ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1503.03940
  4. Cited By
RAPTOR: Routing Attacks on Privacy in Tor

RAPTOR: Routing Attacks on Privacy in Tor

13 March 2015
Yixin Sun
A. Edmundson
Laurent Vanbever
Oscar Li
Jennifer Rexford
M. Chiang
Prateek Mittal
ArXiv (abs)PDFHTML

Papers citing "RAPTOR: Routing Attacks on Privacy in Tor"

45 / 45 papers shown
Title
Metadata-private Messaging without Coordination
Metadata-private Messaging without Coordination
Peipei Jiang
Yihao Wu
Lei Xu
Wentao Dong
Peiyuan Chen
Yulong Ming
Cong Wang
Xiaohua Jia
Qian Wang
65
0
0
28 Apr 2025
MUFFLER: Secure Tor Traffic Obfuscation with Dynamic Connection Shuffling and Splitting
MUFFLER: Secure Tor Traffic Obfuscation with Dynamic Connection Shuffling and Splitting
Minjae Seo
Myoungsung You
Jaehan Kim
Taejune Park
Seungwon Shin
Jinwoo Kim
87
0
0
10 Apr 2025
SaTor: Satellite Routing in Tor to Reduce Latency
SaTor: Satellite Routing in Tor to Reduce Latency
Haozhi Li
Tariq Elahi
91
0
0
21 Jun 2024
An Extended View on Measuring Tor AS-level Adversaries
An Extended View on Measuring Tor AS-level Adversaries
G. K. Gegenhuber
Markus Maier
Florian Holzbauer
Wilfried Mayer
Georg Merzdovnik
Edgar Weippl
Johanna Ullrich
48
4
0
13 Mar 2024
TorMult: Introducing a Novel Tor Bandwidth Inflation Attack
TorMult: Introducing a Novel Tor Bandwidth Inflation Attack
Christoph Sendner
Jasper Stang
Alexandra Dmitrienko
Raveen Wijewickrama
Murtuza Jadliwala
19
0
0
17 Jul 2023
How Effective is Multiple-Vantage-Point Domain Control Validation?
How Effective is Multiple-Vantage-Point Domain Control Validation?
Grace H. Cimaszewski
Henry Birge-Lee
Liang Wang
Jennifer Rexford
Prateek Mittal
21
3
0
16 Feb 2023
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
James K. Holland
Jason Carpenter
Se Eun Oh
Nicholas Hopper
AAML
57
5
0
03 Feb 2023
SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via
  Siamese Heterogeneous Graph Attention Network
SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network
Tianyu Cui
Gaopeng Gou
G. Xiong
Zhen Li
Mingxin Cui
Chang Liu
GNN
49
11
0
20 Apr 2022
Modelling Agent-Skipping Attacks in Message Forwarding Protocols
Modelling Agent-Skipping Attacks in Message Forwarding Protocols
Zach Smith
H. Jonker
S. Mauw
Hyunwoo Lee
29
0
0
21 Jan 2022
The Dark Web Phenomenon: A Review and Research Agenda
The Dark Web Phenomenon: A Review and Research Agenda
Abhineet Gupta
S. Maynard
Atif Ahmad
39
19
0
14 Apr 2021
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Neal Mangaokar
Jiameng Pu
P. Bhattacharya
Chandan K. Reddy
Bimal Viswanath
AAMLMedIm
53
27
0
05 Apr 2021
De-anonymisation attacks on Tor: A Survey
De-anonymisation attacks on Tor: A Survey
Ishan Karunanayake
Nadeem Ahmed
R. Malaney
R. Islam
S. Jha
75
47
0
28 Sep 2020
Practical Traffic Analysis Attacks on Secure Messaging Applications
Practical Traffic Analysis Attacks on Secure Messaging Applications
Alireza Bahramali
Ramin Soltani
Amir Houmansadr
Dennis Goeckel
Don Towsley
55
49
0
01 May 2020
Securing Internet Applications from Routing Attacks
Securing Internet Applications from Routing Attacks
Yixin Sun
M. Apostolaki
Henry Birge-Lee
Laurent Vanbever
Jennifer Rexford
M. Chiang
Prateek Mittal
AAML
77
28
0
20 Apr 2020
DP-Cryptography: Marrying Differential Privacy and Cryptography in
  Emerging Applications
DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications
Sameer Wagh
Xi He
Ashwin Machanavajjhala
Prateek Mittal
93
22
0
19 Apr 2020
Blind Adversarial Network Perturbations
Blind Adversarial Network Perturbations
Milad Nasr
Alireza Bahramali
Amir Houmansadr
AAML
68
6
0
16 Feb 2020
DECO: Liberating Web Data Using Decentralized Oracles for TLS
DECO: Liberating Web Data Using Decentralized Oracles for TLS
Fan Zhang
Sai Krishna Deepak Maram
Harjasleen Malvai
Steven Goldfeder
Ari Juels
94
128
0
03 Sep 2019
ConfigTron: Tackling network diversity with heterogeneous configurations
ConfigTron: Tackling network diversity with heterogeneous configurations
Usama Naseer
Theophilus A. Benson
18
13
0
13 Aug 2019
Using Bursty Announcements for Detecting BGP Routing Anomalies
Using Bursty Announcements for Detecting BGP Routing Anomalies
Pablo Moriano
Raquel L. Hill
L. Jean Camp
18
3
0
14 May 2019
Foundations, Properties, and Security Applications of Puzzles: A Survey
Foundations, Properties, and Security Applications of Puzzles: A Survey
I. M. Ali
Maurantonio Caprolu
Roberto Di Pietro
53
31
0
23 Apr 2019
On the Complexity of Anonymous Communication Through Public Networks
On the Complexity of Anonymous Communication Through Public Networks
