Tor Attack Studies: A Survey on Active and Passive Subject
Abstract
Privacy is one of the important aspects that the Internet user would like to protect. The introduction of Tor as a tool for anonymous Internet access has attracted the attention of researchers worldwide. Various researchers had proposed an attack technique in order to challenge the anonymity properties provided by Tor to the Internet user. Due to a lack of adequate comprehension of the attacked subject utilized in the various Tor attack studies, this paper aims to classify and analyze the attacked subject on those studies. Our research goal is to review and analyze the attack subject practice and trends in the Tor research field. The knowledge obtained from this study will allow for better comprehension of the nature of the attacks executed on Tor and will be useful for researchers' guidance, especially in the context of practice and trends in attack subjects on Tor. Therefore, this study classified the attacked subject on Tor based upon 80 reviewed studies related to attacking the Tor. This classification had yielded several new substantial pieces of knowledge on the subject utilized in the Tor attack. It is revealed that most of the researchers had focused on monitoring the network traffic between the user and Entry OR, followed by malicious Exit OR and malicious Entry OR. In addition, various studies have been found to utilize more than one attack subject in attacking the Tor network.
Keywords: anonymity, attack, privacy, security, Tor.
Full Text:
PDFReferences
SHIRAZI F., SIMEONOVSKI M., ASGHAR M. R., BACKES M., and DIAZ C. A Survey on Routing in Anonymous Communication Protocols. Association for Computing Machinery Computing Surveys, 2018, 51(3): 51:1-51:39. DOI:10.1145/3182658
THE TOR PROJECT. Tor Metrics. 2020. Accessed December 1, 2020. https://metrics.torproject.org/
SALEH S., QADIR J., and ILYAS M. U. Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research. Journal of Network and Computer Applications, 2018, 114: 1-28. DOI: https://doi.org/10.1016/j.jnca.2018.04.002
ALSABAH M. and GOLDBERG I. Performance and Security Improvements for Tor: A Survey. Association for Computing Machinery Computing Surveys, 2016, 49(2): 32:1-32:36. DOI:10.1145/2946802
AMINUDDIN MAIM, ZAABA Z. F., SINGH M. K. M., and SINGH D. S. M. A Survey on Tor Encrypted Traffic Monitoring. International Journal of Advanced Computer Science and Applications, 2018, 9(8): 113-120. DOI:10.14569/IJACSA.2018.090815
AMINUDDIN MAIM., ZAABA Z. F., SAMSUDIN A., JUMA’AT N. B. A, SUKARDI S., and HUSSAIN A. Classification on Deanonymisation Outcome of Tor Attack. International Journal on Advanced Science, Engineering and Information Technology, 2020, 29(6s): 1647-1660.
JANSEN R., JUAREZ M., GÁLVEZ R., ELAHI T., and DIAZ C. Inside Job: Applying Traffic Analysis to Measure Tor from Within. In: Network and Distributed System Security Symposium (NDSS). Internet Society, 2018. DOI:10.14722/ndss.2018.23261
CYNTHIA W., GERARD W., RADU S., ALEXANDRE D., and THOMAS E. Breaking Tor anonymity with game theory and data mining. Concurrency and Computation Practice and Experience, 2011, 24(10): 1052-1065. DOI:10.1002/cpe.1828
ARP D., YAMAGUCHI F., RIECK K. Torben: Deanonymizing Tor Communication Using Web Page Markers. 2014.
JOHNSON A., WACEK C., JANSEN R., SHERR M., and SYVERSON P. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. In: Proceedings of the 2013 Association for Computing Machinery Conference on Computer and Communications Security, 2013: 337-348. DOI:10.1145/2508859.2516651
GHAFIR I., SVOBODA J., and PRENOSIL V. Tor-based malware and Tor connection detection. In: International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014 - Malaysia). ; 2014: 1-6. DOI:10.1049/cp.2014.1411
SAPUTRA F. A., NADHORI I. U., and BARRY B. F. Detecting and blocking onion router traffic using deep packet inspection. In: 2016 International Electronics Symposium (IES), 2016: 283-288. DOI:10.1109/ELECSYM.2016.7861018
JAGGARD A. D. and SYVERSON P. Onions in the Crosshairs: When the Man Really is out to Get You. In: Proceedings of the 2017 Workshop on Privacy in the Electronic Society, 2017: 141-151. DOI:10.1145/3139550.3139553
ABBOTT T. G., LAI K. J., LIEBERMAN M. R., and PRICE E. C. Browser-Based Attacks on Tor. In: BORISOV N, GOLLE P, eds. Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2007: 184-199.
