Mitseva, Asya ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Engel, Thomas ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Panchenko, Andriy; Brandenburg University of Technology > Chair of IT Security
External co-authors :
yes
Language :
English
Title :
Analyzing PeerFlow -- A Bandwidth Estimation System for Untrustworthy Environments
Publication date :
March 2020
Event name :
GI SICHERHEIT
Event place :
Goettingen, Germany
Event date :
from 17-03-2020 to 20-03-2020
Main work title :
Analyzing PeerFlow -- A Bandwidth Estimation System for Untrustworthy Environments
[bib18] Tor Directory Protocol, Version 3. https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt, 2018.
[BMG 07] Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. Low-resource Routing Attacks Against Tor. In Workshop on Privacy in Electronic Society, pages 11-20, Alexandria, USA, October 2007. ACM.
[BPW13] Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. In Symposium on Security and Privacy, pages 80-94, Berkeley, USA, May 2013. IEEE.
[DM18a] Roger Dingledine and Nick Mathewson. Tor Path Specification. https://gitweb.torproject.org/torspec.git/plain/path-spec.txt, 2018.
[DM18b] Roger Dingledine and Nick Mathewson. Tor Protocol Specification. https://gitweb.torproject.org/torspec.git/plain/tor-spec.txt, 2018.
[DMS04] Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The Second-generation Onion Router. In 13th conference on USENIX Security Symposium, San Diego, USA, August 2004. USENIX Association.
[JH12] Rob Jansen and Nicholas Hopper. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. In 19rd Network and Distributed System Security Symposium, San Diego, USA, February 2012. Internet Society.
[JJH 17] Aaron Johnson, Rob Jansen, Nicholas Hopper, Aaron Segal, and Paul Syverson. PeerFlow: Secure Load Balancing in Tor. 17th Symposium on Privacy Enhancing Technologies, pages 74-94, July 2017.
[JWJ 13] Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. In 20th conference on Computer and Communications Security, pages 337-348, Berlin, Germany, November 2013. ACM.
[LPG11] Karsten Loesing, Mike Perry, and Aaron Gibson. Bandwidth Scanner specification. https://github.com/AdrienLE/torflow/blob/master/NetworkScanners/BwAuthority/README.spec.txt, 2011.
[Met19] Tor Metrics. https://metrics.torproject.org/, 2019.
[Per09] Mike Perry. TorFlow: Tor Network Analysis. In 2nd Hot Topics in Privacy Enhancing Technologies, Seattle, WA, USA, August 2009. Springer.
[PLZ 16] Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle, and Thomas Engel. Website Fingerprinting at Internet Scale. In 23rd Network and Distributed System Security Symposium, San Diego, USA, February 2016. Internet Society.
[PR09] Andriy Panchenko and Johannes Renner. Path Selection Metrics for Performance-Improved Onion Routing. In 9th IEEE/IPSJ Symposium on Applications and the Internet, Seattle, USA, July 2009. IEEE.
[SB08] Robin Snader and Nikita Borisov. A Tune-up for Tor: Improving Security and Performance in the Tor Network. In 16th Network and Distributed System Security Symposium, San Diego, USA, February 2008. Internet Society.
[SB09] Robin Snader and Nikita Borisov. EigenSpeed: Secure Peer-to-peer Bandwidth Evaluation. In 8th International Conference on Peer-to-peer Systems, Boston, USA, April 2009. USENIX Association.
[SB11] Robin Snader and Nikita Borisov. Improving Security and Performance in the Tor Network through Tunable Path Selection. IEEE Transactions on Dependable and Secure Computing, 8(5):728-741, September-October 2011.
[SBL09] Micah Sherr, Matt Blaze, and Boon Thau Loo. Scalable Link-based Relay Selection for Anonymous Routing. In 9th Symposium on Privacy Enhancing Technologies, Seattle, USA, August 2009. Springer.
[SIJW18] Payap Sirinam, Mohsen Imani, Marc Juarez, and Matthew Wright. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. In 25th conference on Computer and Communications Security, pages 1928-1943, Toronto, Canada, October 2018. ACM.
[SNDW06] Atul Singh, Tsuen-Wan ŞJohnnyŤ Ngan, Peter Druschel, and Dan S. Wallach. Eclipse Attacks on Overlay Networks: Threats and Defenses. In 25th International Conference on Computer Communications, Barcelona, Spain, April 2006. IEEE.