ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1503.03940
  4. Cited By
RAPTOR: Routing Attacks on Privacy in Tor

RAPTOR: Routing Attacks on Privacy in Tor

13 March 2015
Yixin Sun
A. Edmundson
Laurent Vanbever
Oscar Li
Jennifer Rexford
M. Chiang
Prateek Mittal
ArXiv (abs)PDFHTML

Papers citing "RAPTOR: Routing Attacks on Privacy in Tor"

45 / 45 papers shown
Title
Metadata-private Messaging without Coordination
Metadata-private Messaging without Coordination
Peipei Jiang
Yihao Wu
Lei Xu
Wentao Dong
Peiyuan Chen
Yulong Ming
Cong Wang
Xiaohua Jia
Qian Wang
65
0
0
28 Apr 2025
MUFFLER: Secure Tor Traffic Obfuscation with Dynamic Connection Shuffling and Splitting
MUFFLER: Secure Tor Traffic Obfuscation with Dynamic Connection Shuffling and Splitting
Minjae Seo
Myoungsung You
Jaehan Kim
Taejune Park
Seungwon Shin
Jinwoo Kim
81
0
0
10 Apr 2025
SaTor: Satellite Routing in Tor to Reduce Latency
SaTor: Satellite Routing in Tor to Reduce Latency
Haozhi Li
Tariq Elahi
89
0
0
21 Jun 2024
An Extended View on Measuring Tor AS-level Adversaries
An Extended View on Measuring Tor AS-level Adversaries
G. K. Gegenhuber
Markus Maier
Florian Holzbauer
Wilfried Mayer
Georg Merzdovnik
Edgar Weippl
Johanna Ullrich
48
4
0
13 Mar 2024
TorMult: Introducing a Novel Tor Bandwidth Inflation Attack
TorMult: Introducing a Novel Tor Bandwidth Inflation Attack
Christoph Sendner
Jasper Stang
Alexandra Dmitrienko
Raveen Wijewickrama
Murtuza Jadliwala
19
0
0
17 Jul 2023
How Effective is Multiple-Vantage-Point Domain Control Validation?
How Effective is Multiple-Vantage-Point Domain Control Validation?
Grace H. Cimaszewski
Henry Birge-Lee
Liang Wang
Jennifer Rexford
Prateek Mittal
19
3
0
16 Feb 2023
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
James K. Holland
Jason Carpenter
Se Eun Oh
Nicholas Hopper
AAML
57
5
0
03 Feb 2023
SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via
  Siamese Heterogeneous Graph Attention Network
SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network
Tianyu Cui
Gaopeng Gou
G. Xiong
Zhen Li
Mingxin Cui
Chang Liu
GNN
47
11
0
20 Apr 2022
Modelling Agent-Skipping Attacks in Message Forwarding Protocols
Modelling Agent-Skipping Attacks in Message Forwarding Protocols
Zach Smith
H. Jonker
S. Mauw
Hyunwoo Lee
27
0
0
21 Jan 2022
The Dark Web Phenomenon: A Review and Research Agenda
The Dark Web Phenomenon: A Review and Research Agenda
Abhineet Gupta
S. Maynard
Atif Ahmad
37
19
0
14 Apr 2021
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Neal Mangaokar
Jiameng Pu
P. Bhattacharya
Chandan K. Reddy
Bimal Viswanath
AAMLMedIm
53
27
0
05 Apr 2021
De-anonymisation attacks on Tor: A Survey
De-anonymisation attacks on Tor: A Survey
Ishan Karunanayake
Nadeem Ahmed
R. Malaney
R. Islam
S. Jha
75
47
0
28 Sep 2020
Practical Traffic Analysis Attacks on Secure Messaging Applications
Practical Traffic Analysis Attacks on Secure Messaging Applications
Alireza Bahramali
Ramin Soltani
Amir Houmansadr
Dennis Goeckel
Don Towsley
46
49
0
01 May 2020
Securing Internet Applications from Routing Attacks
Securing Internet Applications from Routing Attacks
Yixin Sun
M. Apostolaki
Henry Birge-Lee
Laurent Vanbever
Jennifer Rexford
M. Chiang
Prateek Mittal
AAML
65
28
0
20 Apr 2020
DP-Cryptography: Marrying Differential Privacy and Cryptography in
  Emerging Applications
DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications
Sameer Wagh
Xi He
Ashwin Machanavajjhala
Prateek Mittal
93
22
0
19 Apr 2020
Blind Adversarial Network Perturbations
Blind Adversarial Network Perturbations
Milad Nasr
Alireza Bahramali
Amir Houmansadr
AAML
68
6
0
16 Feb 2020
DECO: Liberating Web Data Using Decentralized Oracles for TLS
DECO: Liberating Web Data Using Decentralized Oracles for TLS
Fan Zhang
Sai Krishna Deepak Maram
Harjasleen Malvai
Steven Goldfeder
Ari Juels
94
128
0
03 Sep 2019
ConfigTron: Tackling network diversity with heterogeneous configurations
ConfigTron: Tackling network diversity with heterogeneous configurations
Usama Naseer
Theophilus A. Benson
16
13
0
13 Aug 2019
Using Bursty Announcements for Detecting BGP Routing Anomalies
Using Bursty Announcements for Detecting BGP Routing Anomalies
Pablo Moriano
Raquel L. Hill
L. Jean Camp
16
3
0
14 May 2019
Foundations, Properties, and Security Applications of Puzzles: A Survey
Foundations, Properties, and Security Applications of Puzzles: A Survey
I. M. Ali
Maurantonio Caprolu
Roberto Di Pietro
53
31
0
23 Apr 2019
On the Complexity of Anonymous Communication Through Public Networks
On the Complexity of Anonymous Communication Through Public Networks
