{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:13:36Z","timestamp":1775913216801,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030415785","type":"print"},{"value":"9783030415792","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41579-2_30","type":"book-chapter","created":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T16:09:09Z","timestamp":1581955749000},"page":"521-538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays"],"prefix":"10.1007","author":[{"given":"Muqian","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xuebin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jinqiao","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Can","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,18]]},"reference":[{"key":"30_CR1","unstructured":"http:\/\/www.vultr.com\/"},{"key":"30_CR2","unstructured":"https:\/\/gitweb.torproject.org\/torspec.git\/tree\/guard-spec.txt"},{"key":"30_CR3","unstructured":"Tor specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/rend-spec-v2.txt"},{"issue":"5","key":"30_CR4","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1111\/add.12470","volume":"109","author":"MJ Barratt","year":"2014","unstructured":"Barratt, M.J., Ferris, J.A., Winstock, A.R.: Use of silk road, the online drug marketplace, in the United Kingdom, Australia and the United States. Addiction 109(5), 774\u2013783 (2014)","journal-title":"Addiction"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Bergman, M.K.: White paper: the deep web: surfacing hidden value. J. Electron. Publishing 7(1) (2001)","DOI":"10.3998\/3336451.0007.104"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I., Thill, F., Weinmann, R.P.: Content and popularity analysis of tor hidden services. In: IEEE International Conference on Distributed Computing Systems Workshops, pp. 188\u2013193 (2014)","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I., Weinmann, R.P.: Trawling for tor hidden services: detection, measurement, deanonymization. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 80\u201394. IEEE (2013)","DOI":"10.1109\/SP.2013.15"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Chen, M., Wang, X., Liu, T., Shi, J., Yin, Z., Fang, B.: Signalcookie: discovering guard relays of hidden services in parallel. In: 2019 IEEE Symposium on Computers and Communications (ISCC). IEEE (2019)","DOI":"10.1109\/ISCC47284.2019.8969639"},{"issue":"3","key":"30_CR9","first-page":"293","volume":"2","author":"N Christin","year":"2012","unstructured":"Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. Arch. Neurol. 2(3), 293 (2012)","journal-title":"Arch. Neurol."},{"issue":"3","key":"30_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/2382448.2382449","volume":"15","author":"N Danner","year":"2012","unstructured":"Danner, N., Defabbia-Kane, S., Krizanc, D., Liberatore, M.: Effectiveness and detection of denial-of-service attacks in Tor. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(3), 11 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"5","key":"30_CR11","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.drugpo.2013.01.005","volume":"24","author":"MCV Hout","year":"2013","unstructured":"Hout, M.C.V., Bingham, T.: \u2018Silk road\u2019, the virtual drug marketplace: a single case study of user experiences. Int. J. Drug Policy 24(5), 385\u2013391 (2013)","journal-title":"Int. J. Drug Policy"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Ling, Z., Luo, J., Wu, K., Fu, X.: Protocol-level hidden server discovery. In: International Conference on Computer Communications, pp. 1043\u20131051 (2013)","DOI":"10.1109\/INFCOM.2013.6566894"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Ling, Z., Luo, J., Wu, K., Yu, W., Fu, X.: TorWard: discovery of malicious traffic over Tor. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 1402\u20131410. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848074"},{"issue":"12","key":"30_CR14","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIFS.2015.2465934","volume":"10","author":"Z Ling","year":"2015","unstructured":"Ling, Z., Luo, J., Wu, K., Yu, W., Fu, X.: TorWard: discovery, blocking, and traceback of malicious traffic over Tor. IEEE Trans. Inf. Forensics Secur. 10(12), 2515\u20132530 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Matic, S., Troncoso, C., Caballero, J.: Dissecting tor bridges: a security evaluation of their private and public infrastructures. In: Network and Distributed Systems Security Symposium, pp. 1\u201315. The Internet Society (2017)","DOI":"10.14722\/ndss.2017.23345"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Matic, S., et al.: Dissecting tor bridges: a security evaluation of their private and public infrastructures. In: Network and Distributed System Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23345"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"McLachlan, J., Hopper, N.: On the risks of serving whenever you surf: vulnerabilities in Tor\u2019s blocking resistance design. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, pp. 31\u201340. ACM (2009)","DOI":"10.1145\/1655188.1655193"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Overlier, L., Syverson, P.F.: Locating hidden servers. In: IEEE Symposium on Security and Privacy, pp. 100\u2013114 (2006)","DOI":"10.1109\/SP.2006.24"},{"issue":"3","key":"30_CR19","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1049\/iet-ifs.2015.0121","volume":"10","author":"G Owen","year":"2016","unstructured":"Owen, G., Savage, N.: Empirical analysis of tor hidden services. IET Inf. Secur. 10(3), 113\u2013118 (2016)","journal-title":"IET Inf. Secur."},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Sanchez-Rola, I., Balzarotti, D., Santos, I.: The onions have eyes: a comprehensive structure and privacy analysis of tor hidden services. In: Proceedings of the 26th International Conference on World Wide Web, pp. 1251\u20131260. International World Wide Web Conferences Steering Committee (2017)","DOI":"10.1145\/3038912.3052657"},{"key":"30_CR21","unstructured":"Soska, K., Christin, N.: Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In: USENIX Conference on Security Symposium, pp. 33\u201348 (2015)"},{"key":"30_CR22","unstructured":"Sun, Y., Edmundson, A., Vanbever, L., Li, O.: RAPTOR: routing attacks on privacy in Tor. In: USENIX Security Symposium, pp. 271\u2013286 (2015)"},{"key":"30_CR23","unstructured":"Winter, P., Ensafi, R., Loesing, K., Feamster, N.: Identifying and characterizing Sybils in the Tor network. In: USENIX Security Symposium, pp. 1169\u20131185 (2016)"}],"updated-by":[{"DOI":"10.1007\/978-3-030-41579-2_48","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T00:00:00Z","timestamp":1606435200000}}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41579-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T20:23:48Z","timestamp":1606422228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41579-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030415785","9783030415792"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41579-2_30","relation":{"correction":[{"id-type":"doi","id":"10.1007\/978-3-030-41579-2_48","asserted-by":"object"}]},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"27 November 2020","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"In the version of this paper that was originally published, the affiliation of Muqian Chen, Xuebin Wang, Yue Gao, and Can Zhao has been changed to: \u2018School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China\u2019.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"199","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}