YU W., FU X., GRAHAM S., XUAN D., and ZHAO W. DSSS-Based Flow Marking Technique for Invisible Traceback. In: 2007 Institute of Electrical and Electronics Engineers Symposium on Security and Privacy, 2007: 18-32. DOI:10.1109SP.2007.14
BAUER K., MCCOY D., GRUNWALD D., KOHNO T, and SICKER D. Low-resource Routing Attacks Against Tor. In: Proceedings of the 2007 Association for Computing Machinery Workshop on Privacy in Electronic Society, 2007: 11-20. DOI:10.1145/1314333.1314336
MURDOCH S. J. and ZIELIŃSKI P. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In: BORISOV N., GOLLE P., eds. Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2007: 167-183.
PRIES R., YU W., FU X., and ZHAO W. A New Replay Attack against Anonymous Communication Networks. In: 2008 Institute of Electrical and Electronics Engineers International Conference on Communications, 2008: 1578-1582. DOI:10.1109/ICC.2008.305
ZANDER S., and MURDOCH S. J. An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In: 17th Advanced Computing Systems Association Security Symposium (USENIX Security 08), 2008.
CHAKRAVARTY S., STAVROU A., and KEROMYTIS A. D. Identifying Proxy Nodes in a Tor Anonymization Circuit. In: 2008 Institute of Electrical and Electronics Engineers International Conference on Signal Image Technology and Internet-Based Systems, 2008: 633-639. DOI:10.1109/SITIS.2008.93
BAI X., ZHANG Y., and NIU X. Traffic Identification of Tor and Web-Mix. In: 2008 Eighth International Conference on Intelligent Systems Design and Applications. 1, 2008: 548-551. DOI:10.1109/ISDA.2008.209
ZHANG J., DUAN H., and WU J. A Novel Method to Prevent Traffic Analysis in Low-Latency Anonymous Communication Systems. In: 2008 International Conference on Computer and Electrical Engineering, 2008: 906-911. DOI:10.1109/ICCEE.2008.32
SHI Y. and MATSUURA K. Fingerprinting Attack on the Tor Anonymity System. In: QING S., MITCHELL C. J., WANG G., eds. Information and Communications Security. Springer Berlin Heidelberg; 2009: 425-438. DOI:10.1007/978-3-642-11145-7_33
HERRMANN D., WENDOLSKY R., and FEDERRATH H. Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier. In: Proceedings of the 2009 Association for Computing Machinery Workshop on Cloud Computing Security, 2009: 31-42. DOI:10.1145/1655008.1655013
WANG X., LUO J., YANG M., and LING Z. A novel flow multiplication attack against Tor. In: 2009 13th International Conference on Computer Supported Cooperative Work in Design, 2009: 686-691. DOI:10.1109/CSCWD.2009.4968138
EVANS N. S., DINGLEDINE R., and GROTHOFF C. A Practical Congestion Attack on Tor Using Long Paths. In: Proceedings of the 18th Conference on the Advanced Computing Systems Association Security Symposium. USENIX Association, 2009: 33-50. http://dl.acm.org/citation.cfm?id=1855768.1855771
ZHANG Y. Effective Attacks in the Tor Authentication Protocol. In: 2009 Third International Conference on Network and System Security, 2009: 81-86. DOI:10.1109/NSS.2009.94
JIN J. and WANG X. On the effectiveness of low latency anonymous network in the presence of timing attack. In: 2009 Institute of Electrical and Electronics Engineers International Conference on Dependable Systems Networks, 2009: 429-438. DOI:10.1109/DSN.2009.5270306
FU X. and LING Z. One Cell is Enough to Break Tor’s Anonymity. In: Proceedings of Black Hat Technical Security Conference, 2009: 578-589.
