Shedding light on the dark corners of the internet: A survey of tor research

S Saleh, J Qadir, MU Ilyas - Journal of Network and Computer Applications, 2018 - Elsevier
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …

Congestion-aware path selection for Tor

T Wang, K Bauer, C Forero, I Goldberg - Financial Cryptography and Data …, 2012 - Springer
Tor, an anonymity network formed by volunteer nodes, uses the estimated bandwidth of the
nodes as a central feature of its path selection algorithm. The current load on nodes is not …

DefenestraTor: Throwing out windows in Tor

M AlSabah, K Bauer, I Goldberg, D Grunwald… - … Symposium, PETS 2011 …, 2011 - Springer
Tor is one of the most widely used privacy enhancing technologies for achieving online
anonymity and resisting censorship. While conventional wisdom dictates that the level of …

VoIP network covert channels to enhance privacy and information sharing

J Saenger, W Mazurczyk, J Keller… - Future Generation …, 2020 - Elsevier
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate
data or to perform attacks in a stealthy manner. Another important usage deals with privacy …

Practical witness-key-agreement for blockchain-based dark pools financial trading

CN Ngo, F Massacci, F Kerschbaum… - … Cryptography and Data …, 2021 - Springer
We introduce a new cryptographic scheme, Witness Key Agreement (WKA), that allows a
party to securely agree on a secret key with a counter party holding publicly committed …

Application of deep recurrent neural networks for prediction of user behavior in tor networks

T Ishitaki, R Obukata, T Oda… - 2017 31st international …, 2017 - ieeexplore.ieee.org
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a
useful tool for malicious users. With Tor, the users are able to compromise the non …

Navigator: Finding faster paths to anonymity

R Annessi, M Schmiedecker - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
The Tor network is currently by far the most popular system for providing anonymity on the
Internet. Even though both latency and throughput have been significantly improved in …

Improving performance and anonymity in the Tor network

A Panchenko, F Lanze, T Engel - 2012 IEEE 31st International …, 2012 - ieeexplore.ieee.org
Anonymous communication aims to hide the relationship between communicating parties on
the Internet. It is the technical basis for achieving privacy and overcoming censorship …

Mind the gap: Towards a {Backpressure-Based} transport protocol for the tor network

F Tschorsch, B Scheuermann - 13th USENIX Symposium on Networked …, 2016 - usenix.org
Tor has become the prime example for anonymous communication systems. With increasing
popularity, though, Tor is also faced with increasing load. In this paper, we tackle one of the …

Donar: Anonymous {VoIP} over Tor

YD Bromberg, Q Dufour, D Frey, E Rivière - 19th USENIX Symposium …, 2022 - usenix.org
We present DONAR, a system enabling anonymous VoIP with good quality-of-experience
(QoE) over Tor. No individual Tor link can match VoIP networking requirements. DONAR …