{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:03:15Z","timestamp":1730325795681,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/V011189\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3567996","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"132-145","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1370-4608","authenticated-orcid":false,"given":"Xinshu","family":"Ma","sequence":"first","affiliation":[{"name":"University of Edinburgh, United Kingdom"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5275-9308","authenticated-orcid":false,"given":"Florentin","family":"Rochet","sequence":"additional","affiliation":[{"name":"University of Namur, Belgium"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7559-8383","authenticated-orcid":false,"given":"Tariq","family":"Elahi","sequence":"additional","affiliation":[{"name":"University of Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Measuring anonymity: The disclosure attack","author":"Agrawal Dakshi","year":"2003","unstructured":"Dakshi Agrawal and Dogan Kesdogan . 2003. Measuring anonymity: The disclosure attack . IEEE Security & privacy 1, 6 ( 2003 ), 27\u201334. Dakshi Agrawal and Dogan Kesdogan. 2003. Measuring anonymity: The disclosure attack. IEEE Security & privacy 1, 6 (2003), 27\u201334."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274722"},{"key":"e_1_3_2_1_3_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Angel Sebastian","year":"2016","unstructured":"Sebastian Angel and Srinath Setty . 2016 . Unobservable Communication over Fully Untrusted Infrastructure . In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . USENIX Association, Savannah, GA, 551\u2013569. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/angel Sebastian Angel and Srinath Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 551\u2013569. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/angel"},{"key":"e_1_3_2_1_4_1","unstructured":"Yawning Angel George Danezis Claudia Diaz Ania Piotrowska and David Stainton. 2017. Katzenpost Mix Network Specification. https:\/\/github.com\/Katzenpost\/docs\/blob\/master\/specs\/mixnet.rst. Yawning Angel George Danezis Claudia Diaz Ania Piotrowska and David Stainton. 2017. Katzenpost Mix Network Specification. https:\/\/github.com\/Katzenpost\/docs\/blob\/master\/specs\/mixnet.rst."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_28"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"volume-title":"Cloudflare Comprehensive DDoS Protection. https:\/\/www.cloudflare.com\/en-gb\/ddos\/","year":"2022","key":"e_1_3_2_1_10_1","unstructured":"Cloudflare. 2022. Cloudflare Comprehensive DDoS Protection. https:\/\/www.cloudflare.com\/en-gb\/ddos\/ . Accessed : September 2022 . Cloudflare. 2022. Cloudflare Comprehensive DDoS Protection. https:\/\/www.cloudflare.com\/en-gb\/ddos\/. Accessed: September 2022."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.27"},{"volume-title":"Probabilistic techniques in exposure assessment: a handbook for dealing with variability and uncertainty in models and inputs","author":"Cullen C","key":"e_1_3_2_1_12_1","unstructured":"Alison\u00a0 C Cullen , H\u00a0Christopher Frey , and Christopher\u00a0 H Frey . 1999. Probabilistic techniques in exposure assessment: a handbook for dealing with variability and uncertainty in models and inputs . Springer Science & Business Media . Alison\u00a0C Cullen, H\u00a0Christopher Frey, and Christopher\u00a0H Frey. 1999. Probabilistic techniques in exposure assessment: a handbook for dealing with variability and uncertainty in models and inputs. Springer Science & Business Media."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.15"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v064.i04"},{"key":"e_1_3_2_1_18_1","volume-title":"The Nym Network. https:\/\/nymtech.net. Whitepaper. Accessed","author":"Diaz Claudia","year":"2022","unstructured":"Claudia Diaz , Harry Halpin , and Aggelos Kiayias . 2021. The Nym Network. https:\/\/nymtech.net. Whitepaper. Accessed March 2022 . Claudia Diaz, Harry Halpin, and Aggelos Kiayias. 2021. The Nym Network. https:\/\/nymtech.net. Whitepaper. Accessed March 2022."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_11"},{"key":"e_1_3_2_1_20_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 54\u201368","author":"Diaz Claudia","year":"2002","unstructured":"Claudia Diaz , Stefaan Seys , Joris Claessens , and Bart Preneel . 2002 . Towards measuring anonymity . In International Workshop on Privacy Enhancing Technologies. Springer, 54\u201368 . Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. 2002. Towards measuring anonymity. In International Workshop on Privacy Enhancing Technologies. Springer, 54\u201368."},{"key":"e_1_3_2_1_21_1","volume-title":"Bittorrent over Tor isn\u2019t a good idea. https:\/\/blog.torproject.org\/bittorrent-over-tor-isnt-good-idea\/","author":"Dingledine Roger","year":"2022","unstructured":"Roger Dingledine . 