De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Shedding light on the dark corners of the internet: A survey of tor research

S Saleh, J Qadir, MU Ilyas - Journal of Network and Computer Applications, 2018 - Elsevier
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …

Don't shoot the messenger: Localization prevention of satellite internet users

D Koisser, R Mitev, M Chilese… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Satellite Internet plays an increasingly important role in geopolitical conflicts. This notion
was affirmed in the Ukrainian conflict escalating at the beginning of 2022, with the large …

Orbital Trust and Privacy:{SoK} on {PKI} and Location Privacy Challenges in Space Networks

D Koisser, R Mitev, N Yadav, F Vollmer… - 33rd USENIX Security …, 2024 - usenix.org
The dynamic evolution of the space sector, often referred to as" New Space," has led to
increased commercialization and innovation. This transformation is characterized by a surge …

Analysis of the paradigm on tor attack studies

MAIM Aminuddin, ZF Zaaba… - 2020 8th …, 2020 - ieeexplore.ieee.org
The massive popularity of Tor as an anonymity platform is undeniable as researchers have
studied multiple attacks on the platform. With various attack studies that had been published …

Attacking tor through unpopular ports

MA Sulaiman, S Zhioua - 2013 IEEE 33rd International …, 2013 - ieeexplore.ieee.org
Anonymity systems try to conceal the relationship between the communicating entities in
network communication. Popular systems, such as Tor and JAP, achieve anonymity by …

Improving Security and Performance in Low Latency Anonymous Networks

KS Bauer - 2011 - search.proquest.com
Conventional wisdom dictates that the level of anonymity offered by low latency anonymity
networks increases as the user base grows. However, the most significant obstacle to …

Advanced Trust-establishing Methods in Next-generation Spacecraft Networks

D Koisser - tuprints.ulb.tu-darmstadt.de
With the rapidly increasing connectivity of an enormous number of devices, a trend has
emerged: interconnected devices collaborating to form complex networks that deliver novel …

Sigma: Security and interoperability for heterogeneous distributed systems

T Benzel, D Sterne, P Pasturel, G Tally… - Proceedings DARPA …, 2000 - ieeexplore.ieee.org
The DARPA ITO sponsored Sigma project was a three-year research effort (September 1995-
September 1998) which investigated the integration and interoperation of security …

Tor Attack Studies: A Survey on Active and Passive Subject

MAIM Aminuddin, ZF Zaaba, A Samsudin… - Journal of Hunan …, 2021 - jonuns.com
Privacy is one of the important aspects that the Internet user would like to protect. The
introduction of Tor as a tool for anonymous Internet access has attracted the attention of …