ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1109.0597
  4. Cited By
Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using
  Throughput Fingerprinting
v1v2 (latest)

Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting

3 September 2011
Prateek Mittal
Ahmed Khurshid
Joshua Juen
M. Caesar
Nikita Borisov
ArXiv (abs)PDFHTML

Papers citing "Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting"

24 / 24 papers shown
Title
SaTor: Satellite Routing in Tor to Reduce Latency
SaTor: Satellite Routing in Tor to Reduce Latency
Haozhi Li
Tariq Elahi
89
0
0
21 Jun 2024
An Extended View on Measuring Tor AS-level Adversaries
An Extended View on Measuring Tor AS-level Adversaries
G. K. Gegenhuber
Markus Maier
Florian Holzbauer
Wilfried Mayer
Georg Merzdovnik
Edgar Weippl
Johanna Ullrich
45
4
0
13 Mar 2024
TorMult: Introducing a Novel Tor Bandwidth Inflation Attack
TorMult: Introducing a Novel Tor Bandwidth Inflation Attack
Christoph Sendner
Jasper Stang
Alexandra Dmitrienko
Raveen Wijewickrama
Murtuza Jadliwala
19
0
0
17 Jul 2023
A Survey on Anonymous Communication Systems with a Focus on Dining
  Cryptographers Networks
A Survey on Anonymous Communication Systems with a Focus on Dining Cryptographers Networks
Mohsen Shirali
Tobias Tefke
R. C. Staudemeyer
H. C. Pöhls
38
1
0
16 Dec 2022
Towards Flexible Anonymous Networks
Towards Flexible Anonymous Networks
F. Rochet
T. Elahi
33
9
0
07 Mar 2022
De-anonymisation attacks on Tor: A Survey
De-anonymisation attacks on Tor: A Survey
Ishan Karunanayake
Nadeem Ahmed
R. Malaney
R. Islam
S. Jha
75
47
0
28 Sep 2020
Peel the onion: Recognition of Android apps behind the Tor Network
Peel the onion: Recognition of Android apps behind the Tor Network
Emanuele Petagna
Giuseppe Laurenza
Claudio Ciccotelli
Leonardo Querzoni
25
9
0
14 Jan 2019
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
Milad Nasr
Alireza Bahramali
Amir Houmansadr
AAML
67
154
0
22 Aug 2018
Nothing But Net: Invading Android User Privacy Using Only Network Access
  Patterns
Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns
Mikhail Andreev
Avraham Klausner
Trishita Tiwari
A. Trachtenberg
Arkady Yerukhimovich
MLAU
25
3
0
07 Jul 2018
Fuzzy Graph Modelling of Anonymous Networks
Fuzzy Graph Modelling of Anonymous Networks
Vasisht Duddu
D. Samanta
D. V. Rao
23
5
0
30 Mar 2018
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Chong Chen
D. E. Asoni
A. Perrig
David Barrera
G. Danezis
Carmela Troncoso
40
48
0
23 Feb 2018
Aurora: Providing Trusted System Services for Enclaves On an Untrusted
  System
Aurora: Providing Trusted System Services for Enclaves On an Untrusted System
Hongliang Liang
Mingyu Li
Qiong Zhang
Yue Yu
Lin Jiang
Yixiu Chen
76
8
0
10 Feb 2018
Tempest: Temporal Dynamics in Anonymity Systems
Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails
Yixin Sun
Aaron Johnson
M. Chiang
Prateek Mittal
58
21
0
05 Jan 2018
TorPolice: Towards Enforcing Service-Defined Access Policies in
  Anonymous Systems
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems
Zhuotao Liu
Yushan Liu
Philipp Winter
Prateek Mittal
Yih-Chun Hu
19
1
0
28 Aug 2017
Effect of Pipelining and Multiplexing in Estimating HTTP/2.0 Web Object
  Sizes
Effect of Pipelining and Multiplexing in Estimating HTTP/2.0 Web Object Sizes
Ricardo Morla
25
7
0
03 Jul 2017
Forming Guard Sets using AS Relationships
Forming Guard Sets using AS Relationships
Mohsen Imani
A. Barton
M. Wright
10
2
0
17 Jun 2017
Waterfiling: Balancing the Tor network with maximum diversity
Waterfiling: Balancing the Tor network with maximum diversity
F. Rochet
Olivier Pereira
32
21
0
14 Sep 2016
Modified Relay Selection and Circuit Selection for Faster Tor
Modified Relay Selection and Circuit Selection for Faster Tor
Mohsen Imani
Mehrdad Amirabadi
M. Wright
49
15
0
26 Aug 2016
A Survey on Routing in Anonymous Communication Protocols
A Survey on Routing in Anonymous Communication Protocols
Fatemeh Shirazi
Milivoj Simeonovski
M. R. Asghar
Michael Backes
Claudia Díaz
32
79
0
19 Aug 2016
Anarchy in Tor: Performance Cost of Decentralization
Anarchy in Tor: Performance Cost of Decentralization
John Geddes
Michael Schliep
Nicholas Hopper
15
2
0
08 Jun 2016
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware
  Path Selection
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
Aaron Johnson
Rob Jansen
A. D. Jaggard
J. Feigenbaum
P. Syverson
47
28
0
17 Nov 2015
RAPTOR: Routing Attacks on Privacy in Tor
RAPTOR: Routing Attacks on Privacy in Tor
Yixin Sun
A. Edmundson
Laurent Vanbever
Oscar Li
Jennifer Rexford
M. Chiang
Prateek Mittal
64
224
0
13 Mar 2015
Dovetail: Stronger Anonymity in Next-Generation Internet Routing
Dovetail: Stronger Anonymity in Next-Generation Internet Routing
J. Sankey
M. Wright
56
38
0
02 May 2014
ANDaNA: Anonymous Named Data Networking Application
ANDaNA: Anonymous Named Data Networking Application
S. DiBenedetto
Paolo Gasti
Gene Tsudik
E. Uzun
99
152
0
09 Dec 2011
1