Reference : TorScan: Deanonymizing Connections Using Topology Leaks
Scientific journals : Article
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/17510
TorScan: Deanonymizing Connections Using Topology Leaks
English
Biryukov, Alex mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Pustogarov, Ivan mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Weinmann, Ralf-Philipp mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
2012
ERCIM News
ERCIM EEIG
90
29-29
Yes
0926-4981
[en] Tor ; anonymity ; privacy
[en] Tor is one of the most widely used tools for providing anonymity on the Internet. We have devised novel attacks against the Tor network that can compromise the anonymity of users accessing services that exhibit frequent and predictable communication patterns and users establishing long-lived connections.
http://hdl.handle.net/10993/17510

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
TorScan.pdfAuthor postprint618.57 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.