BAUER K., GRUNWALD D., and SICKER D. Predicting Tor path compromise by exit port. In: 2009 Institute of Electrical and Electronics Engineers 28th International Performance Computing and Communications Conference, 2009: 384-387. DOI:10.1109/PCCC.2009.5403852
EDMAN M. and SYVERSON P. AS-Awareness in Tor Path Selection. In: Proceedings of the 16th Association for Computing Machinery Conference on Computer and Communications Security, 2009: 380-389. DOI:10.1145/1653662.1653708
JOHNSON N., MCLAUGHLIN S., and THOMPSON J. Path tracing in TOR networks. In: 18th European Signal Processing Conference, 2010: 1856-1860.
HUBER M., MULAZZANI M., and WEIPPL E. Tor HTTP Usage and Information Leakage. In: DE DECKER B., SCHAUMÜLLER I., eds. Communications and Multimedia Security. Springer Berlin Heidelberg, 2010: 245-255.
FEIGENBAUM J., JOHNSON A., and SYVERSON P. Preventing Active Timing Attacks in Low-Latency Anonymous Communication. In: ATALLAH M. J., HOPPER N. J., eds. Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2010: 166-183.
PANCHENKO A., NIESSEN L., ZINNEN A., and ENGEL T. Website Fingerprinting in Onion Routing Based Anonymization Networks. In: Proceedings of the 10th Annual Association for Computing Machinery Workshop on Privacy in the Electronic Society, 2011: 103-114. DOI:10.1145/2046556.2046570
ZHANG L., LUO J., YANG M., and HE G. Application-level attack against Tor’s hidden service. In: 6th International Conference on Pervasive Computing and Applications, 2011: 509-516. DOI:10.1109/ICPCA.2011.6106555
LING Z., LUO J., YU W., and FU X. Equal-Sized Cells Mean Equal-Sized Packets in Tor? In: 2011 Institute of Electrical and Electronics Engineers International Conference on Communications, 2011: 1-6. DOI:10.1109/icc.2011.5962653
ELICES J. A., PÉREZ-GONZÁLEZ F., and TRONCOSO C. Fingerprinting Tor’s hidden service log files using a timing channel. In: 2011 Institute of Electrical and Electronics Engineers International Workshop on Information Forensics and Security, 2011: 1-6. DOI:10.1109/WIFS.2011.6123154
LE BLOND S, MANILS P, CHAABANE A, KÂAFAR M. A., CASTELLUCCIA C., LEGOUT A., and DABBOUS W. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In: Proceedings of the 4th the Advanced Computing Systems Association Conference on Large-Scale Exploits and Emergent Threats. USENIX Association, 2011.
BENMEZIANE S., BADACHE N., and BENSIMESSAOUD S. Tor Network Limits. In: 2011 International Conference on Network Computing and Information Security, 1, 2011: 200-205. DOI:10.1109/NCIS.2011.48
BARKER J., HANNAY P., and SZEWCZYK P. Using Traffic Analysis to Identify the Second Generation Onion Router. In: 9th International Conference on Embedded and Ubiquitous Computing, 2011: 72-78. DOI:10.1109/EUC.2011.76
CHAKRAVARTY S., PORTOKALIDIS G., POLYCHRONAKIS M., and KEROMYTIS A. D. Detecting Traffic Snooping in Tor Using Decoys. In: SOMMER R., BALZAROTTI D., MAIER G., eds. Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2011: 222-241.
