Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
暂无分享,去创建一个
Ming Yang | Zhen Ling | Xinwen Fu | Wei Yu | Junzhou Luo
[1] John C. Mitchell,et al. Text-based CAPTCHA strengths and weaknesses , 2011, CCS '11.
[2] Nicholas Hopper,et al. Scalable onion routing with torsk , 2009, CCS.
[3] Xinwen Fu,et al. On performance bottleneck of anonymous communication networks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[4] Nikita Borisov,et al. SWIRL: A Scalable Watermark to Detect Correlated Network Flows , 2011, NDSS.
[5] Paul F. Syverson,et al. As-awareness in Tor path selection , 2009, CCS.
[6] Nicholas Hopper,et al. On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design , 2009, WPES '09.
[7] Zhen Ling,et al. Protocol-level hidden server discovery , 2013, 2013 Proceedings IEEE INFOCOM.
[8] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[9] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[10] Walid Dabbous,et al. I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy , 2011, IMC '11.
[11] G. Danezis,et al. Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity , 2007 .
[12] BorisovNikita,et al. Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems , 2012 .
[13] Weijia Jia,et al. A new cell counter based attack against tor , 2009, CCS.
[14] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[15] Prateek Mittal,et al. Pisces: Anonymous Communication Using Social Networks , 2013, NDSS.
[16] Chris Kanich,et al. Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context , 2010, USENIX Security Symposium.
[17] Stefan Lindskog,et al. How the Great Firewall of China is Blocking Tor , 2012, FOCI.
[18] Steven M. Bellovin,et al. A technique for counting natted hosts , 2002, IMW '02.
[19] R. Dingledine,et al. Design of a blocking-resistant anonymity system , 2006 .
[20] Nicholas Hopper,et al. Hashing it out in public: common failure modes of DHT-based anonymity schemes , 2009, WPES '09.
[21] Davide Balzarotti,et al. Measurement and evaluation of a real world deployment of a challenge-response spam filter , 2011, IMC '11.
[22] Matthew K. Wright,et al. Salsa: a structured approach to large-scale anonymity , 2006, CCS '06.
[23] Prateek Mittal,et al. Information leaks in structured peer-to-peer anonymous communication systems , 2008, CCS.
[24] Alfredo De Santis,et al. Device Tracking in Private Networks via NAPT Log Analysis , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[25] Alex Biryukov,et al. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization , 2013, 2013 IEEE Symposium on Security and Privacy.
[26] Peng Ning,et al. On the secrecy of timing-based active watermarking trace-back techniques , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[27] Thomas Sauerwald,et al. The Weighted Coupon Collector's Problem and Applications , 2009, COCOON.
[28] Ian Goldberg,et al. SkypeMorph: protocol obfuscation for Tor bridges , 2012, CCS.
[29] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[30] Nick Mathewson,et al. Trust-based anonymous communication: adversary models and routing algorithms , 2011, CCS '11.
[31] Steven J. Murdoch,et al. Hot or not: revealing hidden services by their clock skew , 2006, CCS '06.
[32] Nicholas Hopper,et al. Membership-concealing overlay networks , 2009, CCS.
[33] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[34] Douglas S. Reeves,et al. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays , 2003, CCS '03.
[35] Xinwen Fu,et al. DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[36] Moni Naor,et al. VERI CATION OF A HUMAN IN THE LOOP OR IDENTI CATION VIA THE TURING TEST , 1996 .
[37] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).