Evolution of dark web threat analysis and detection: A systematic approach

S Nazah, S Huda, J Abawajy, MM Hassan - Ieee Access, 2020 - ieeexplore.ieee.org
Dark Web is one of the most challenging and untraceable mediums adopted by the cyber
criminals, terrorists, and state-sponsored spies to fulfil their illicit motives. Cyber-crimes …

De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

Users get routed: Traffic correlation on Tor by realistic adversaries

A Johnson, C Wacek, R Jansen, M Sherr… - Proceedings of the 2013 …, 2013 - dl.acm.org
We present the first analysis of the popular Tor anonymity network that indicates the security
of typical users against reasonably realistic adversaries in the Tor network or in the …

{RAPTOR}: Routing attacks on privacy in tor

Y Sun, A Edmundson, L Vanbever, O Li… - 24th USENIX Security …, 2015 - usenix.org
The Tor network is a widely used system for anonymous communication. However, Tor is
known to be vulnerable to attackers who can observe traffic at both ends of the …

Evolving privacy: From sensors to the Internet of Things

J Lopez, R Rios, F Bao, G Wang - Future Generation Computer Systems, 2017 - Elsevier
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …

SoK: secure messaging

N Unger, S Dechand, J Bonneau, S Fahl… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …

Circuit fingerprinting attacks: Passive deanonymization of tor hidden services

A Kwon, M AlSabah, D Lazar, M Dacier… - 24th USENIX Security …, 2015 - usenix.org
This paper sheds light on crucial weaknesses in the design of hidden services that allow us
to break the anonymity of hidden service clients and operators passively. In particular, we …

Shadow: Running Tor in a box for accurate and efficient experimentation

R Jansen, NJ Hopper - 2011 - conservancy.umn.edu
Tor is a large and popular overlay network providing both anonymity to its users and a
platform for anonymous communication research. New design proposals and attacks on the …

[PDF][PDF] The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.

R Jansen, F Tschorsch, A Johnson, B Scheuermann - NDSS, 2014 - covert.io
Tor is a distributed onion-routing network used for achieving anonymity and resisting
censorship online. Because of Tor's growing popularity, it is attracting increasingly larger …

[PDF][PDF] Inside Job: Applying Traffic Analysis to Measure Tor from Within.

R Jansen, M Juarez, R Galvez, T Elahi, C Diaz - NDSS, 2018 - homes.esat.kuleuven.be
In this paper, we explore traffic analysis attacks on Tor that are conducted solely with middle
relays rather than with relays from the entry or exit positions. We create a methodology to …