, The Tor Relay Guide, 2018.

M. Akhoondi, C. Yu, and H. Madhyastha, LASTor: A Low-Latency AS-Aware Tor Client, Symposium on Security and Privacy (S&P), 2012.

M. Alsabah, K. Bauer, T. Elahi, and I. Goldberg, The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting, Privacy Enhancing Technologies (PETS), vol.7981, pp.143-163, 2013.

M. Alsabah, K. Bauer, I. Goldberg, D. Grunwald, D. Mccoy et al., DefenestraTor: Throwing Out Windows in Tor, Privacy Enhancing Technologies (PETS), vol.6794, pp.134-154, 2011.

M. Alsabah and I. Goldberg, PCTCP: Per-circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013.

M. Alsabah, I. Goldberg, and I. , Performance and Security Improvements for Tor: A Survey, ACM Computing Surveys (CSUR) pp, vol.32, issue.36, pp.1-32, 2016.

A. Das and N. Borisov, Securing Anonymous Communication Channels under the Selective DoS Attack, Proceedings of Financial Cryptography and Data Security, pp.362-370, 2013.

R. Dingledine and B. Mathewson, Tor Protocol Specification. https://gitweb. torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec, 2018.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-generation Onion Router, 13th conference on USENIX Security Symposium. USENIX Association, 2004.

R. Dingledine and S. Murdoch, Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it, 2009.

J. Feigenbaum, A. Johnson, and P. Syverson, Preventing Active Timing Attacks in Low-latency Anonymous Communication, Privacy Enhancing Technologies (PETS), pp.166-183, 2010.

M. Ghosh, M. Richardson, B. Ford, and R. Jansen, A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays, 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.

M. Handley, O. Bonaventure, C. Raiciu, and A. Ford, TCP Extensions for Multipath Operation with Multiple Addresses, RFC, vol.1654, 1995.

J. Hayes, Traffic Confirmation Attacks Despite Noise, Understanding and Enhancing Online Privacy Satellite Workshop of NDSS, 2016.

J. Hayes and G. Danezis, Guard Sets for Onion Routing, Proceedings on Privacy Enhancing Technologies (PETS), 2015.

J. Hayes and G. Danezis, k-fingerprinting: A Robust Scalable Website Fingerprinting Technique, 25th USENIX Conference on Security Symposium. USENIX Association, 2016.

M. Imani, A. Barton, and M. Wright, Guard Sets in Tor using AS Relationships, Proceedings on Privacy Enhancing Technologies (PETS), 2018.

R. Jansen, J. Geddes, C. Wacek, M. Sherr, and P. F. Syverson, Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, 2014.

R. Jansen and N. Hopper, Shadow: Running Tor in a Box for Accurate and Efficient Experimentation, Proceedings of the Network and Distributed System Security Symposium (NDSS). Internet Society, 2012.

R. Jansen, A. Johnson, and P. Syverson, LIRA: Lightweight Incentivized Routing for Anonymity, 21th Annual Network and Distributed System Security Symposium (NDSS), 2013.

R. Jansen, A. Miller, P. Syverson, and B. Ford, From Onions to Shallots: Rewarding Tor Relays with TEARS, 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.

R. Jansen, P. Syverson, and N. Hopper, Throttling Tor Bandwidth Parasites, 21st USENIX Conference on Security Symposium. USENIX Association, 2012.

H. Karaoglu, M. Akgun, M. Gunes, and M. Yuksel, Multi Path Considerations for Anonymized Routing: Challenges and Opportunities, 5th International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2012.

S. Katti, J. Cohen, and D. Katabi, Information Slicing: Anonymity Using Unreliable Overlays, 4th Usenix Conference on Networked Systems Design and Implementation (NSDI). USENIX Association, 2007.

O. Landsiedel, A. Pimenidis, K. Wehrle, H. Niedermayer, and G. Carle, Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks, 50th Annual IEEE Global Telecommunications Conference (GLOBECOM), pp.64-69, 2007.

K. Loesing, S. Murdoch, and R. Jansen, Evaluation of a libutp-based Tor datagram implementation, 2013.

S. Murdoch, Comparison of Tor Datagram Designs, 2011.

A. Panchenko, F. Lanze, J. Pennekamp, T. Engel, A. Zinnen et al., Website Fingerprinting at Internet Scale. In: 23nd Annual Network and Distributed System Security Symposium (NDSS). Internet Society, 2016.

J. Reardon and I. Goldberg, Improving Tor Using a TCP-over-DTLS Tunnel, 18th Conference on USENIX Security Symposium, pp.119-134, 2009.

T. Ries, A. Panchenko, R. State, and T. Engel, Comparison of Low-Latency Anonymous Communication Systems -Practical Usage and Performance, Ninth Australasian Information Security Conference (AISC), 2011.

V. Rimmer, D. Preuveneers, M. Juarez, T. V. Goethem, and W. Joosen, Automated Website Fingerprinting through Deep Learning, 25nd Annual Network and Distributed System Security Symposium (NDSS). Internet Society, 2018.

A. Serjantov and S. Murdoch, Message Splitting Against the Partial Adversary, Privacy Enhancing Technologies (PETS), pp.26-39, 2005.

R. Snader, Path Selection for Performance-and Security-Improved Onion Routing, 2010.

R. Snader and N. Borisov, A Tune-up for Tor: Improving Security and Performance in the Tor Network, 16th Annual Network and Distributed System Security Symposium (NDSS), 2008.

R. Snader and N. Borisov, Improving Security and Performance in the Tor Network through Tunable Path Selection, IEEE Transactions on Dependable and Secure Computing, 2011.

C. Tang and I. Goldberg, An Improved Algorithm for Tor Circuit Scheduling, 17th ACM Conference on Computer and Communications Security, pp.329-339

O. Titz, Why TCP Over TCP Is A Bad Idea

F. Tschorsch and B. Scheuermann, Tor is Unfair -And What to Do about It, 36th Conference on Local Computer Networks, 2011.

F. Tschorsch and B. Scheuermann, Mind the Gap: Towards a Backpressure-based Transport Protocol for the Tor Network, 13th Usenix Conference on Networked Systems Design and Implementation (NSDI). pp. 597-610. USENIX Association, 2016.

F. Tschorsch and B. Scheurmann, How (not) to build a transport layer for anonymity overlays, Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy, 2012.

C. Viecco, UDP-OR: A Fair Onion Transport Design, 1st Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2008.

T. Wang, K. Bauer, C. Forero, and I. Goldberg, Congestion-Aware Path Selection for Tor, Financial Cryptography and Data Security (FC), pp.98-113, 2012.

T. Wang, X. Cai, R. Nithyanand, R. Johnson, and I. Goldberg, Effective Attacks and Provable Defenses for Website Fingerprinting, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, 2014.

L. Yang and F. Li, mTor: A Multipath Tor Routing Beyond Bandwidth Throttling, IEEE Conference on Communications and Network Security (CNS), pp.479-487, 2015.