Proceedings of the First International Workshop on Information Hiding
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Low-Cost Traffic Analysis of Tor
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Hot or not: revealing hidden services by their clock skew
Proceedings of the 13th ACM conference on Computer and communications security
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Mapping internet sensors with probe response attacks
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Vulnerabilities of passive internet threat monitors
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Legal issues surrounding monitoring during network research
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Low-resource routing attacks against tor
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Nymble: anonymous IP-address blocking
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Performance comparison of low-latency anonymisation services from a user perspective
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
On the security of the tor authentication protocol
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Recruiting new tor relays with BRAIDS
Proceedings of the 17th ACM conference on Computer and communications security
An improved algorithm for tor circuit scheduling
Proceedings of the 17th ACM conference on Computer and communications security
Anonymity and monitoring: how to monitor the infrastructure of an anonymity system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Preventing active timing attacks in low-latency anonymous communication
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
MOR: monitoring and measurements through the onion router
PAM'10 Proceedings of the 11th international conference on Passive and active measurement
A case study on measuring statistical data in the tor anonymity network
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
An analysis of anonymity technology usage
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
ExperimenTor: a testbed for safe and realistic tor experimentation
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
DefenestraTor: throwing out windows in Tor
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Website fingerprinting in onion routing based anonymization networks
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Proceedings of the 27th Annual Computer Security Applications Conference
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
The market failure of anonymity services
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Tor HTTP usage and information leakage
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Distribution of digital games via BitTorrent
Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments
Detecting traffic snooping in tor using decoys
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
TMA'12 Proceedings of the 4th international conference on Traffic Monitoring and Analysis
Breaking Tor anonymity with game theory and data mining
Concurrency and Computation: Practice & Experience
Anonymous overlay network supporting authenticated routing
Information Sciences: an International Journal
Enforced community standards for research on users of the tor anonymity network
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Throttling Tor bandwidth parasites
Security'12 Proceedings of the 21st USENIX conference on Security symposium
A new cell-counting-based attack against Tor
IEEE/ACM Transactions on Networking (TON)
Methodically modeling the Tor network
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Collaborative red teaming for anonymity system evaluation
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Torchestra: reducing interactive traffic delays over tor
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Enhancing Tor's performance using real-time traffic classification
Proceedings of the 2012 ACM conference on Computer and communications security
A bird's eye view on the I2P anonymous file-sharing environment
NSS'12 Proceedings of the 6th international conference on Network and System Security
Patterns in the distribution of digital games via BitTorrent
International Journal of Advanced Media and Communication
Review: An overview of anonymity technology usage
Computer Communications
POSTER: PnP: improving web browsing performance over tor using web resource prefetch-and-push
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Please slow down!: the impact on tor performance from mobility
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
Hi-index | 0.00 |
To date, there has yet to be a study that characterizes the usage of a real deployed anonymity service. We present observations and analysis obtained by participating in the Tor network. Our primary goals are to better understand Tor as it is deployed and through this understanding, propose improvements. In particular, we are interested in answering the following questions: (1) How is Tor being used? (2) How is Tor being mis-used? (3) Who is using Tor?To sample the results, we show that web traffic makes up the majority of the connections and bandwidth, but non-interactive protocols consume a disproportionately large amount of bandwidth when compared to interactive protocols. We provide a survey of how Tor is being misused, both by clients and by Tor router operators. In particular, we develop a method for detecting exit router logging (in certain cases). Finally, we present evidence that Tor is used throughout the world, but router participation is limited to only a few countries.