[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] PaperDump: Mirai, Tor, Darknet, TLA, I2P Censorship, PETs in Sidechains, and more



Hey,

This list is mixing good papers with several dubious ones.

I find important to mention that it would be better looking here instead 
for non-expert readers: https://www.freehaven.net/anonbib/ to find 
quality peer-reviewed works, and keep the ones that intersect both lists 
for now.

Best,

On 28.08.19 13:11, grarpamp wrote:
> https://news.softpedia.com/news/mozilla-firefox-could-soon-get-a-tor-mode-add-on-526774.shtml
> https://www.zdnet.com/article/new-mirai-botnet-lurks-in-the-tor-network-to-stay-under-the-radar/
>
>
> OSINT Analysis of the TOR Foundation
> https://arxiv.org/pdf/1803.05201.pdf
>
> Tempest: Temporal Dynamics in Anonymity Systems
> https://arxiv.org/pdf/1801.01932.pdf
>
> Adversaries monitoring Tor traffic crossing their jurisdictional
> border and reconstructing Tor circuits
> https://arxiv.org/pdf/1808.09237.pdf
>
> DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
> https://arxiv.org/pdf/1808.07285.pdf
>
> Onions in the Crosshairs: When The Man really is out to get you
> https://arxiv.org/pdf/1706.10292.pdf
>
> Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research
> https://arxiv.org/pdf/1803.02816.pdf
>
> Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
> https://arxiv.org/pdf/1808.01155.pdf
>
> Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
> https://arxiv.org/pdf/1704.00843.pdf
>
> Peel the onion: Recognition of Android apps behind the Tor Network
> https://arxiv.org/pdf/1901.04434.pdf
>
> Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
> https://arxiv.org/pdf/1902.06421.pdf
>
> Mockingbird: Defending Against Deep-Learning-Based Website
> Fingerprinting Attacks with Adversarial Traces
> https://arxiv.org/pdf/1902.06626.pdf
>
> A Forensic Audit of the Tor Browser Bundle
> https://arxiv.org/pdf/1907.10279.pdf
>
> Anomalous keys in Tor relays
> https://arxiv.org/pdf/1704.00792.pdf
>
> Mitigating Censorship with Multi-Circuit Tor and Linear Network Coding
> https://arxiv.org/pdf/1907.03473.pdf
>
> DNS-Morph: UDP-Based Bootstrapping Protocol For Tor
> https://arxiv.org/pdf/1904.01240.pdf
>
> Towards Predicting Efficient and Anonymous Tor Circuits
> https://arxiv.org/pdf/1805.01977.pdf
>
> TorPolice: Towards Enforcing Service-Defined Access Policies in
> Anonymous Systems
> https://arxiv.org/pdf/1708.08162.pdf
>
> DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback
> https://arxiv.org/pdf/1705.09460.pdf
>
>
> Deanonymizing Tor hidden service users through Bitcoin transactions analysis
> https://arxiv.org/pdf/1801.07501.pdf
>
> Tor Users Contributing to Wikipedia: Just Like Everybody Else?
> https://arxiv.org/pdf/1904.04324.pdf
>
> Open Dataset of Phishing and Tor Hidden Services Screen-captures
> https://arxiv.org/pdf/1908.02449.pdf
>
> A Broad Evaluation of the Tor English Content Ecosystem
> https://arxiv.org/pdf/1902.06680.pdf
>
> Structure and Content of the Visible Darknet
> https://arxiv.org/pdf/1811.01348.pdf
>
> On the Complexity of Anonymous Communication Through Public Networks
> https://arxiv.org/pdf/1902.06306.pdf
>
> A Survey of Privacy Infrastructures and Their Vulnerabilities
> https://arxiv.org/pdf/1812.06226.pdf
>
> The Effectiveness of Privacy Enhancing Technologies against Fingerprinting
> https://arxiv.org/pdf/1812.03920.pdf
>
> Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
> https://arxiv.org/pdf/1808.01708.pdf
>
> An Extensive Evaluation of the Internet's Open Proxies
> https://arxiv.org/pdf/1806.10258.pdf
>
>
>
> Measuring I2P Censorship at a Global Scale
> https://arxiv.org/pdf/1907.07120.pdf
>
> An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
> https://arxiv.org/pdf/1809.09086.pdf
>
>
> Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains
> https://arxiv.org/pdf/1906.04953.pdf
>
> BlockTag: Design and applications of a tagging system for blockchain analysis
> https://arxiv.org/pdf/1809.06044.pdf
>
>
> Interesting that many attacks on overlay networks
> seem to depend on lack of fulltime 100% capacity fill
> and reclocking, and that no overlay [or underlying physical]
> networks currently deploy it, nor do many nets
> of other design seem to make extensive impact
> upon that class of GPA. Even 14.4-56k rates could
> could have interesting uses at secure levels.
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk