

In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS ’13, New York, NY, USA, pp. Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.: Users get routed: traffic correlation on tor by realistic adversaries. Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.: Users get routed: traffic correlation on tor by realistic adversaries, vol. In: Proceedings of the 25th Symposium on Network and Distributed System Security (NDSS ’18). Jansen, R., Juarez, M., Gálvez, R., Elahi, T., Diaz, C.: Inside job: applying traffic analysis to measure tor from within. (ed.) Proceedings of Information Hiding: 1st International Workshop, LNCS, vol. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. Galteland, H., Gjøsteen, K.: Adversaries monitoring tor traffic crossing their jurisdictional border and reconstructing tor circuits. In: ICCWS’2018 (2018)įiliol, E., Delong, M., Nicolas, J.: Results of the tor routing protocol statistical and combinatorial analyses. ACPI (2018)ĭelong, M., Fatou, O., Filiol, E., Coddet, C., Suhard, C.: Technical and OSINT analysis of the tor project. In: Proceedings of the 13th International Conference on Cyber Warfare and Security, ICCWS 2018, pp. (2015)ĭelong, M., Filiol, E., Coddet, C., Fatou, O., Suhard, C.: Technical and OSINT analysis of the tor foundation. Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics. Study on 21st century military operations in a complex electromagnetic environment. (2014)Ĭlauset, A., Shalizi, C.R., Newman, M.E.J.: Power-law distributions in empirical data. Cryptology ePrint Archive, Report 2014/621. PLoS ONE 9, e85777 (2014)īackes, M., Kate, A., Meiser, S., Mohammadi, E.: (nothing else) mator(s): monitoring the anonymity of tor’s path selection. 49(2), 32:1–32:36 (2016)Īlstott, J., Bullmore, E., Plenz, D.: Powerlaw: a Python package for analysis of heavy-tailed distributions.



AlSabah, M., Goldberg, I.: Performance and security improvements for Tor: a survey.
