Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813667
|View full text |Cite
|
Sign up to set email alerts
|

Caronte

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Attacks on onion services: Previous work has relied on exploiting the Tor protocol [16,41,64], content and configuration leaks [52], or clock-skew changes [55,89] to deanonymize Tor onion services. Kwon et al [44] introduced circuit fingerprinting and website fingerprinting attacks on Tor onion services.…”
Section: Related Workmentioning
confidence: 99%
“…Attacks on onion services: Previous work has relied on exploiting the Tor protocol [16,41,64], content and configuration leaks [52], or clock-skew changes [55,89] to deanonymize Tor onion services. Kwon et al [44] introduced circuit fingerprinting and website fingerprinting attacks on Tor onion services.…”
Section: Related Workmentioning
confidence: 99%
“…Security [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [21], [58], [59], [60], [61], [62], [63], [64], [19] 28…”
Section: Research Fieldmentioning
confidence: 99%
“…Research papers N. of papers Attacks to THS [40], [41], [42], [43], [44], [45], [47], [48], [50], [51], [52], [53], [54], [56], [57], [21], [58], [63], [49], [19] 20…”
Section: Focus Of the Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, Matic et al [59] discussed how information leaks in the configuration or content hosted on HS can be used to reveal their locations. They reviewed a considerable number of .onion sites for URLs or email addresses that pointed to regular websites to determine if they could be hosted on the same server, investigated HTTP certificates to extract candidate IP addresses, searched for specific HS strings, and used search engines to identify candidates hosting similar content.…”
Section: Securitymentioning
confidence: 99%