Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1503.03940
Cited By
RAPTOR: Routing Attacks on Privacy in Tor
13 March 2015
Yixin Sun
A. Edmundson
Laurent Vanbever
Oscar Li
Jennifer Rexford
M. Chiang
Prateek Mittal
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"RAPTOR: Routing Attacks on Privacy in Tor"
45 / 45 papers shown
Title
Metadata-private Messaging without Coordination
Peipei Jiang
Yihao Wu
Lei Xu
Wentao Dong
Peiyuan Chen
Yulong Ming
Cong Wang
Xiaohua Jia
Qian Wang
65
0
0
28 Apr 2025
MUFFLER: Secure Tor Traffic Obfuscation with Dynamic Connection Shuffling and Splitting
Minjae Seo
Myoungsung You
Jaehan Kim
Taejune Park
Seungwon Shin
Jinwoo Kim
87
0
0
10 Apr 2025
SaTor: Satellite Routing in Tor to Reduce Latency
Haozhi Li
Tariq Elahi
91
0
0
21 Jun 2024
An Extended View on Measuring Tor AS-level Adversaries
G. K. Gegenhuber
Markus Maier
Florian Holzbauer
Wilfried Mayer
Georg Merzdovnik
Edgar Weippl
Johanna Ullrich
48
4
0
13 Mar 2024
TorMult: Introducing a Novel Tor Bandwidth Inflation Attack
Christoph Sendner
Jasper Stang
Alexandra Dmitrienko
Raveen Wijewickrama
Murtuza Jadliwala
19
0
0
17 Jul 2023
How Effective is Multiple-Vantage-Point Domain Control Validation?
Grace H. Cimaszewski
Henry Birge-Lee
Liang Wang
Jennifer Rexford
Prateek Mittal
21
3
0
16 Feb 2023
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
James K. Holland
Jason Carpenter
Se Eun Oh
Nicholas Hopper
AAML
57
5
0
03 Feb 2023
SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network
Tianyu Cui
Gaopeng Gou
G. Xiong
Zhen Li
Mingxin Cui
Chang Liu
GNN
49
11
0
20 Apr 2022
Modelling Agent-Skipping Attacks in Message Forwarding Protocols
Zach Smith
H. Jonker
S. Mauw
Hyunwoo Lee
29
0
0
21 Jan 2022
The Dark Web Phenomenon: A Review and Research Agenda
Abhineet Gupta
S. Maynard
Atif Ahmad
39
19
0
14 Apr 2021
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models
Neal Mangaokar
Jiameng Pu
P. Bhattacharya
Chandan K. Reddy
Bimal Viswanath
AAML
MedIm
53
27
0
05 Apr 2021
De-anonymisation attacks on Tor: A Survey
Ishan Karunanayake
Nadeem Ahmed
R. Malaney
R. Islam
S. Jha
75
47
0
28 Sep 2020
Practical Traffic Analysis Attacks on Secure Messaging Applications
Alireza Bahramali
Ramin Soltani
Amir Houmansadr
Dennis Goeckel
Don Towsley
55
49
0
01 May 2020
Securing Internet Applications from Routing Attacks
Yixin Sun
M. Apostolaki
Henry Birge-Lee
Laurent Vanbever
Jennifer Rexford
M. Chiang
Prateek Mittal
AAML
77
28
0
20 Apr 2020
DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications
Sameer Wagh
Xi He
Ashwin Machanavajjhala
Prateek Mittal
93
22
0
19 Apr 2020
Blind Adversarial Network Perturbations
Milad Nasr
Alireza Bahramali
Amir Houmansadr
AAML
68
6
0
16 Feb 2020
DECO: Liberating Web Data Using Decentralized Oracles for TLS
Fan Zhang
Sai Krishna Deepak Maram
Harjasleen Malvai
Steven Goldfeder
Ari Juels
94
128
0
03 Sep 2019
ConfigTron: Tackling network diversity with heterogeneous configurations
Usama Naseer
Theophilus A. Benson
18
13
0
13 Aug 2019
Using Bursty Announcements for Detecting BGP Routing Anomalies
Pablo Moriano
Raquel L. Hill
L. Jean Camp
18
3
0
14 May 2019
Foundations, Properties, and Security Applications of Puzzles: A Survey
I. M. Ali
Maurantonio Caprolu
Roberto Di Pietro
