, The Tor Relay Guide, 2018.
LASTor: A Low-Latency AS-Aware Tor Client, Symposium on Security and Privacy (S&P), 2012. ,
The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting, Privacy Enhancing Technologies (PETS), vol.7981, pp.143-163, 2013. ,
DefenestraTor: Throwing Out Windows in Tor, Privacy Enhancing Technologies (PETS), vol.6794, pp.134-154, 2011. ,
PCTCP: Per-circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013. ,
Performance and Security Improvements for Tor: A Survey, ACM Computing Surveys (CSUR) pp, vol.32, issue.36, pp.1-32, 2016. ,
Securing Anonymous Communication Channels under the Selective DoS Attack, Proceedings of Financial Cryptography and Data Security, pp.362-370, 2013. ,
Tor Protocol Specification. https://gitweb. torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec, 2018. ,
Tor: The Second-generation Onion Router, 13th conference on USENIX Security Symposium. USENIX Association, 2004. ,
Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it, 2009. ,
Preventing Active Timing Attacks in Low-latency Anonymous Communication, Privacy Enhancing Technologies (PETS), pp.166-183, 2010. ,
A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays, 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. ,
TCP Extensions for Multipath Operation with Multiple Addresses, RFC, vol.1654, 1995. ,
Traffic Confirmation Attacks Despite Noise, Understanding and Enhancing Online Privacy Satellite Workshop of NDSS, 2016. ,
Guard Sets for Onion Routing, Proceedings on Privacy Enhancing Technologies (PETS), 2015. ,
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique, 25th USENIX Conference on Security Symposium. USENIX Association, 2016. ,
Guard Sets in Tor using AS Relationships, Proceedings on Privacy Enhancing Technologies (PETS), 2018. ,
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, 2014. ,
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation, Proceedings of the Network and Distributed System Security Symposium (NDSS). Internet Society, 2012. ,
LIRA: Lightweight Incentivized Routing for Anonymity, 21th Annual Network and Distributed System Security Symposium (NDSS), 2013. ,
From Onions to Shallots: Rewarding Tor Relays with TEARS, 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. ,
Throttling Tor Bandwidth Parasites, 21st USENIX Conference on Security Symposium. USENIX Association, 2012. ,
Multi Path Considerations for Anonymized Routing: Challenges and Opportunities, 5th International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2012. ,
Information Slicing: Anonymity Using Unreliable Overlays, 4th Usenix Conference on Networked Systems Design and Implementation (NSDI). USENIX Association, 2007. ,
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks, 50th Annual IEEE Global Telecommunications Conference (GLOBECOM), pp.64-69, 2007. ,
Evaluation of a libutp-based Tor datagram implementation, 2013. ,
Comparison of Tor Datagram Designs, 2011. ,
, Website Fingerprinting at Internet Scale. In: 23nd Annual Network and Distributed System Security Symposium (NDSS). Internet Society, 2016.
Improving Tor Using a TCP-over-DTLS Tunnel, 18th Conference on USENIX Security Symposium, pp.119-134, 2009. ,
Comparison of Low-Latency Anonymous Communication Systems -Practical Usage and Performance, Ninth Australasian Information Security Conference (AISC), 2011. ,
Automated Website Fingerprinting through Deep Learning, 25nd Annual Network and Distributed System Security Symposium (NDSS). Internet Society, 2018. ,
Message Splitting Against the Partial Adversary, Privacy Enhancing Technologies (PETS), pp.26-39, 2005. ,
Path Selection for Performance-and Security-Improved Onion Routing, 2010. ,
A Tune-up for Tor: Improving Security and Performance in the Tor Network, 16th Annual Network and Distributed System Security Symposium (NDSS), 2008. ,
Improving Security and Performance in the Tor Network through Tunable Path Selection, IEEE Transactions on Dependable and Secure Computing, 2011. ,
An Improved Algorithm for Tor Circuit Scheduling, 17th ACM Conference on Computer and Communications Security, pp.329-339 ,
, Why TCP Over TCP Is A Bad Idea
Tor is Unfair -And What to Do about It, 36th Conference on Local Computer Networks, 2011. ,
Mind the Gap: Towards a Backpressure-based Transport Protocol for the Tor Network, 13th Usenix Conference on Networked Systems Design and Implementation (NSDI). pp. 597-610. USENIX Association, 2016. ,
How (not) to build a transport layer for anonymity overlays, Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy, 2012. ,
UDP-OR: A Fair Onion Transport Design, 1st Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2008. ,
Congestion-Aware Path Selection for Tor, Financial Cryptography and Data Security (FC), pp.98-113, 2012. ,
Effective Attacks and Provable Defenses for Website Fingerprinting, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, 2014. ,
mTor: A Multipath Tor Routing Beyond Bandwidth Throttling, IEEE Conference on Communications and Network Security (CNS), pp.479-487, 2015. ,