2010. Bittorrent over Tor isn\u2019t a good idea. https:\/\/blog.torproject.org\/bittorrent-over-tor-isnt-good-idea\/ . Accessed : May 2022 . Roger Dingledine. 2010. Bittorrent over Tor isn\u2019t a good idea. https:\/\/blog.torproject.org\/bittorrent-over-tor-isnt-good-idea\/. Accessed: May 2022."},{"key":"e_1_3_2_1_22_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 186\u2013206","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine , Vitaly Shmatikov , and Paul Syverson . 2004 . Synchronous batching: From cascades to free routes . In International Workshop on Privacy Enhancing Technologies. Springer, 186\u2013206 . Roger Dingledine, Vitaly Shmatikov, and Paul Syverson. 2004. Synchronous batching: From cascades to free routes. In International Workshop on Privacy Enhancing Technologies. Springer, 186\u2013206."},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Financial Cryptography. Springer, 253\u2013268","author":"Dingledine Roger","year":"2002","unstructured":"Roger Dingledine and Paul Syverson . 2002 . Reliable MIX cascade networks through reputation . In International Conference on Financial Cryptography. Springer, 253\u2013268 . Roger Dingledine and Paul Syverson. 2002. Reliable MIX cascade networks through reputation. In International Conference on Financial Cryptography. Springer, 253\u2013268."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381973"},{"key":"e_1_3_2_1_25_1","volume-title":"Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Eskandarian Saba","year":"2021","unstructured":"Saba Eskandarian , Henry Corrigan-Gibbs , Matei Zaharia , and Dan Boneh . 2021 . Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 1775\u20131792. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/eskandarian Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, and Dan Boneh. 2021. Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1775\u20131792. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/eskandarian"},{"key":"e_1_3_2_1_26_1","unstructured":"S. Farrel and H. Tschofenig. 2014. Pervasive Monitoring Is an Attack. RFC 7258. RFC Editor. 1\u20135 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc7258.txt S. Farrel and H. Tschofenig. 2014. Pervasive Monitoring Is an Attack. RFC 7258. RFC Editor. 1\u20135 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc7258.txt"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_3_2_1_28_1","first-page":"22","article-title":"Mixnet optimization methods","volume":"1","author":"Guirat Iness\u00a0Ben","year":"2022","unstructured":"Iness\u00a0Ben Guirat and Claudia Diaz . 2022 . Mixnet optimization methods . Proceedings on Privacy Enhancing Technologies 1 (2022), 22 . Iness\u00a0Ben Guirat and Claudia Diaz. 2022. Mixnet optimization methods. Proceedings on Privacy Enhancing Technologies 1 (2022), 22.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_29_1","unstructured":"Incorporate Gurobi\u00a0Optimization. 2018. Gurobi optimizer reference manual. https:\/\/www.gurobi.com\/documentation\/9.1\/refman\/index.html. Incorporate Gurobi\u00a0Optimization. 2018. Gurobi optimizer reference manual. https:\/\/www.gurobi.com\/documentation\/9.1\/refman\/index.html."},{"key":"e_1_3_2_1_31_1","unstructured":"Aaron\u00a0D Jaggard Aaron Johnson Paul Syverson and Joan Feigenbaum. 2014. Representing network trust and using it to improve anonymous communication. arXiv preprint arXiv:1406.3583(2014). Aaron\u00a0D Jaggard Aaron Johnson Paul Syverson and Joan Feigenbaum. 2014. Representing network trust and using it to improve anonymous communication. arXiv preprint arXiv:1406.3583(2014)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72582-2_28"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0017"},{"key":"e_1_3_2_1_34_1","unstructured":"Aaron Johnson Rob Jansen Aaron\u00a0D Jaggard Joan Feigenbaum and Paul Syverson. 2015. Avoiding the man on the wire: Improving tor\u2019s security with trust-aware path selection. arXiv preprint arXiv:1511.05453(2015). Aaron Johnson Rob Jansen Aaron\u00a0D Jaggard Joan Feigenbaum and Paul Syverson. 2015. Avoiding the man on the wire: Improving tor\u2019s security with trust-aware path selection. arXiv preprint arXiv:1511.05453(2015)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132755"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0008"},{"key":"e_1_3_2_1_38_1","volume-title":"XRD: Scalable Messaging System with Cryptographic Privacy. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Kwon Albert","year":"2020","unstructured":"Albert Kwon , David Lu , and Srinivas Devadas . 2020 . XRD: Scalable Messaging System with Cryptographic Privacy. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA, 759\u2013776. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/kwon Albert Kwon, David Lu, and Srinivas Devadas. 2020. XRD: Scalable Messaging System with Cryptographic Privacy. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 759\u2013776. