[tor-talk] PaperDump: Mirai, Tor, Darknet, TLA, I2P Censorship, PETs in Sidechains, and more

grarpamp grarpamp at gmail.com
Wed Aug 28 11:11:08 UTC 2019


https://news.softpedia.com/news/mozilla-firefox-could-soon-get-a-tor-mode-add-on-526774.shtml
https://www.zdnet.com/article/new-mirai-botnet-lurks-in-the-tor-network-to-stay-under-the-radar/


OSINT Analysis of the TOR Foundation
https://arxiv.org/pdf/1803.05201.pdf

Tempest: Temporal Dynamics in Anonymity Systems
https://arxiv.org/pdf/1801.01932.pdf

Adversaries monitoring Tor traffic crossing their jurisdictional
border and reconstructing Tor circuits
https://arxiv.org/pdf/1808.09237.pdf

DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning
https://arxiv.org/pdf/1808.07285.pdf

Onions in the Crosshairs: When The Man really is out to get you
https://arxiv.org/pdf/1706.10292.pdf

Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research
https://arxiv.org/pdf/1803.02816.pdf

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
https://arxiv.org/pdf/1808.01155.pdf

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks
https://arxiv.org/pdf/1704.00843.pdf

Peel the onion: Recognition of Android apps behind the Tor Network
https://arxiv.org/pdf/1901.04434.pdf

Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
https://arxiv.org/pdf/1902.06421.pdf

Mockingbird: Defending Against Deep-Learning-Based Website
Fingerprinting Attacks with Adversarial Traces
https://arxiv.org/pdf/1902.06626.pdf

A Forensic Audit of the Tor Browser Bundle
https://arxiv.org/pdf/1907.10279.pdf

Anomalous keys in Tor relays
https://arxiv.org/pdf/1704.00792.pdf

Mitigating Censorship with Multi-Circuit Tor and Linear Network Coding
https://arxiv.org/pdf/1907.03473.pdf

DNS-Morph: UDP-Based Bootstrapping Protocol For Tor
https://arxiv.org/pdf/1904.01240.pdf

Towards Predicting Efficient and Anonymous Tor Circuits
https://arxiv.org/pdf/1805.01977.pdf

TorPolice: Towards Enforcing Service-Defined Access Policies in
Anonymous Systems
https://arxiv.org/pdf/1708.08162.pdf

DROPWAT: an Invisible Network Flow Watermark for Data Exfiltration Traceback
https://arxiv.org/pdf/1705.09460.pdf


Deanonymizing Tor hidden service users through Bitcoin transactions analysis
https://arxiv.org/pdf/1801.07501.pdf

Tor Users Contributing to Wikipedia: Just Like Everybody Else?
https://arxiv.org/pdf/1904.04324.pdf

Open Dataset of Phishing and Tor Hidden Services Screen-captures
https://arxiv.org/pdf/1908.02449.pdf

A Broad Evaluation of the Tor English Content Ecosystem
https://arxiv.org/pdf/1902.06680.pdf

Structure and Content of the Visible Darknet
https://arxiv.org/pdf/1811.01348.pdf

On the Complexity of Anonymous Communication Through Public Networks
https://arxiv.org/pdf/1902.06306.pdf

A Survey of Privacy Infrastructures and Their Vulnerabilities
https://arxiv.org/pdf/1812.06226.pdf

The Effectiveness of Privacy Enhancing Technologies against Fingerprinting
https://arxiv.org/pdf/1812.03920.pdf

Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
https://arxiv.org/pdf/1808.01708.pdf

An Extensive Evaluation of the Internet's Open Proxies
https://arxiv.org/pdf/1806.10258.pdf



Measuring I2P Censorship at a Global Scale
https://arxiv.org/pdf/1907.07120.pdf

An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
https://arxiv.org/pdf/1809.09086.pdf


Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains
https://arxiv.org/pdf/1906.04953.pdf

BlockTag: Design and applications of a tagging system for blockchain analysis
https://arxiv.org/pdf/1809.06044.pdf


Interesting that many attacks on overlay networks
seem to depend on lack of fulltime 100% capacity fill
and reclocking, and that no overlay [or underlying physical]
networks currently deploy it, nor do many nets
of other design seem to make extensive impact
upon that class of GPA. Even 14.4-56k rates could
could have interesting uses at secure levels.


More information about the tor-talk mailing list