On Feb 16, 2015, at 5:43 AM, Florian RĂ¼chel florian.ruechel.tor@inexplicity.de wrote:
It would also help me a lot if you can direct me to papers or articles that have shown specific attacks that are known to work on the current network.
You might want to look into the Sniper Attack as an example of how to evaluate attacks on Tor safely using Shadow: http://www.robgjansen.com/publications/sniper-ndss2014.pdf
For those wanting to follow the Shadow thread on this topic, that starts here: http://mailman.cs.umn.edu/archives/shadow-support/2015-February/000312.html
Best regards, Rob