Megumi Ando
Anna Lysyanskaya
E. Upfal
85
11
0
17 Feb 2019
Withdrawing the BGP Re-Routing Curtain: Understanding the Security
  Impact of BGP Poisoning via Real-World Measurements
Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning via Real-World Measurements
Michal Derezinski
Kyle Birkeland
Tyler McDaniel
Max Schuchard
13
13
0
08 Nov 2018
Adversaries monitoring Tor traffic crossing their jurisdictional border
  and reconstructing Tor circuits
Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits
Herman Galteland
Kristian Gjøsteen
13
4
0
28 Aug 2018
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
Milad Nasr
Alireza Bahramali
Amir Houmansadr
AAML
74
154
0
22 Aug 2018
SABRE: Protecting Bitcoin against Routing Attacks
SABRE: Protecting Bitcoin against Routing Attacks
M. Apostolaki
Gian Marti
Jan Müller
Laurent Vanbever
MoE
64
79
0
19 Aug 2018
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
Hamish Haughey
Gregory Epiphaniou
Haider M. Al-Khateeb
Ali Dehghantanha
20
19
0
03 Aug 2018
Towards Predicting Efficient and Anonymous Tor Circuits
Towards Predicting Efficient and Anonymous Tor Circuits
A. Barton
Mohsen Imani
Jiang Ming
M. Wright
52
19
0
05 May 2018
Fuzzy Graph Modelling of Anonymous Networks
Fuzzy Graph Modelling of Anonymous Networks
Vasisht Duddu
D. Samanta
D. V. Rao
25
5
0
30 Mar 2018
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Chong Chen
D. E. Asoni
A. Perrig
David Barrera
G. Danezis
Carmela Troncoso
44
48
0
23 Feb 2018
Aurora: Providing Trusted System Services for Enclaves On an Untrusted
  System
Aurora: Providing Trusted System Services for Enclaves On an Untrusted System
Hongliang Liang
Mingyu Li
Qiong Zhang
Yue Yu
Lin Jiang
Yixiu Chen
79
8
0
10 Feb 2018
Tempest: Temporal Dynamics in Anonymity Systems
Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails
Yixin Sun
Aaron Johnson
M. Chiang
Prateek Mittal
63
21
0
05 Jan 2018
TorPolice: Towards Enforcing Service-Defined Access Policies in
  Anonymous Systems
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems
Zhuotao Liu
Yushan Liu
Philipp Winter
Prateek Mittal
Yih-Chun Hu
23
1
0
28 Aug 2017
Onions in the Crosshairs: When The Man really is out to get you
Onions in the Crosshairs: When The Man really is out to get you
A. D. Jaggard
P. Syverson
31
14
0
30 Jun 2017
The Evaluation of Circuit Selection Methods on Tor
The Evaluation of Circuit Selection Methods on Tor
Mohsen Imani
Mehrdad Amirabadi
M. Wright
13
0
0
17 Jun 2017
Forming Guard Sets using AS Relationships
Forming Guard Sets using AS Relationships
Mohsen Imani
A. Barton
M. Wright
16
2
0
17 Jun 2017
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Yixin Sun
A. Edmundson
Nick Feamster
M. Chiang
Prateek Mittal
AAML
66
51
0
04 Apr 2017
Honey Onions: a Framework for Characterizing and Identifying Misbehaving
  Tor HSDirs
Honey Onions: a Framework for Characterizing and Identifying Misbehaving Tor HSDirs
Amirali Sanatinia
G. Noubir
20
24
0
19 Oct 2016
Towards an Autonomous System Monitor for Mitigating Correlation Attacks
  in the Tor Network
Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network
Nguyen Phong Hoang
AAML
22
1
0
06 Oct 2016
The Effect of DNS on Tor's Anonymity
The Effect of DNS on Tor's Anonymity
Benjamin Greschbach
T. Pulls
Laura M. Roberts
Philipp Winter
Nick Feamster
AAML
37
47
0
26 Sep 2016
Modified Relay Selection and Circuit Selection for Faster Tor
Modified Relay Selection and Circuit Selection for Faster Tor
Mohsen Imani
Mehrdad Amirabadi
M. Wright
53
15
0
26 Aug 2016
E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes
  With Economic Incentives
E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes With Economic Incentives
Max Schuchard
Nicholas Hopper
19
2
0
28 Jun 2016
Holding all the ASes: Identifying and Circumventing the Pitfalls of
  AS-aware Tor Client Design
Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design
Rishab Nithyanand
Rachee Singh
Shinyoung Cho
Phillipa Gill
AAML
32
4
0
11 May 2016
Traffic Confirmation Attacks Despite Noise
Traffic Confirmation Attacks Despite Noise
Jamie Hayes
31
3
0
19 Jan 2016
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware
  Path Selection
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
Aaron Johnson
Rob Jansen
A. D. Jaggard
J. Feigenbaum
P. Syverson
57
28
0
17 Nov 2015
Measuring and mitigating AS-level adversaries against Tor
Measuring and mitigating AS-level adversaries against Tor
Rishab Nithyanand
Oleksii Starov
A. Zair
Phillipa Gill
Michael Schapira
47
70
0
19 May 2015
1