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/kwon"},{"key":"e_1_3_2_1_39_1","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Lazar David","year":"2018","unstructured":"David Lazar , Yossi Gilad , and Nickolai Zeldovich . 2018 . Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis . In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18) . USENIX Association, Carlsbad, CA, 711\u2013725. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/lazar David Lazar, Yossi Gilad, and Nickolai Zeldovich. 2018. Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA, 711\u2013725. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/lazar"},{"key":"e_1_3_2_1_40_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Lazar David","year":"2016","unstructured":"David Lazar and Nickolai Zeldovich . 2016 . Alpenhorn: Bootstrapping secure communication without leaking metadata . In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . 571\u2013586. David Lazar and Nickolai Zeldovich. 2016. Alpenhorn: Bootstrapping secure communication without leaking metadata. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 571\u2013586."},{"volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19). 1841\u20131858.","author":"Leibowitz Hemi","key":"e_1_3_2_1_41_1","unstructured":"Hemi Leibowitz , Ania\u00a0 M Piotrowska , George Danezis , and Amir Herzberg . 2019. No right to remain silent: isolating malicious mixes . In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1841\u20131858. Hemi Leibowitz, Ania\u00a0M Piotrowska, George Danezis, and Amir Herzberg. 2019. No right to remain silent: isolating malicious mixes. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1841\u20131858."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278549"},{"key":"e_1_3_2_1_44_1","unstructured":"Pere Manils Chaabane Abdelberi Stevens Le\u00a0Blond Mohamed\u00a0Ali Kaafar Claude Castelluccia Arnaud Legout and Walid Dabbous. 2010. Compromising Tor Anonymity Exploiting P2P Information Leakage. Research Report. https:\/\/hal.inria.fr\/inria-00471556 Pere Manils Chaabane Abdelberi Stevens Le\u00a0Blond Mohamed\u00a0Ali Kaafar Claude Castelluccia Arnaud Legout and Walid Dabbous. 2010. Compromising Tor Anonymity Exploiting P2P Information Leakage. Research Report. https:\/\/hal.inria.fr\/inria-00471556"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1994.394764"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_8"},{"key":"e_1_3_2_1_49_1","volume-title":"Spectrum: High-bandwidth Anonymous Broadcast. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Newman Zachary","year":"2022","unstructured":"Zachary Newman , Sacha Servan-Schreiber , and Srinivas Devadas . 2022 . Spectrum: High-bandwidth Anonymous Broadcast. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22) . USENIX Association, Renton, WA, 229\u2013248. https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/newman Zachary Newman, Sacha Servan-Schreiber, and Srinivas Devadas. 2022. Spectrum: High-bandwidth Anonymous Broadcast. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). USENIX Association, Renton, WA, 229\u2013248. https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/newman"},{"volume-title":"The Nym Project\u2019s sphinx implementation. https:\/\/github.com\/nymtech\/sphinx","year":"2022","key":"e_1_3_2_1_50_1","unstructured":"Nym. 2019. The Nym Project\u2019s sphinx implementation. https:\/\/github.com\/nymtech\/sphinx . Accessed : April 2022 . Nym. 2019. The Nym Project\u2019s sphinx implementation. https:\/\/github.com\/nymtech\/sphinx. Accessed: April 2022."},{"volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17). 1199\u20131216.","author":"Piotrowska M","key":"e_1_3_2_1_51_1","unstructured":"Ania\u00a0 M Piotrowska , Jamie Hayes , Tariq Elahi , Sebastian Meiser , and George Danezis . 2017. The loopix anonymity system . In 26th {USENIX} Security Symposium ({USENIX} Security 17). 1199\u20131216. Ania\u00a0M Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The loopix anonymity system. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 1199\u20131216."},{"key":"e_1_3_2_1_52_1","volume-title":"CollecTor - Tor Project. https:\/\/metrics.torproject.org\/collector.html","author":"Project The\u00a0Tor","year":"2021","unstructured":"The\u00a0Tor Project . 2022. CollecTor - Tor Project. https:\/\/metrics.torproject.org\/collector.html . Accessed : April 2021 . The\u00a0Tor Project. 2022. CollecTor - Tor Project. https:\/\/metrics.torproject.org\/collector.html. Accessed: April 2021."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0013"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0011"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417279"},{"volume-title":"Introduction to cutting and packing optimization: Problems, modeling approaches, solution methods. Vol.\u00a0263","author":"Scheithauer Guntram","key":"e_1_3_2_1_57_1","unstructured":"Guntram Scheithauer . 