53
31
0
23 Apr 2019
On the Complexity of Anonymous Communication Through Public Networks
Megumi Ando
Anna Lysyanskaya
E. Upfal
85
11
0
17 Feb 2019
Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning via Real-World Measurements
Michal Derezinski
Kyle Birkeland
Tyler McDaniel
Max Schuchard
17
13
0
08 Nov 2018
Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits
Herman Galteland
Kristian Gjøsteen
17
4
0
28 Aug 2018
DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
Milad Nasr
Alireza Bahramali
Amir Houmansadr
AAML
80
154
0
22 Aug 2018
SABRE: Protecting Bitcoin against Routing Attacks
M. Apostolaki
Gian Marti
Jan Müller
Laurent Vanbever
MoE
76
79
0
19 Aug 2018
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
Hamish Haughey
Gregory Epiphaniou
Haider M. Al-Khateeb
Ali Dehghantanha
22
19
0
03 Aug 2018
Towards Predicting Efficient and Anonymous Tor Circuits
A. Barton
Mohsen Imani
Jiang Ming
M. Wright
67
19
0
05 May 2018
Fuzzy Graph Modelling of Anonymous Networks
Vasisht Duddu
D. Samanta
D. V. Rao
36
5
0
30 Mar 2018
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Chong Chen
D. E. Asoni
A. Perrig
David Barrera
G. Danezis
Carmela Troncoso
52
48
0
23 Feb 2018
Aurora: Providing Trusted System Services for Enclaves On an Untrusted System
Hongliang Liang
Mingyu Li
Qiong Zhang
Yue Yu
Lin Jiang
Yixiu Chen
88
8
0
10 Feb 2018
Tempest: Temporal Dynamics in Anonymity Systems
Ryan Wails
Yixin Sun
Aaron Johnson
M. Chiang
Prateek Mittal
78
21
0
05 Jan 2018
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems
Zhuotao Liu
Yushan Liu
Philipp Winter
Prateek Mittal
Yih-Chun Hu
37
1
0
28 Aug 2017
Onions in the Crosshairs: When The Man really is out to get you
A. D. Jaggard
P. Syverson
33
14
0
30 Jun 2017
The Evaluation of Circuit Selection Methods on Tor
Mohsen Imani
Mehrdad Amirabadi
M. Wright
13
0
0
17 Jun 2017
Forming Guard Sets using AS Relationships
Mohsen Imani
A. Barton
M. Wright
16
2
0
17 Jun 2017
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
Yixin Sun
A. Edmundson
Nick Feamster
M. Chiang
Prateek Mittal
AAML
66
51
0
04 Apr 2017
Honey Onions: a Framework for Characterizing and Identifying Misbehaving Tor HSDirs
Amirali Sanatinia
G. Noubir
24
24
0
19 Oct 2016
Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network
Nguyen Phong Hoang
AAML
26
1
0
06 Oct 2016
The Effect of DNS on Tor's Anonymity
Benjamin Greschbach
T. Pulls
Laura M. Roberts
Philipp Winter
Nick Feamster
AAML
47
47
0
26 Sep 2016
Modified Relay Selection and Circuit Selection for Faster Tor
Mohsen Imani
Mehrdad Amirabadi
M. Wright
64
15
0
26 Aug 2016
E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes With Economic Incentives
Max Schuchard
Nicholas Hopper
21
2
0
28 Jun 2016
Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design
Rishab Nithyanand
Rachee Singh
Shinyoung Cho
Phillipa Gill
AAML
38
4
0
11 May 2016
Traffic Confirmation Attacks Despite Noise
Jamie Hayes
31
3
0
19 Jan 2016
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
Aaron Johnson
Rob Jansen
A. D. Jaggard
J. Feigenbaum
P. Syverson
63
28
0
17 Nov 2015
Measuring and mitigating AS-level adversaries against Tor
Rishab Nithyanand
Oleksii Starov
A. Zair
Phillipa Gill
Michael Schapira
77
70
0
19 May 2015
1