A survey on routing in anonymous communication protocols

F Shirazi, M Simeonovski, MR Asghar… - ACM Computing …, 2018 - dl.acm.org
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …

Deepcorr: Strong flow correlation attacks on tor using deep learning

M Nasr, A Bahramali, A Houmansadr - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …

A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

DeepCoFFEA: Improved flow correlation attacks on Tor via metric learning and amplification

SE Oh, T Yang, N Mathews, JK Holland… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
End-to-end flow correlation attacks are among the oldest known attacks on low-latency
anonymity networks, and are treated as a core primitive for traffic analysis of Tor. However …

Counter-RAPTOR: Safeguarding Tor against active routing attacks

Y Sun, A Edmundson, N Feamster… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Tor is vulnerable to network-level adversaries who can observe both ends of the
communication to deanonymize users. Recent work has shown that Tor is susceptible to the …

On the {Routing-Aware} peering against {Network-Eclipse} attacks in bitcoin

M Tran, A Shenoi, MS Kang - 30th USENIX Security Symposium …, 2021 - usenix.org
Safeguarding blockchain peer-to-peer (P2P) networks is more critical than ever in light of
recent network attacks. Bitcoin has been successfully handling traditional Sybil and eclipse …

Shortor: Improving tor network latency via multi-hop overlay routing

K Hogan, S Servan-Schreiber… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
We present ShorTor, a protocol for reducing latency on the Tor network. ShorTor uses multi-
hop overlay routing, a technique typically employed by content delivery networks, to …

Once is never enough: Foundations for sound statistical inference in Tor network experimentation

R Jansen, J Tracey, I Goldberg - 30th USENIX Security Symposium …, 2021 - usenix.org
Tor is a popular low-latency anonymous communication system that focuses on usability
and performance: a faster network will attract more users, which in turn will improve the …

CLAM: Client-aware routing in mix networks

M Rahimi - Proceedings of the 2024 ACM Workshop on …, 2024 - dl.acm.org
Mix networks (mixnets) enhance anonymity at the cost of increased end-to-end latency,
deterring clients from adopting mixnets for web browsing or instant messaging. This often …

CLAPS: Client-location-aware path selection in Tor

F Rochet, R Wails, A Johnson, P Mittal… - Proceedings of the 2020 …, 2020 - dl.acm.org
Much research has investigated improving the security and performance of Tor by having
Tor clients choose paths through the network in a way that depends on the client's location …