Profil

PUSTOGAROV Ivan

Main Referenced Co-authors
BIRYUKOV, Alex  (7)
Weinmann, Ralf-Philipp  (4)
KHOVRATOVICH, Dmitry  (1)
Thill, Fabrice (1)
Main Referenced Keywords
Tor (7); privacy (4); anonymity (3); Bitcoin (2); hidden service (2);
Main Referenced Unit & Research Centers
Security and Trust (1)
Main Referenced Disciplines
Computer science (8)

Publications (total 8)

The most downloaded
14053 downloads
Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM. https://hdl.handle.net/10993/18679

The most cited

340 citations (Scopus®)

Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM. https://hdl.handle.net/10993/18679

Pustogarov, I. (2015). Deanonymisation techniques for Tor and Bitcoin [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/21798

Biryukov, A., & Pustogarov, I. (2015). Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. In Financial Cryptography and Data Security - 19th International Conference (pp. 10). Springer International Publishing.
Peer reviewed

Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. In ACM Conference on Computer and Communications Security (CCS). ACM.
Peer reviewed

Biryukov, A., & Pustogarov, I. (2014). Bitcoin over Tor isn't a good idea. In 2015 IEEE Symposium on Security and Privacy (pp. 122-134). IEEE Computer Society.
Peer reviewed

Biryukov, A., Pustogarov, I., Thill, F., & Weinmann, R.-P. (2014). Content and popularity analysis of Tor hidden services. In proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops. IEEE Computer Society.
Peer reviewed

Biryukov, A., Pustogarov, I., & Weinmann, R.-P. (2013). Trawling for tor hidden services: Detection, measurement, deanonymization. In 2013 IEEE Symposium on Security and Privacy (SP). United States: IEEE Computer Society. doi:10.1109/SP.2013.15
Peer reviewed

Biryukov, A., Pustogarov, I., & Weinmann, R.-P. (2012). TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security (pp. 469-486). Springer.
Peer reviewed

Biryukov, A., Pustogarov, I., & Weinmann, R.-P. (2012). TorScan: Deanonymizing Connections Using Topology Leaks. ERCIM News, (90), 29-29.
Peer reviewed

Contact ORBilu