2004 |
Punishing the Innocent along with the Guilty The Economics of Individual versus Group Punishment |
2004 |
Tor The Second-Generation Onion Router |
2006 |
Practical Onion Hacking Finding the real address of Tor clients |
2006 |
UK NISCC Telecommunications Resilience |
2008 |
Robust De-anonymization of Large Sparse Datasets |
2008 |
Shining Light in Dark Places Understanding the Tor Network |
2010 |
Digging into Anonymous Traffic deep analysis of the Tor anonymizing network |
2012 |
Biometric Alternatives to CAPTCHA Exploring Accessible Interface |
2012 |
SWEET Serving the Web by Exploiting Email Tunnels |
2012 |
TorScan Tracing Long-lived Connections and Differential Scanning Attacks |
2013 |
Matching Known Patients to Health Records in Washington State Data |
2013 |
Towards a Censorship Analyser for Tor |
2013 |
Trawling for Tor Hidden Services Detection Measurement Deanonymization |
2013 |
Users Get Routed Traffic Correlation on Tor by Realistic Adversaries |
2014 |
EU WP216 Article 29 Data Protection Working Party |
2014 |
Effective Attacks and Provable Defenses for Website Fingerprinting |
2014 |
Enhancing Censorship Resistance in the Tor Anonymity Network |
2014 |
Identity Theft Threat and Mitigations |
2014 |
InTeRneT SpyIng In SAn FRAnCISCo |
2014 |
Practical Attacks Against The I2P Network |
2014 |
The Origin and Reception of Martin Niemöller's Quotation First they came for the communists |
2014 |
When HTTPS Meets CDN |
2015 |
Dual EC A Standardized Back Door |
2015 |
HHRG-114-FA18-Transcript |
2015 |
Passive Deanonymization of Tor Hidden Services |
2016 |
BLACR TTP-Free Blacklistable Anonymous Credentials with Reputation |
2016 |
CloudFlare Fact Sheet |
2016 |
Differential Treatment of Anonymous Users |
2016 |
Failures in NISTs ECC standards |
2016 |
I Am Robot Deep Learning to Break Semantic Image CAPTCHAs |
2016 |
Learning to Break Semantic Image CAPTCHAs |
2016 |
On Realistically Attacking Tor with Website Fingerprinting |
2016 |
The Crime of Speech How Arab Governments Use the Law to Silence Expression Online |
2016 |
US Playpen Tor |
2016 |
Website Fingerprinting at Internet Scale |
2017 |
Analysis of Fingerprinting Techniques for Tor Hidden Services |
2017 |
DHS FBI Playpen |
2017 |
The Security Impact of HTTPS Interception |
2017 |
Tor's Usability for Censorship Circumvention |
2017 |
USCourtCase 16 3976 |
2017 |
Website Fingerprinting Defenses at the Application Layer |
2018 |
403 Forbidden A Global View of CDN Geoblocking |
2018 |
Cloud Security Basics |
2018 |
Dropping on the Edge Flexibility and Traffic Confirmation in Onion Routing Protocols |
2018 |
EUROPEAN COMMISSION STAFF WORKING DOCUMENT Counterfeit and Piracy Watch List |
2018 |
Robust Website Fingerprinting Through the Cache Occupancy Channel |
2018 |
The Death of Transit and the Future Internet |
2019 |
A First Look at References from the Dark to Surface Web World |
2019 |
Analyzing Chinas Blocking of Unpublished Tor Bridges |
2019 |
Estimating the success of re-identifications in incomplete datasets using generative models |
2019 |
Something Dark INVESTIGATING IN THE DARK WEB |
2019 |
The Great Cloudwall |
2019 |
Thirteen Years of Tor Attacks |
2019 |
Tor Censorship Arms Race |
2019 |
Watching You Watch The Tracking Ecosystem of Over-the-Top TV Streaming Devices |
2020 |
A discretization attack |
2020 |
Collect it all everyday lives turned into passive signals intelligence |
2020 |
JosephSullivan CSO |
2020 |
TrafficSliver Fighting Website Fingerprinting Attacks with Traffic Splitting |
2020 |
Website Fingerprinting with Website Oracles |
2020 |
Why We Still Cant Browse in Peace On the Uniqueness and Reidentifiability of Web Browsing Histories |
2021 |
How Gamification Affects Software Developers Cautionary Evidence from a Natural Experiment on GitHub |