Back to Results
First PageMeta Content
Software / Tor / Onion routing / Proxy server / Anonymizer / Simple Mail Transfer Protocol / Internet Relay Chat / HTTP cookie / Client–server model / Computing / Internet privacy / Internet


Detecting Traffic Snooping in Tor Using Decoys Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis Columbia University, NY, USA {sc2516,porto,mikepo,angelos}@cs.columbia.edu
Add to Reading List

Document Date: 2011-06-21 18:20:19


Open Document

File Size: 866,03 KB

Share Result on Facebook

Company

MySql / AOL / Intel / /

Country

United States / Netherlands / United Kingdom / /

/

Facility

Angelos D. Keromytis Columbia University / /

IndustryTerm

anonymous communication systems / clear-text protocol / clear-text application protocols / anonymity-preserving networks / clear-text protocols / anonymity networks / hidden services / social networking sites / anonymous proxying systems / social networking / even nationwide networks / web browsing / clear-text sign-in protocols / Anonymous communication networks / decoy services / banking / onion routers / decoy server / low latency anonymity networks / Internet users / anonymity network / privacy-preserving systems / cloud computing / Internet service / clear-text application-level protocol / overlay network / user communications / exit routers / user authentication through unencrypted protocols / unprotected wireless networks / achieved using custom tools / web services / /

OperatingSystem

Linux / Ubuntu / /

Organization

Columbia University / /

Person

Georgios Portokalidis / /

ProgrammingLanguage

Perl / /

Technology

encryption / clear-text application-level protocol / end-toend encryption / application protocols / clear-text application protocols / 6 21 Exit routers / public key / clear-text sign-in protocols / Linux / application-layer encryption / clear-text protocols / onion routers / clear-text protocol / intermediate ISP routers / ISP / HTTP / instant messaging / Perl / SMTP protocols / 5 Rogue Exit Router Decoy traffic Benign Exit Routers / three onion routers / SSL / Tor exit routers / been implemented using Perl / /

SocialTag