DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification | 0 | 0.34 | 2022 |
Privacy-Preserving Dynamic Learning of Tor Network Traffic. | 1 | 0.35 | 2018 |
Measuring Information Leakage in Website Fingerprinting Attacks and Defenses. | 6 | 0.45 | 2018 |
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage | 0 | 0.34 | 2018 |
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR. | 1 | 0.38 | 2018 |
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability. | 0 | 0.34 | 2018 |
Fingerprinting Keywords in Search Queries over Tor. | 2 | 0.36 | 2017 |
Measuring Information Leakage in Website Fingerprinting Attacks. | 0 | 0.34 | 2017 |
Traffic Analysis with Deep Learning. | 0 | 0.34 | 2017 |
Is Bob Sending Mixed Signals? | 3 | 0.43 | 2017 |
PeerFlow: Secure Load Balancing in Tor. | 3 | 0.43 | 2017 |
ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks. | 0 | 0.34 | 2016 |
E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes With Economic Incentives. | 0 | 0.34 | 2016 |
Mailet: Instant Social Networking under Censorship. | 0 | 0.34 | 2016 |
MP3: A More Efficient Private Presence Protocol. | 1 | 0.35 | 2016 |
Anarchy in Tor: Performance Cost of Decentralization. | 0 | 0.34 | 2016 |
The Cost of the Path Not Taken. | 0 | 0.34 | 2016 |
WPES 2015: The 14th Workshop on Privacy in the Electronic Society | 0 | 0.34 | 2015 |
Hijacking the Vuze BitTorrent network: all your hop are belong to us | 2 | 0.38 | 2015 |
IMUX: Managing Tor Connections from Two to Infinity, and Beyond | 6 | 0.46 | 2014 |
Peer Pressure: Exerting Malicious Influence on Routers at a Distance | 2 | 0.47 | 2013 |
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks | 21 | 0.92 | 2013 |
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation. | 6 | 0.51 | 2013 |
Cover your ACKs: pitfalls of covert channel censorship circumvention | 8 | 0.51 | 2013 |
How Low Can You Go: Balancing Performance with Anonymity in Tor. | 8 | 0.46 | 2013 |
Improved group off-the-record messaging | 5 | 0.44 | 2013 |
Attacking the kad network - real world evaluation and high fidelity simulation using DVN. | 1 | 0.36 | 2013 |
Efficient Private Proximity Testing with GSM Location Sketches. | 26 | 0.84 | 2012 |
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. | 42 | 1.59 | 2012 |
KoNKS: konsensus-style network koordinate system | 2 | 0.38 | 2012 |
On the mixing time of directed social graphs and security implications | 8 | 0.49 | 2012 |
Location leaks over the GSM air interface. | 15 | 1.21 | 2012 |
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. | 0 | 0.34 | 2012 |
One-Way Indexing for Plausible Deniability in Censorship Resistant Storage. | 1 | 0.36 | 2012 |
Methodically modeling the Tor network | 7 | 0.49 | 2012 |
Throttling Tor bandwidth parasites | 8 | 0.50 | 2012 |
New attacks on timing-based network flow watermarks | 8 | 0.47 | 2012 |
Routing around decoys | 14 | 0.67 | 2012 |
Accurate and Provably Secure Latency Estimation with Treeple. | 11 | 0.54 | 2011 |
BNymble: more anonymous blacklisting at almost no cost (a short paper) | 7 | 0.45 | 2011 |
FAUST: efficient, TTP-free abuse prevention by anonymous whitelisting | 8 | 0.49 | 2011 |
Understanding Social Networks Properties for Trustworthy Computing | 5 | 0.45 | 2011 |
Keep your friends close: Incorporating trust into social network-based Sybil defenses. | 16 | 0.68 | 2011 |
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems | 7 | 0.50 | 2011 |
Losing control of the internet: using the data plane to attack the control plane | 35 | 1.49 | 2010 |
Recruiting new tor relays with BRAIDS | 31 | 1.12 | 2010 |
Balancing the shadows | 3 | 0.38 | 2010 |
Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings | 15 | 2.53 | 2010 |
How much anonymity does network latency leak? | 94 | 2.77 | 2010 |
Secure latency estimation with treeple | 2 | 0.40 | 2010 |