[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Tor Attack Implementations (Master's Thesis: Tor & Mixes)



> On Feb 16, 2015, at 5:43 AM, Florian RÃchel <florian.ruechel.tor@xxxxxxxxxxxxxx> wrote:
> 
>>> It would also help me a lot if you can direct me to papers or articles
>>> that have shown specific attacks that are known to work on the current
>>> network.

You might want to look into the Sniper Attack as an example of how to evaluate attacks on Tor safely using Shadow:
http://www.robgjansen.com/publications/sniper-ndss2014.pdf

For those wanting to follow the Shadow thread on this topic, that starts here:
http://mailman.cs.umn.edu/archives/shadow-support/2015-February/000312.html

Best regards,
Rob
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev