University of Minnesota
Security and Privacy in Computing
index.php

Readings on: anonymity overlays / Tor

Optional background reading: Roger Dingledine, Nick Mathewson, and Paul F. Syverson. “Tor: The second-generation onion router”. In USENIX Security Symposium, pages 303–320, San Diego, CA, USA, August 2004.
[USENIX]

Main reading for March 10th: Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann. “Trawling for Tor hidden services: Detection, measurement, deanonymization”. In IEEE Symposium on Security and Privacy (“Oakland”), pages 80–94, San Francisco, CA, USA, May 2013.
[IEEE]

Main reading for March 12th: Rob Jansen, Florian Tschorsch, Aaron Johnson, and Björn Scheuermann. “The sniper attack: Anonymously deanonymizing and disabling the Tor network”. In Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA, February 2014.
[Author's preprint]

Not selected: Tsuen-Wan Ngan, Roger Dingledine, and Dan S. Wallach. “Building incentives into Tor”. In Financial Cryptography and Data Security (FC), pages 238–256, Tenerife, Canary Islands, January 2010.
[Springer]

Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul F. Syverson. “Users get routed: traffic correlation on Tor by realistic adversaries”. In ACM Conference on Computer and Communications Security (CCS), pages 337–348, Berlin, Germany, November 2013.
[ACM]