The Bitcoin Hunter: Detecting Bitcoin Traffic over Encrypted Channels
暂无分享,去创建一个
Amir Houmansadr | Ittay Eyal | Shahrzad Naseri | Fatemeh Rezaei | Fatemeh Rezaei | Shahrzad Naseri | Ittay Eyal | Amir Houmansadr
[1] R. Durrett. Probability: Theory and Examples , 1993 .
[2] Maurizio Dusi,et al. Traffic classification through simple statistical fingerprinting , 2007, CCRV.
[3] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[4] Michalis Faloutsos,et al. Transport layer identification of P2P traffic , 2004, IMC '04.
[5] Philipp Winter,et al. ScrambleSuit: a polymorphic network protocol to circumvent censorship , 2013, WPES.
[6] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[7] Michalis Faloutsos,et al. Internet traffic classification demystified: myths, caveats, and the best practices , 2008, CoNEXT '08.
[8] Michael Langberg,et al. Realtime Classification for Encrypted Traffic , 2010, SEA.
[9] Jie Cao,et al. An accurate traffic classification model based on support vector machines , 2017, Int. J. Netw. Manag..
[10] Taesang Choi,et al. Content-aware Internet application traffic measurement and analysis , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[11] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Oliver Spatscheck,et al. Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.
[13] Ari Juels,et al. BDoS: Blockchain Denial-of-Service , 2019, CCS.
[14] Grenville J. Armitage,et al. A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.
[15] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[16] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[17] Michalis Faloutsos,et al. Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[18] Aviv Zohar,et al. Flood & Loot: A Systemic Attack on The Lightning Network , 2020, AFT.
[19] Carey L. Williamson,et al. A Longitudinal Study of P2P Traffic Classification , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.
[20] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.
[21] Emin Gün Sirer,et al. Selfish Mining Re-Examined , 2020, Financial Cryptography.
[22] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[23] Carey L. Williamson,et al. Offline/realtime traffic classification using semi-supervised learning , 2007, Perform. Evaluation.
[24] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[25] Carey L. Williamson,et al. Identifying and discriminating between web and peer-to-peer traffic in the network core , 2007, WWW '07.
[26] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[27] Konstantina Papagiannaki,et al. Toward the Accurate Identification of Network Applications , 2005, PAM.
[28] Sebastian Faust,et al. Temporary Censorship Attacks in the Presence of Rational Miners , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[29] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, IEEE Symposium on Security and Privacy.
[30] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[31] Yongdae Kim,et al. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin , 2017, CCS.
[32] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[33] Vern Paxson,et al. Blocking-resistant communication through domain fronting , 2015, Proc. Priv. Enhancing Technol..
[34] Charles V. Wright,et al. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.
[35] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[36] Milad Nasr,et al. DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning , 2018, CCS.
[37] Thomas Ristenpart,et al. Protocol misidentification made easy with format-transforming encryption , 2013, CCS.
[38] Xiaohong Guan,et al. An SVM-based machine learning method for accurate internet traffic classification , 2010, Inf. Syst. Frontiers.