: Destination-Naive AS-Awareness in Anonymous Communications
暂无分享,去创建一个
[1] George Danezis,et al. Denial of service or denial of security? , 2007, CCS '07.
[2] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[3] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[4] Jia Wang,et al. Towards an accurate AS-level traceroute tool , 2003, SIGCOMM '03.
[5] Michael Schapira,et al. Measuring and Mitigating AS-level Adversaries Against Tor , 2016, NDSS.
[6] Roger Dingledine,et al. Methodically Modeling the Tor Network , 2012, CSET.
[7] Harsha V. Madhyastha,et al. LASTor: A Low-Latency AS-Aware Tor Client , 2012, IEEE/ACM Transactions on Networking.
[8] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[9] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[10] Micah Sherr,et al. Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport , 2014, USENIX Security Symposium.
[11] Micah Adler,et al. Passive-Logging Attacks Against Anonymous Communications Systems , 2008, TSEC.
[12] Micah Adler,et al. Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[13] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[14] Micah Sherr,et al. An Empirical Evaluation of Relay Selection in Tor , 2013, NDSS.
[15] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.
[16] Micah Adler,et al. The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.
[17] Nicholas Hopper,et al. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation , 2011, NDSS.
[18] George Danezis,et al. Guard Sets for Onion Routing , 2015, Proc. Priv. Enhancing Technol..
[19] Joshua Juen,et al. Protecting anonymity in the presence of autonomous system and internet exchange level adversaries , 2012 .
[20] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[21] Nick Feamster,et al. Location diversity in anonymity networks , 2004, WPES '04.
[22] R. Dingledine,et al. One Fast Guard for Life ( or 9 months ) , 2014 .
[23] Lixin Gao,et al. CAM04-4: AS Path Inference by Exploiting Known AS Paths , 2006, IEEE Globecom 2006.
[24] Nikita Borisov,et al. Defending Tor from Network Adversaries: A Case Study of Network Path Prediction , 2014, Proc. Priv. Enhancing Technol..
[25] Paul F. Syverson,et al. As-awareness in Tor path selection , 2009, CCS.
[26] Lixin Gao,et al. On inferring autonomous system relationships in the Internet , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[27] Prateek Mittal,et al. RAPTOR: Routing Attacks on Privacy in Tor , 2015, USENIX Security Symposium.