LING Z., LUO J., YU W., FU X., XUAN D, and JIA W. A New Cell-Counting-Based Attack against Tor. Institute of Electrical and Electronics Engineers / Association for Computing Machinery Transactions on Networking, 2012, 20(4): 1245-1261. DOI:10.1109/TNET.2011.2178036
DYER K. P., COULL S. E., RISTENPART T., and SHRIMPTON T. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In: 2012 Institute of Electrical and Electronics Engineers Symposium on Security and Privacy, 2012: 332-346. DOI:10.1109/SP.2012.28
CAI X., ZHANG X. C., JOSHI B., and JOHNSON R. Touching from a Distance: Website Fingerprinting Attacks and Defenses. In: Proceedings of the 2012 Association for Computing Machinery Conference on Computer and Communications Security, 2012: 605-616. DOI:10.1145/2382196.2382260
WINTER P. and LINDSKOG S. How China Is Blocking Tor. Computing Research Repository. Computer Science, Cryptography and Security, 2012: abs/1204.0.
BIRYUKOV A., PUSTOGAROV I., and WEINMANN R. P. TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. In: FORESTI S., YUNG M., MARTINELLI F., eds. Computer Security. Springer Berlin Heidelberg, 2012: 469-486.
LING Z., LUO J., YU W., YANG M., and FU X. Extensive analysis and large-scale empirical evaluation of tor bridge discovery. In: 2012 Proceedings Institute of Electrical and Electronics Engineers INFOCOM, 2012: 2381-2389. DOI:10.1109/INFCOM.2012.6195627
SONG M., XIONG G., LI Z., PENG J., and GUO L. A de-anonymize attack method based on traffic analysis. In: 8th International Conference on Communications and Networking in China (CHINACOM), 2013: 455-460. DOI:10.1109/ChinaCom.2013.6694639
WANG T. and GOLDBERG I. Improved Website Fingerprinting on Tor. In: Proceedings of the 12th Association for Computing Machinery Workshop on Workshop on Privacy in the Electronic Society, 2013: 201-212. DOI:10.1145/2517840.2517851
SULAIMAN M. A. and ZHIOUA S. Attacking Tor through Unpopular Ports. In: Institute of Electrical and Electronics Engineers 33rd International Conference on Distributed Computing Systems Workshops, 2013: 33-38. DOI:10.1109/ICDCSW.2013.29
BARBERA M. V., KEMERLIS V. P., PAPPAS V., and KEROMYTIS A. D. Cell Flood: Attacking Tor Onion Routers on the Cheap. In: CRAMPTON J., JAJODIA S., MAYES K., eds. Computer Security. Springer Berlin Heidelberg, 2013: 664-681.
LIU P., SHI J., WANG L., WANG X., and TAN Q. IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor Network. In: 2013 Institute of Electrical and Electronics Engineers Eighth International Conference on Networking, Architecture and Storage, 2013:1 66-172. DOI:10.1109/NAS.2013.27
ELICES J. A. and PÉREZ-GONZÁLEZ F. Locating Tor hidden services through an interval-based traffic-correlation attack. In: 2013 Institute of Electrical and Electronics Engineers Conference on Communications and Network Security, 2013: 385-386. DOI:10.1109/CNS.2013.6682740
LING Z., LUO J., YU W., FU X., JIA W., and ZHAO W. Protocol-level attacks against Tor. Computer Networks, 2013, 57(4): 869-886. DOI:https://doi.org/10.1016/j.comnet.2012.11.005
CHAN-TIN E., SHIN J., and YU J. Revisiting Circuit Clogging Attacks on Tor. In: 2013 International Conference on Availability, Reliability and Security, 2013: 131-140. DOI:10.1109/ARES.2013.17
CAI X., NITHYANAND R., WANG T., JOHNSON R., and GOLDBERG I. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. In: Proceedings of the 2014 Association for Computing Machinery Conference on Computer and Communications, 2014: 227-238. DOI:10.1145/2660267.2660362
CAI X., NITHYANAND R., and JOHNSON R. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014: 121-130. DOI:10.1145/2665943.2665949
NITHYANAND R., CAI X., and JOHNSON R. Glove: A Bespoke Website Fingerprinting Defense. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014: 131-134. DOI:10.1145/2665943.2665950