Megumi Ando
Anna Lysyanskaya
E. Upfal
85
11
0
17 Feb 2019
Withdrawing the BGP Re-Routing Curtain: Understanding the Security
  Impact of BGP Poisoning via Real-World Measurements
Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning via Real-World Measurements
Michal Derezinski
Kyle Birkeland
Tyler McDaniel
Max Schuchard
17
13
0
08 Nov 2018
Adversaries monitoring Tor traffic crossing their jurisdictional border
  and reconstructing Tor circuits
Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits
Herman Galteland
Kristian Gjøsteen
17
4
0
28 Aug 2018
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
Milad Nasr
Alireza Bahramali
Amir Houmansadr
AAML
80
154
0
22 Aug 2018
SABRE: Protecting Bitcoin against Routing Attacks
SABRE: Protecting Bitcoin against Routing Attacks
M. Apostolaki
Gian Marti
Jan Müller
Laurent Vanbever
MoE
76
79
0
19 Aug 2018
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
Hamish Haughey
Gregory Epiphaniou
Haider M. Al-Khateeb
Ali Dehghantanha
22
19
0
03 Aug 2018
Towards Predicting Efficient and Anonymous Tor Circuits
Towards Predicting Efficient and Anonymous Tor Circuits
A. Barton
Mohsen Imani
Jiang Ming
M. Wright
67
19
0
05 May 2018
Fuzzy Graph Modelling of Anonymous Networks
Fuzzy Graph Modelling of Anonymous Networks
Vasisht Duddu
D. Samanta
D. V. Rao
36
5
0
30 Mar 2018
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Chong Chen
D. E. Asoni
A. Perrig
David Barrera
G. Danezis
Carmela Troncoso
52
48
0
23 Feb 2018
Aurora: Providing Trusted System Services for Enclaves On an Untrusted
  System
Aurora: Providing Trusted System Services for Enclaves On an Untrusted System
Hongliang Liang
Mingyu Li
Qiong Zhang
Yue Yu
Lin Jiang
Yixiu Chen
88
8
0
10 Feb 2018
Tempest: Temporal Dynamics in Anonymity Systems
Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails
Yixin Sun
Aaron Johnson
M. Chiang
Prateek Mittal
78
21
0
05 Jan 2018
TorPolice: Towards Enforcing Service-Defined Access Policies in
  Anonymous Systems
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems
Zhuotao Liu
Yushan Liu
Philipp Winter
Prateek Mittal
Yih-Chun Hu
37
1
0
28 Aug 2017
Onions in the Crosshairs: When The Man really is out to get you
Onions in the Crosshairs: When The Man really is out to get you
A. D. Jaggard
P. Syverson
33
14
0
30 Jun 2017
The Evaluation of Circuit Selection Methods on Tor
The Evaluation of Circuit Selection Methods on Tor
Mohsen Imani
Mehrdad Amirabadi
M. Wright
13
0
0
17 Jun 2017
Forming Guard Sets using AS Relationships
Forming Guard Sets using AS Relationships
Mohsen Imani
A. Barton
M. Wright
16
2
0
17 Jun 2017
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Yixin Sun
A. Edmundson
Nick Feamster
M. Chiang
Prateek Mittal
AAML
66
51
0
04 Apr 2017
Honey Onions: a Framework for Characterizing and Identifying Misbehaving
  Tor HSDirs
Honey Onions: a Framework for Characterizing and Identifying Misbehaving Tor HSDirs
Amirali Sanatinia
G. Noubir
24
24
0
19 Oct 2016
Towards an Autonomous System Monitor for Mitigating Correlation Attacks
  in the Tor Network
Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network
Nguyen Phong Hoang
AAML
26
1
0
06 Oct 2016
The Effect of DNS on Tor's Anonymity
The Effect of DNS on Tor's Anonymity
Benjamin Greschbach
T. Pulls
Laura M. Roberts
Philipp Winter
Nick Feamster
AAML
47
47
0
26 Sep 2016
Modified Relay Selection and Circuit Selection for Faster Tor
Modified Relay Selection and Circuit Selection for Faster Tor
Mohsen Imani
Mehrdad Amirabadi
M. Wright
64
15
0
26 Aug 2016
E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes
  With Economic Incentives
E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes With Economic Incentives
Max Schuchard
Nicholas Hopper
21
2
0
28 Jun 2016
Holding all the ASes: Identifying and Circumventing the Pitfalls of
  AS-aware Tor Client Design
Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design
Rishab Nithyanand
Rachee Singh
Shinyoung Cho
Phillipa Gill
AAML
38
4
0
11 May 2016
Traffic Confirmation Attacks Despite Noise
Traffic Confirmation Attacks Despite Noise
Jamie Hayes
31
3
0
19 Jan 2016
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware
  Path Selection
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
Aaron Johnson
Rob Jansen
A. D. Jaggard
J. Feigenbaum
P. Syverson
63
28
0
17 Nov 2015
Measuring and mitigating AS-level adversaries against Tor
Measuring and mitigating AS-level adversaries against Tor
Rishab Nithyanand
Oleksii Starov
A. Zair
Phillipa Gill
Michael Schapira
77
70
0
19 May 2015
1