Hey, This list is mixing good papers with several dubious ones.
I find important to mention that it would be better looking here instead for non-expert readers: https://www.freehaven.net/anonbib/ to find quality peer-reviewed works, and keep the ones that intersect both lists for now. Best, On 28.08.19 13:11, grarpamp wrote: > https://news.softpedia.com/news/mozilla-firefox-could-soon-get-a-tor-mode-add-on-526774.shtml > https://www.zdnet.com/article/new-mirai-botnet-lurks-in-the-tor-network-to-stay-under-the-radar/ > > > OSINT Analysis of the TOR Foundation > https://arxiv.org/pdf/1803.05201.pdf > > Tempest: Temporal Dynamics in Anonymity Systems > https://arxiv.org/pdf/1801.01932.pdf > > Adversaries monitoring Tor traffic crossing their jurisdictional > border and reconstructing Tor circuits > https://arxiv.org/pdf/1808.09237.pdf > > DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning > https://arxiv.org/pdf/1808.07285.pdf > > Onions in the Crosshairs: When The Man really is out to get you > https://arxiv.org/pdf/1706.10292.pdf > > Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research > https://arxiv.org/pdf/1803.02816.pdf > > Adaptive Traffic Fingerprinting for Darknet Threat Intelligence > https://arxiv.org/pdf/1808.01155.pdf > > Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks > https://arxiv.org/pdf/1704.00843.pdf > > Peel the onion: Recognition of Android apps behind the Tor Network > https://arxiv.org/pdf/1901.04434.pdf > > Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks > https://arxiv.org/pdf/1902.06421.pdf > > Mockingbird: Defending Against Deep-Learning-Based Website > Fingerprinting Attacks with Adversarial Traces > https://arxiv.org/pdf/1902.06626.pdf > > A Forensic Audit of the Tor Browser Bundle > https://arxiv.org/pdf/1907.10279.pdf > > Anomalous keys in Tor relays > https://arxiv.org/pdf/1704.00792.pdf > > Mitigating Censorship with Multi-Circuit Tor and Linear Network Coding > https://arxiv.org/pdf/1907.03473.pdf > > DNS-Morph: UDP-Based Bootstrapping Protocol For Tor > https://arxiv.org/pdf/1904.01240.pdf > > Towards Predicting Efficient and Anonymous Tor Circuits > https://arxiv.org/pdf/1805.01977.pdf > > TorPolice: Towards Enforcing Service-Defined Access Policies in > Anonymous Systems > https://arxiv.org/pdf/1708.08162.pdf > > DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback > https://arxiv.org/pdf/1705.09460.pdf > > > Deanonymizing Tor hidden service users through Bitcoin transactions analysis > https://arxiv.org/pdf/1801.07501.pdf > > Tor Users Contributing to Wikipedia: Just Like Everybody Else? > https://arxiv.org/pdf/1904.04324.pdf > > Open Dataset of Phishing and Tor Hidden Services Screen-captures > https://arxiv.org/pdf/1908.02449.pdf > > A Broad Evaluation of the Tor English Content Ecosystem > https://arxiv.org/pdf/1902.06680.pdf > > Structure and Content of the Visible Darknet > https://arxiv.org/pdf/1811.01348.pdf > > On the Complexity of Anonymous Communication Through Public Networks > https://arxiv.org/pdf/1902.06306.pdf > > A Survey of Privacy Infrastructures and Their Vulnerabilities > https://arxiv.org/pdf/1812.06226.pdf > > The Effectiveness of Privacy Enhancing Technologies against Fingerprinting > https://arxiv.org/pdf/1812.03920.pdf > > Where The Light Gets In: Analyzing Web Censorship Mechanisms in India > https://arxiv.org/pdf/1808.01708.pdf > > An Extensive Evaluation of the Internet's Open Proxies > https://arxiv.org/pdf/1806.10258.pdf > > > > Measuring I2P Censorship at a Global Scale > https://arxiv.org/pdf/1907.07120.pdf > > An Empirical Study of the I2P Anonymity Network and its Censorship Resistance > https://arxiv.org/pdf/1809.09086.pdf > > > Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains > https://arxiv.org/pdf/1906.04953.pdf > > BlockTag: Design and applications of a tagging system for blockchain analysis > https://arxiv.org/pdf/1809.06044.pdf > > > Interesting that many attacks on overlay networks > seem to depend on lack of fulltime 100% capacity fill > and reclocking, and that no overlay [or underlying physical] > networks currently deploy it, nor do many nets > of other design seem to make extensive impact > upon that class of GPA. Even 14.4-56k rates could > could have interesting uses at secure levels. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk