Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication
暂无分享,去创建一个
[1] Nikita Borisov,et al. SWIRL: A Scalable Watermark to Detect Correlated Network Flows , 2011, NDSS.
[2] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[3] Matthew K. Wright,et al. Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.
[4] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[5] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[6] Sushil Jajodia,et al. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[8] Brian Neil Levine,et al. Inferring the source of encrypted HTTP connections , 2006, CCS '06.
[9] Konrad Rieck,et al. — Technical Report — Torben: Deanonymizing Tor Communication using Web Page Markers , 2014 .
[10] Hannes Federrath,et al. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.