2017. Introduction to cutting and packing optimization: Problems, modeling approaches, solution methods. Vol.\u00a0263 . Springer . Guntram Scheithauer. 2017. Introduction to cutting and packing optimization: Problems, modeling approaches, solution methods. Vol.\u00a0263. Springer."},{"key":"e_1_3_2_1_58_1","volume-title":"International Workshop on Privacy Enhancing Technologies. Springer, 41\u201353","author":"Serjantov Andrei","year":"2002","unstructured":"Andrei Serjantov and George Danezis . 2002 . Towards an information theoretic metric for anonymity . In International Workshop on Privacy Enhancing Technologies. Springer, 41\u201353 . Andrei Serjantov and George Danezis. 2002. Towards an information theoretic metric for anonymity. In International Workshop on Privacy Enhancing Technologies. Springer, 41\u201353."},{"key":"e_1_3_2_1_59_1","volume-title":"International Workshop on Information Hiding. Springer, 36\u201352","author":"Serjantov Andrei","year":"2002","unstructured":"Andrei Serjantov , Roger Dingledine , and Paul Syverson . 2002 . From a trickle to a flood: Active attacks on several mix types . In International Workshop on Information Hiding. Springer, 36\u201352 . Andrei Serjantov, Roger Dingledine, and Paul Syverson. 2002. From a trickle to a flood: Active attacks on several mix types. In International Workshop on Information Hiding. Springer, 36\u201352."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_41"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133611"},{"key":"e_1_3_2_1_62_1","unstructured":"Robin Snader and Nikita Borisov. 2009. EigenSpeed: secure peer-to-peer bandwidth evaluation.. In IPTPS. 9. Robin Snader and Nikita Borisov. 2009. EigenSpeed: secure peer-to-peer bandwidth evaluation.. In IPTPS. 9."},{"key":"e_1_3_2_1_63_1","volume-title":"International Workshop on Security Protocols. Springer, 213\u2013230","author":"Syverson Paul","year":"2009","unstructured":"Paul Syverson . 2009 . Why I\u2019m not an entropist . In International Workshop on Security Protocols. Springer, 213\u2013230 . Paul Syverson. 2009. Why I\u2019m not an entropist. In International Workshop on Security Protocols. Springer, 213\u2013230."},{"key":"e_1_3_2_1_64_1","volume-title":"Tor: The secondgeneration onion router. In Usenix Security. 303\u2013320.","author":"Syverson Paul","year":"2004","unstructured":"Paul Syverson , Roger Dingledine , and Nick Mathewson . 2004 . Tor: The secondgeneration onion router. In Usenix Security. 303\u2013320. Paul Syverson, Roger Dingledine, and Nick Mathewson. 2004. Tor: The secondgeneration onion router. In Usenix Security. 303\u2013320."},{"key":"e_1_3_2_1_65_1","volume-title":"Tor directory protocol, version 3. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/dir-spec.txt","author":"Project The Tor","year":"2022","unstructured":"The Tor Project . 2022. Tor directory protocol, version 3. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/dir-spec.txt . Accessed : May 2022 . The Tor Project. 2022. Tor directory protocol, version 3. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/dir-spec.txt. Accessed: May 2022."},{"key":"e_1_3_2_1_66_1","volume-title":"Tor Protocol Specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/tor-spec.txt","author":"Project The Tor","year":"2022","unstructured":"The Tor Project . 2022. Tor Protocol Specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/tor-spec.txt . Accessed : May 2022 . The Tor Project. 2022. Tor Protocol Specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/tor-spec.txt. Accessed: May 2022."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00044"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132783"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813616"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_71_1","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Wolinsky David\u00a0Isaac","year":"2012","unstructured":"David\u00a0Isaac Wolinsky , Henry Corrigan-Gibbs , Bryan Ford , and Aaron Johnson . 2012 . Dissent in numbers: Making strong anonymity scale . In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12) . 179\u2013182. David\u00a0Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012. Dissent in numbers: Making strong anonymity scale. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 179\u2013182."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1042031.1042032"}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","acronym":"ACSAC","location":"Austin TX USA"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3567996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T11:35:59Z","timestamp":1701776159000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3567996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":68,"alternative-id":["10.1145\/3564625.3567996","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3567996","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}