Access the full text.
Sign up today, get DeepDyve free for 14 days.
torspec.git?a=blob_plain;hb=HEAD;f=dir-spec
David Goulet
Hidden - service statistics reported by relays Technical Report The Tor Project, 16
Aaron Johnson, Chris Wacek, Rob Jansen, M. Sherr, P. Syverson (2013)
Users get routed: traffic correlation on tor by realistic adversariesProceedings of the 2013 ACM SIGSAC conference on Computer & communications security
(2014)
Hidden Service Tracking Detection and Bandwidth Cheating in Tor Anonymity Network
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, I. Goldberg (2014)
Effective Attacks and Provable Defenses for Website Fingerprinting
Matthew Wright (2004)
The predecessor attack : An analysis of a threat to anonymous communications systems November
Kevin Bauer, Damon McCoy, D. Grunwald, Tadayoshi Kohno, D. Sicker (2007)
Low-resource routing attacks against tor
Nathan Evans, Roger Dingledine, Christian Grothoff (2009)
A Practical Congestion Attack on Tor Using Long Paths
Tao Wang, I. Goldberg (2013)
Improved website fingerprinting on TorProceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Robin Snader (2009)
Path Selection for Performance Improved Onion Routing PhD thesis of at UrbanaSecurity, 27
(2001)
Practical multicandidate election system
C. Dwork (2006)
Differential Privacy
Rob Jansen, John Geddes, Chris Wacek, M. Sherr, P. Syverson (2014)
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport
R. Cramer, I. Damgård, Berry Schoenmakers (1994)
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Olivier Baudron (2001)
and Practical multicandidate election system In editors Proceedings of the Twentieth Annual ACM on Principles of Distributed Island pagesSymposium Computing USA
Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin (2007)
How much anonymity does network latency leak?
M. Wright, M. Adler, B. Levine, C. Shields (2004)
The predecessor attack: An analysis of a threat to anonymous communications systemsACM Trans. Inf. Syst. Secur., 7
Rob Jansen, Andrew Miller, P. Syverson, B. Ford (2014)
From Onions to Shallots: Rewarding Tor Relays with TEARS
Robin Snader (2009)
Nikita Secure peer - to - peer bandwidth evaluation, 28
Robin Snader, N. Borisov (2011)
Improving Security and Performance in the Tor Network through Tunable Path SelectionIEEE Transactions on Dependable and Secure Computing, 8
Aaron Johnson (2013)
Chris Rob Micah and Users get routed correlation on Tor by realistic adversariesTraffic, 24
Ronald Cramer (1994)
Ivan and Proofs of partial knowledge and simplified design of witness hiding protocols In editor Advances in Cryptology - th Annual International Cryptology Conference Santa California August volume ofLecture in pagesCRYPTO USA Proceedings Notes Computer Science, 14
(2012)
Nicholas Hopper, and Roger Dingledine. Methodically modeling the Tor network
Richard Süselbeck, Gregor Schiele, P. Komarnicki, C. Becker (2011)
Efficient bandwidth estimation for peer-to-peer systems2011 IEEE International Conference on Peer-to-Peer Computing
Bauer (2007)
Kevin Sicker Low - resource routing attacks against Tor
Andreas Haeberlen (2007)
Practical accountability for distributed systems, 17
Pierre-Alain Fouque, G. Poupard, J. Stern (2000)
Sharing Decryption in the Context of Voting or Lotteries
Cynthia Dwork (2006)
Differential privacy Colloquium on Automata andLanguages Programming, 13
Robin Snader, N. Borisov (2009)
EigenSpeed: secure peer-to-peer bandwidth evaluation
Mike Perry (2009)
TorFlow: Tor Network Analysis
Bandwidth scanner spec
Pierre (2000)
and Sharing decryption in the context of voting or lotteries In editor th FC Anguilla British February Proceedings volume ofLecture in pagesFinancial Cryptography International Conference Notes Computer Science, 15
David Goulet, Aaron Johnson, George Kadianakis, Karsten Loesing (2015)
Hidden-service statistics reported by relays
Robin Snader (2009)
Path Selection for Performance- and Security-Improved Onion Routing
Rob Jansen, Kevin Bauer, Nicholas Hopper, Roger Dingledine (2012)
Methodically Modeling the Tor Network
Ghassan Karame, D. Gubler, Srdjan Capkun (2009)
On the Security of Bottleneck Bandwidth Estimation Techniques
I. Damgård, M. Jurik (2003)
A Length-Flexible Threshold Cryptosystem with Applications
Tor directory protocol, version 3
I. Damgård, M. Jurik (2001)
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
2013 IEEE Symposium on Security and Privacy Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
Robin Snader (2011)
Nikita Improving security and performance in the Tor network through tunable path selection September, 29
Roger Dingledine (2004)
Tor The second - generation onion routerSecurity, 12
Mike Perry (2009)
Tor network analysis, 26
Rob Jansen, Nicholas Hopper (2011)
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
Rob Jansen, Aaron Johnson, P. Syverson (2013)
LIRA: Lightweight Incentivized Routing for Anonymity
Andreas Haeberlen, P. Kuznetsov, P. Druschel (2007)
PeerReview: practical accountability for distributed systems
Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster (2001)
Dos and don'ts of client authentication on the web
AbstractWe present PeerFlow, a system to securely load balance client traffic in Tor. Security in Tor requires that no adversary handle too much traffic. However, Tor relays are run by volunteers who cannot be trusted to report the relay bandwidths, which Tor clients use for load balancing. We show that existing methods to determine the bandwidths of Tor relays allow an adversary with little bandwidth to attack large amounts of client traffic. These methods include Tor’s current bandwidth-scanning system, TorFlow, and the peer-measurement system EigenSpeed. We present an improved design called PeerFlow that uses a peer-measurement process both to limit an adversary’s ability to increase his measured bandwidth and to improve accuracy. We show our system to be secure, fast, and efficient. We implement PeerFlow in Tor and demonstrate its speed and accuracy in large-scale network simulations.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Apr 1, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.