Main navigation | Main content
Optional background reading:
Roger Dingledine, Nick Mathewson, and Paul F. Syverson. “Tor:
The second-generation onion router”. In USENIX Security
Symposium, pages 303–320, San Diego, CA, USA, August 2004.
[USENIX]
Main reading for March 10th:
Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp
Weinmann. “Trawling for Tor hidden services: Detection,
measurement, deanonymization”. In IEEE Symposium on Security
and Privacy (“Oakland”), pages 80–94, San
Francisco, CA, USA, May 2013.
[IEEE]
Main reading for March 12th:
Rob Jansen, Florian Tschorsch, Aaron Johnson, and Björn
Scheuermann. “The sniper attack: Anonymously deanonymizing and
disabling the Tor network”. In Network and Distributed
Systems Security Symposium (NDSS), San Diego, CA, USA, February
2014.
[Author's preprint]
Not selected:
Tsuen-Wan Ngan, Roger Dingledine, and Dan S. Wallach. “Building
incentives into Tor”. In Financial Cryptography and Data
Security (FC), pages 238–256, Tenerife, Canary Islands,
January 2010.
[Springer]
Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul
F. Syverson. “Users get routed: traffic correlation on Tor by
realistic adversaries”. In ACM Conference on Computer and
Communications Security (CCS), pages 337–348, Berlin,
Germany, November 2013.
[ACM]