TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor
暂无分享,去创建一个
Zhen Ling | Xinwen Fu | Wei Yu | Junzhou Luo | Kui Wu
[1] Zhen Ling,et al. TorWard: Discovery of malicious traffic over Tor , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[2] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[3] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[4] Ming Yang,et al. Extensive analysis and large-scale empirical evaluation of tor bridge discovery , 2012, 2012 Proceedings IEEE INFOCOM.
[5] Weijia Jia,et al. A new cell counter based attack against tor , 2009, CCS.
[6] Kevin S. Bauer,et al. Low-Resource Routing Attacks Against Anonymous Systems , 2007 .
[7] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[8] Shui Yu,et al. Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks , 2012, IEEE Transactions on Information Forensics and Security.
[9] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[10] LingZhen,et al. A new cell-counting-based attack against Tor , 2012 .
[11] Zhen Ling,et al. Protocol-level hidden server discovery , 2013, 2013 Proceedings IEEE INFOCOM.
[12] Zhenhai Duan,et al. A traceback attack on Freenet , 2013, 2013 Proceedings IEEE INFOCOM.
[13] Alex Biryukov,et al. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization , 2013, 2013 IEEE Symposium on Security and Privacy.
[14] Steven J. Murdoch,et al. Hot or not: revealing hidden services by their clock skew , 2006, CCS '06.
[15] Mohamed Ali Kâafar,et al. Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.
[16] Brian Hernacki,et al. Emerging threats , 2005, WORM '05.
[17] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[18] Ming Yang,et al. Application-level attack against Tor's hidden service , 2011, 2011 6th International Conference on Pervasive Computing and Applications.
[19] Wanlei Zhou,et al. A Dual-Channel Time-Spread Echo Method for Audio Watermarking , 2012, IEEE Transactions on Information Forensics and Security.