[tor-talk] PaperDump: Mirai, Tor, Darknet, TLA, I2P Censorship, PETs in Sidechains, and more
grarpamp
grarpamp at gmail.com
Wed Aug 28 11:11:08 UTC 2019
https://news.softpedia.com/news/mozilla-firefox-could-soon-get-a-tor-mode-add-on-526774.shtml
https://www.zdnet.com/article/new-mirai-botnet-lurks-in-the-tor-network-to-stay-under-the-radar/
OSINT Analysis of the TOR Foundation
https://arxiv.org/pdf/1803.05201.pdf
Tempest: Temporal Dynamics in Anonymity Systems
https://arxiv.org/pdf/1801.01932.pdf
Adversaries monitoring Tor traffic crossing their jurisdictional
border and reconstructing Tor circuits
https://arxiv.org/pdf/1808.09237.pdf
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
https://arxiv.org/pdf/1808.07285.pdf
Onions in the Crosshairs: When The Man really is out to get you
https://arxiv.org/pdf/1706.10292.pdf
Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research
https://arxiv.org/pdf/1803.02816.pdf
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
https://arxiv.org/pdf/1808.01155.pdf
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
https://arxiv.org/pdf/1704.00843.pdf
Peel the onion: Recognition of Android apps behind the Tor Network
https://arxiv.org/pdf/1901.04434.pdf
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
https://arxiv.org/pdf/1902.06421.pdf
Mockingbird: Defending Against Deep-Learning-Based Website
Fingerprinting Attacks with Adversarial Traces
https://arxiv.org/pdf/1902.06626.pdf
A Forensic Audit of the Tor Browser Bundle
https://arxiv.org/pdf/1907.10279.pdf
Anomalous keys in Tor relays
https://arxiv.org/pdf/1704.00792.pdf
Mitigating Censorship with Multi-Circuit Tor and Linear Network Coding
https://arxiv.org/pdf/1907.03473.pdf
DNS-Morph: UDP-Based Bootstrapping Protocol For Tor
https://arxiv.org/pdf/1904.01240.pdf
Towards Predicting Efficient and Anonymous Tor Circuits
https://arxiv.org/pdf/1805.01977.pdf
TorPolice: Towards Enforcing Service-Defined Access Policies in
Anonymous Systems
https://arxiv.org/pdf/1708.08162.pdf
DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback
https://arxiv.org/pdf/1705.09460.pdf
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
https://arxiv.org/pdf/1801.07501.pdf
Tor Users Contributing to Wikipedia: Just Like Everybody Else?
https://arxiv.org/pdf/1904.04324.pdf
Open Dataset of Phishing and Tor Hidden Services Screen-captures
https://arxiv.org/pdf/1908.02449.pdf
A Broad Evaluation of the Tor English Content Ecosystem
https://arxiv.org/pdf/1902.06680.pdf
Structure and Content of the Visible Darknet
https://arxiv.org/pdf/1811.01348.pdf
On the Complexity of Anonymous Communication Through Public Networks
https://arxiv.org/pdf/1902.06306.pdf
A Survey of Privacy Infrastructures and Their Vulnerabilities
https://arxiv.org/pdf/1812.06226.pdf
The Effectiveness of Privacy Enhancing Technologies against Fingerprinting
https://arxiv.org/pdf/1812.03920.pdf
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
https://arxiv.org/pdf/1808.01708.pdf
An Extensive Evaluation of the Internet's Open Proxies
https://arxiv.org/pdf/1806.10258.pdf
Measuring I2P Censorship at a Global Scale
https://arxiv.org/pdf/1907.07120.pdf
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
https://arxiv.org/pdf/1809.09086.pdf
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains
https://arxiv.org/pdf/1906.04953.pdf
BlockTag: Design and applications of a tagging system for blockchain analysis
https://arxiv.org/pdf/1809.06044.pdf
Interesting that many attacks on overlay networks
seem to depend on lack of fulltime 100% capacity fill
and reclocking, and that no overlay [or underlying physical]
networks currently deploy it, nor do many nets
of other design seem to make extensive impact
upon that class of GPA. Even 14.4-56k rates could
could have interesting uses at secure levels.
More information about the tor-talk
mailing list