JUAREZ M., AFROZ S., ACAR G., DIAZ C, and GREENSTADT R. A Critical Evaluation of Website Fingerprinting Attacks. In: Proceedings of the 2014 Association for Computing Machinery SIGSAC Conference on Computer and Communications Security, 2014: 263-274. DOI:10.1145/2660267.2660368
HE G., YANG M., GU X., LUO J., and MA Y. A Novel Active Website Fingerprinting Attack against Tor Anonymous System. In: Proceedings of the 2014 Institute of Electrical and Electronics Engineers 18th International Conference on Computer Supported Cooperative Work in Design, 2014: 112-117. DOI:10.1109/CSCWD.2014.6846826
SHAHBAR K. and ZINCIR-HEYWOOD AN. Benchmarking two techniques for Tor classification: Flow level and circuit level classification. In: 2014 Institute of Electrical and Electronics Engineers Symposium on Computational Intelligence in Cyber Security, 2014: 1-8. DOI:10.1109/CICYBS.2014.7013368
WANG T., CAI X., NITHYANAND R., JOHNSON R., and GOLDBERG I. Effective Attacks and Provable Defenses for Website Fingerprinting. In: 23rd Advanced Computing Systems Association Security Symposium. USENIX Association, 2014: 143-157. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/wang_tao
HE G., YANG M., LUO J., and GU X. Inferring Application Type Information from Tor Encrypted Traffic. In: 2014 Second International Conference on Advanced Cloud and Big Data, 2014: 220-227. DOI:10.1109/CBD.2014.37
CHAKRAVARTY S., BARBERA M. V., PORTOKALIDIS G., POLYCHRONAKIS M., and KEROMYTIS A. D. On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records. In: FALOUTSOS M, KUZMANOVIC A, eds. Passive and Active Measurement. Springer International Publishing, 2014: 247-257.
JANSEN R., TSCHORSCH F., JOHNSON A., and SCHEUERMANN B. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. In: Network and Distributed System Security Symposium, 2014.
SOLTANI M., NAJAFI S., and JALILI R. Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation. In: 2014 11th International ISC Conference on Information Security and Cryptology, 2014: 214-219. DOI:10.1109/ISCISC.2014.6994050
WINTER P., KÖWER R., MULAZZANI M., HUBER M., SCHRITTWIESER S., LINDSKOG S., and WEIPPL E. Spoiled Onions: Exposing Malicious Tor Exit Relays. In: DE CRISTOFARO E., MURDOCH S.J., eds. Privacy Enhancing Technologies. Springer International Publishing, 2014: 304-331.
HOANG N. P., ASANO Y., and YOSHIKAWA M. Anti-RAPTOR: Anti Routing Attack on Privacy for a Securer and Scalable Tor. In: 17th International Conference on Advanced Communication Technology, 2015: 147-154. DOI:10.1109/ICACT.2015.7224775
JUEN J., JOHNSON A., DAS A., BORISOV N., and CAESAR M. Defending Tor from Network Adversaries: A Case Study of Network Path Prediction. Proceedings on Privacy Enhancing Technologies, 2015, 2015(2): 171-187. https://content.sciendo.com/view/journals/popets/2015/2/article-p171.xml
GAOFENG H., MING Y., JUNZHOU L., and XIAODAN G. A novel application classification attack against Tor. Concurrency and Computation Practice and Experience, 2015, 27(18): 5640-5661. DOI:10.1002/cpe.3593
DAHAL S., LEE J., KANG J., and SHIN S. Analysis on End-to-End Node Selection Probability in Tor Network. In: 2015 International Conference on Information Networking, 2015: 46-50. DOI:10.1109/ICOIN.2015.7057855
NITHYANAND R., STAROV O., ZAIR A,. GILL P., and SCHAPIRA M. Measuring and mitigating AS-level adversaries against Tor. In: Network and Distributed System Security Symposium 2016, 2016. DOI:10.14722/ndss.2016.23322
ALMUBAYED A., HADI A., and ATOUM J. A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning. International Journal of Computer Network and Information Security, 2015, 7(7): 10-23. DOI:10.5815/ijcnis.2015.07.02
