This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how...
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, thi...
The level of anonymity offered by low latency, interactive, anonymous networks is unknown. This paper implements correlation attacks on the deployed Tor network and a simulated T...
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...