Evolution of dark web threat analysis and detection: A systematic approach
Dark Web is one of the most challenging and untraceable mediums adopted by the cyber
criminals, terrorists, and state-sponsored spies to fulfil their illicit motives. Cyber-crimes …
criminals, terrorists, and state-sponsored spies to fulfil their illicit motives. Cyber-crimes …
De-anonymisation attacks on tor: A survey
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …
Users get routed: Traffic correlation on Tor by realistic adversaries
We present the first analysis of the popular Tor anonymity network that indicates the security
of typical users against reasonably realistic adversaries in the Tor network or in the …
of typical users against reasonably realistic adversaries in the Tor network or in the …
{RAPTOR}: Routing attacks on privacy in tor
The Tor network is a widely used system for anonymous communication. However, Tor is
known to be vulnerable to attackers who can observe traffic at both ends of the …
known to be vulnerable to attackers who can observe traffic at both ends of the …
Evolving privacy: From sensors to the Internet of Things
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …
interacting things capable of offering all sorts of services to near and remote entities. The …
SoK: secure messaging
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …
many solutions now claim to offer secure and private messaging. This includes both a large …
Circuit fingerprinting attacks: Passive deanonymization of tor hidden services
This paper sheds light on crucial weaknesses in the design of hidden services that allow us
to break the anonymity of hidden service clients and operators passively. In particular, we …
to break the anonymity of hidden service clients and operators passively. In particular, we …
Shadow: Running Tor in a box for accurate and efficient experimentation
Tor is a large and popular overlay network providing both anonymity to its users and a
platform for anonymous communication research. New design proposals and attacks on the …
platform for anonymous communication research. New design proposals and attacks on the …
[PDF][PDF] The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.
Tor is a distributed onion-routing network used for achieving anonymity and resisting
censorship online. Because of Tor's growing popularity, it is attracting increasingly larger …
censorship online. Because of Tor's growing popularity, it is attracting increasingly larger …
[PDF][PDF] Inside Job: Applying Traffic Analysis to Measure Tor from Within.
In this paper, we explore traffic analysis attacks on Tor that are conducted solely with middle
relays rather than with relays from the entry or exit positions. We create a methodology to …
relays rather than with relays from the entry or exit positions. We create a methodology to …