GU X., YANG M., and LUO J. A Novel Website Fingerprinting Attack Against Multi-Tab Browsing Behavior. In: Institute of Electrical and Electronics Engineers 19th International Conference on Computer Supported Cooperative Work in Design, 2015: 234-239. DOI:10.1109/CSCWD.2015.7230964
KWON A., ALSABAH M., LAZAR D., DACIER M., and DEVADAS S. Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. In: 24th Advanced Computing Systems Association Security Symposium (USENIX Security 15), 2015: 287-302. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kwon
SPRINGALL A., DEVITO C., and HUANG S. H. S. Per Connection Server-Side Identification of Connections via Tor. In: Institute of Electrical and Electronics Engineers 29th International Conference on Advanced Information Networking and Applications, 2015: 727-734. DOI:10.1109/AINA.2015.260
ISHITAKI T., ODA T., MATSUO K., BAROLLI L., and TAKIZAWA M. Performance Evaluation of a Neural Network Based Intrusion Detection System for Tor Networks Considering different Hidden Units. In: 18th International Conference on Network-Based Information Systems, 2015: 620-627. DOI:10.1109/NBiS.2015.116
SUN Y., EDMUNDSON A., VANBEVER L., LI O., REXFORD J., CHIANG M., and MITTA P. RAPTOR: Routing Attacks on Privacy in Tor. In: 24th Advanced Computing Systems Association Security Symposium (USENIX Security 15). 2015:271-286. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sun
KHAN M, SADDIQUE M, PIRZADA U, ZOHAIB M., AFZAAL ALI, WADUD B., and AHMAD I. The effect of malicious nodes on Tor security. In: 2015 International Conference on Applied Research in Computer Science and Engineering, 2015: 1-5. DOI:10.1109/ARCSE.2015.7338140
LING Z., LUO J., YU W., YANG M., and FU X. Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation. Institute of Electrical and Electronics Engineers Transactions on Parallel and Distributed Systems, 2015, 26(7): 1887-1899. DOI:10.1109/TPDS.2013.249
SHAHBAR K. and ZINCIR-HEYWOOD AN. Traffic flow analysis of Tor pluggable transports. In: 11th International Conference on Network and Service Management, 2015: 178-181. DOI:10.1109/CNSM.2015.7367356
LING Z., LUO J., WU K., YU W., and FU X. TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor. Institute of Electrical and Electronics Engineers Transactions on Information Forensics and Security, 2015, 10(12): 2515-2530. DOI:10.1109/TIFS.2015.2465934
TAN H., SHERR M., and ZHOU W. Data-plane Defenses against Routing Attacks on Tor. Proceedings on Privacy Enhancing Technologies, 2016, 2016(4): 276-293. https://content.sciendo.com/view/journals/popets/2016/4/article-p276.xml
JAHANI H. and JALILI S. A Novel Passive Website Fingerprinting Attack on Tor Using Fast Fourier Transform. Computer Communications, 2016, 6: 43-51. DOI:10.1016/j.comcom.2016.05.019
PANCHENKO A., LANZE F., PENNEKAMP J., ZINNEN A., HENZE M., WEHRLE K., and ENGEL T. Website Fingerprinting at Internet Scale. In: Network and Distributed System Security Symposium, 2016. DOI:10.14722/ndss.2016.23477
WANG T. and GOLDBERG I. On Realistically Attacking Tor with Website Fingerprinting. Proceedings on Privacy Enhancing Technologies, 2016, 2016(4): 21-36. DOI:10.1515/popets-2016-0027
HAYES J. and DANEZIS G. K-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In: 25th Advanced Computing Systems Association Security Symposium (USENIX Security 16), 2016: 1187-1203. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/hayes
MITAKIDIS E., TAKETZIS D., FAKIS A., and KAMBOURAKIS G. SnoopyBot: An Android spyware to bridge the mixes in Tor. In: 24th International Conference on Software, Telecommunications and Computer Networks, 2016: 1-5. DOI:10.1109/SOFTCOM.2016.7772180
Refbacks
- There are currently no refbacks.