[1] DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:the second-generation onion router[C]//Proceedings of the 13th USENIX Security Symposium.San Diego,USA:USENIX Press,2004:303-320. [2] Tor Project,Inc.Tor metrics portal[EB/OL].[2020-08-04].https://github.com/torproject. [3] 马彦兵.基于洋葱网络的流量确认攻击及其防御技术研究[D].北京:北京邮电大学,2018. MA Y B.Research on traffic confirmation attack and defense based on tor network[D].Beijing:Beijing University of Posts and Telecommunications,2018.(in Chinese) [4] CHAUM D.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-90. [5] 赵梦瑶,李晓宇.基于洋葱路由的双向匿名秘密通信协议[J].计算机科学,2019,46(4):164-171. ZHAO M Y,LI X Y.Bidirectional anonymous secret communication protocol based on onion routing[J].Computer Science,2019,46(4):164-171.(in Chinese) [6] MURDOCH S J,DANEZIS G.Low-cost traffic analysis of Tor[C]//Proceedings of 2005 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2005:183-195. [7] CORRIGAN-GIBBS H,FORD B.Dissent:accountable anonymous group messaging[C]//Proceedings of the 17th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2010:340-350. [8] LAPERDRIX P,RUDAMETKIN W,BAUDRY B.Beauty and the beast:diverting modern web browsers to build unique browser fingerprints[C]//Proceedings of 2016 IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2016:878-894. [9] ERDIN E,ZACHOR C,GUNES M H.How to find hidden users:a survey of attacks on anonymity networks[J].IEEE Communications Surveys & Tutorials,2015,17(4):2296-2316. [10] JOHNSON A,WACEK C,JANSEN R,et al.Users get routed:traffic correlation on tor by realistic adversaries[C]//Proceedings of 2013 ACM SIGSAC Conference on Computer & Communications Security.New York,USA:ACM Press,2013:337-348. [11] ABBOTT T G,LAI K J,LIEBERMAN M R,et al.Browser-based attacks on Tor[C]//Proceedings of the 7th International Conference on Privacy Enhancing Technologies.Berlin,Germany:Springer,2007:184-199. [12] RYBCZYNSKA M.A round-based cover traffic algorithm for anonymity systems[M]//CABALLE S,XHAFA F,ABRAHAM A.Intelligent networking,collaborative systems and applications.Berlin,Germany:Springer,2009:257-280. [13] DIAZ C,SEYS S,CLAESSENS J,et al.Towards measuring anonymity[C]//Proceedings of International Workshop on Privacy Enhancing Technologies.Berlin,Germany:Springer,2002:54-68. [14] HAMEL A,GREGOIRE J C,GOLDBERG I.The misentropists:new approaches to measures in Tor:2011-18[R].Waterloo,Canada:University of Waterloo,2011. [15] ELAHI T,BAUER K,ALSABAH M,et al.Changing of the guards:a framework for understanding and improving entry guard selection in Tor[C]//Proceedings of 2012 ACM Workshop on Privacy in the Electronic Society.New York,USA:ACM Press,2012:43-54. [16] WRIGHT M K,ADLER M,LEVINE B N,et al.The predecessor attack:an analysis of a threat to anonymous communications systems[J].ACM Transactions on Information and System Security,2004,4(7):489-522. [17] JOHNSON A,WACEK C,JANSEN R,et al.Users get routed:traffic correlation on Tor by realistic adversaries[C]//Proceedings of 2013 ACM SIGSAC Conference on Computer & Communications Security.New York,USA:ACM Press,2013:337-348. [18] TorPS.TorPS:the Tor path simulator[EB/OL].[2020-08-04].http://torps.github.io. [19] SYVERSON P,TSUDIK G,REED M,et al.Towards an analysis of onion routing security[EB/OL].[2020-08-04].https://www.baidu.com/link?url=B-yIlHdTcSlXgNB8GG2h2lECN8I7iKQgetRvEpstg4tZfo1rVfLNByG-28xpYj4VUm3Rz1IfSdhdpF3jAojqrK5tfMXinG40ifilh4E2dlW&wd=&eqid=de340189000bf51700000004611b1e3e. [20] WAN G,JOHNSON A,WAILS R,et al.Guard placement attacks on path selection algorithms for Tor[J].Proceedings on Privacy Enhancing Technologies,2019(4):272-291. |