article in:
IEEE/ACM Transactions on Networking
,
2001
,
Mixminion: Design of a Type III Anonymous Remailer Protocol
[
pdf
,
cached pdf
,
bib
]
George Danezis, Roger Dingledine, Nick Mathewson
In Proc. of:
Security & Privacy
,
2003
, IEEE
The Interdomain Connectivity of PlanetLab Nodes
[
pdf
,
cached pdf
,
bib
]
Suman Banerjee, Timothy G. Griffin, Marcelo Pias
In Proc. of:
PAM
,
2004
, Springer
Tor: The Second-Generation Onion Router
[
pdf
,
cached pdf
,
bib
]
Roger Dingledine, Nick Mathewson, Paul Syverson
In Proc. of:
USENIX Security
,
2004
, USENIX
Location Diversity in Anonymity Networks
[
pdf
,
cached pdf
,
bib
]
Nick Feamster, Roger Dingledine
In Proc. of:
WPES
,
2004
, ACM
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries
[
pdf
,
cached pdf
,
bib
]
Steven J. Murdoch, Piotr Zieliński
In Proc. of:
PET
,
2007
, Springer
Robust Methodologies for Modeling Web Click Distributions
[
pdf
,
cached pdf
,
bib
]
Kamal Ali, Mark Scarr
In Proc. of:
WWW
,
2007
, ACM
Power-Law Distributions in Empirical Data
[
url
,
cached pdf
,
bib
]
Aaron Clauset, Cosma Rohilla Shalizi, Mark E. J. Newman
Article in:
SIAM Review
,
2009
,
Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Na\"ıve-Bayes Classifier
[
pdf
,
cached pdf
,
bib
]
Dominik Herrmann, Rolf Wendolsky, Hannes Federrath
In Proc. of:
CCSW
,
2009
, ACM
Website Fingerprinting in Onion Routing Based Anonymization Networls
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko, Lukas Niessen, Andreas Zinnen, Thomas Engel
In Proc. of:
WPES
,
2011
, ACM
Remove Global Client-side DNS Caching
[
txt
,
bib
]
Nick Mathewson
Miscellaneous
Touching from a Distance: Website Fingerprinting Attacks and Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, Rob Johnson
In Proc. of:
CCS
,
2012
, ACM
A Tale of the Tails: Power-Laws in Internet Measurements
[
pdf
,
cached pdf
,
bib
]
Aniket Mahanti, Niklas Carlsson, Anirban Mahanti, Martin Arlitt, Carey Williamson
Article in:
IEEE Network
,
2013
, IEEE
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[
pdf
,
cached pdf
,
bib
]
Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, Paul Syverson
In Proc. of:
CCS
,
2013
, ACM
Improved Website Fingerprinting on Tor
[
pdf
,
cached pdf
,
bib
]
Tao Wang, Ian Goldberg
In Proc. of:
WPES
,
2013
, ACM
RFC 7258 – Pervasive Monitoring Is an Attack
[
url
,
bib
]
Stephen Farrell, Hannes Tschofenig
Miscellaneous
powerlaw: A Python Package for Analysis of Heavy-Tailed Distributions
[
pdf
,
cached pdf
,
bib
]
Jeff Alstott, Ed Bullmore, Dietmar Plenz
Article in:
PLoS ONE
,
2014
,
A Critical Evaluation of Website Fingerprinting Attacks
[
pdf
,
cached pdf
,
bib
]
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, Rachel Greenstadt
In Proc. of:
CCS
,
2014
, ACM
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
[
pdf
,
cached pdf
,
bib
]
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg
In Proc. of:
CCS
,
2014
, ACM
Spoiled Onions: Exposing Malicious Tor Exit Relays
[
pdf
,
cached pdf
,
bib
]
Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl
In Proc. of:
PETS
,
2014
, Springer
Effective Attacks and Provable Defenses for Website Fingerprinting
[
pdf
,
cached pdf
,
bib
]
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg
In Proc. of:
USENIX Security
,
2014
, USENIX
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Xiang Cai, Rishab Nithyanand, Rob Johnson
In Proc. of:
WPES
,
2014
, ACM
Ethical Tor Research: Guidelines
[
url
,
bib
]
Kate Krauss
Miscellaneous
Website Fingerprinting: Attacks and Defenses
[
pdf
,
cached pdf
,
bib
]
Tao Wang
Ph.D thesis:
University of Waterloo
,
2015
Blocking-resistant Communication Through Domain Fronting
[
pdf
,
cached pdf
,
bib
]
David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
Article in:
PoPETS
,
2015
, De Gruyter Open
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
[
pdf
,
cached pdf
,
bib
]
Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar
Article in:
PoPETS
,
2015
, De Gruyter Open
Padding Negotiation
[
txt
,
bib
]
Mike Perry
Miscellaneous
Connection-Oriented DNS to Improve Privacy and Security
[
pdf
,
cached pdf
,
bib
]
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya
In Proc. of:
Security & Privacy
,
2015
, IEEE
RAPTOR: Routing Attacks on Privacy in Tor
[
pdf
,
cached pdf
,
bib
]
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
In Proc. of:
USENIX Security
,
2015
, USENIX
RFC 7816 – DNS Query Name Minimisation to Improve Privacy
[
url
,
bib
]
Stephane Bortzmeyer
Miscellaneous
Toward an Efficient Website Fingerprinting Defense
[
pdf
,
cached pdf
,
bib
]
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright
Miscellaneous
On Realistically Attacking Tor with Website Fingerprinting
[
pdf
,
cached pdf
,
bib
]
Tao Wang, Ian Goldberg
Article in:
PoPETs
,
2016
, De Gruyter Open
July 2016 Web Server Survey
[
html
,
bib
]
Netcraft
Miscellaneous
meek-google suspended for terms of service violations (how to set up your own)
[
html
,
bib
]
David Fifield
Miscellaneous
Safely Measuring Tor
[
pdf
,
cached pdf
,
bib
]
Rob Jansen, Aaron Johnson
In Proc. of:
CCS
,
2016
, ACM
Measuring and Mitigating AS-level Adversaries Against Tor
[
pdf
,
cached pdf
,
bib
]
Rishab Nithyanand, Oleksii Starov, Adva Zair, Phillipa Gill, Michael Schapira
In Proc. of:
NDSS
,
2016
, The Internet Society
Website Fingerprinting at Internet Scale
[
pdf
,
cached pdf
,
bib
]
Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle, Thomas Engel
In Proc. of:
NDSS
,
2016
, The Internet Society
Do You See What I See? Differential Treatment of Anonymous Users
[
pdf
,
cached pdf
,
bib
]
Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch
In Proc. of:
NDSS
,
2016
, The Internet Society
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
[
pdf
,
cached pdf
,
bib
]
Jamie Hayes, George Danezis
In Proc. of:
USENIX Security
,
2016
, USENIX
Bibliography generated by
bibliograpy
.