{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:14:21Z","timestamp":1742976861247,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030582005"},{"type":"electronic","value":"9783030582012"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58201-2_16","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T23:02:29Z","timestamp":1600038149000},"page":"234-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas"],"prefix":"10.1007","author":[{"given":"Wilfried","family":"Mayer","sequence":"first","affiliation":[]},{"given":"Georg","family":"Merzdovnik","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Akhoondi, M., Yu, C., Madhyastha, H.V.: LASTor: a low-latency AS-aware Tor client. In: Symposium on Security and Privacy. IEEE (2012)","DOI":"10.1109\/SP.2012.35"},{"issue":"2","key":"16_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2946802","volume":"49","author":"M AlSabah","year":"2016","unstructured":"AlSabah, M., Goldberg, I.: Performance and security improvements for Tor: a survey. ACM Comput. Surv. (CSUR) 49(2), 1\u201336 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"16_CR3","unstructured":"Anderson, C., et al.: Global network interference detection over the RIPE atlas network. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2014)"},{"issue":"3","key":"16_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/2805789.2805796","volume":"45","author":"V Bajpai","year":"2015","unstructured":"Bajpai, V., Eravuchira, S.J., Sch\u00f6nw\u00e4lder, J.: Lessons learned from using the RIPE atlas platform for measurement research. ACM SIGCOMM Comput. Commun. Rev. 45(3), 35\u201342 (2015)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Barton, A., Wright, M.: DeNASA: Destination-Naive AS-awareness in anonymous communications. In: Proceedings on Privacy Enhancing Technologies (2016)","DOI":"10.1515\/popets-2016-0044"},{"key":"16_CR6","unstructured":"Barton, A., Wright, M., Ming, J., Imani, M.: Towards predicting efficient and anonymous Tor circuits. In: USENIX Security Symposium (2018)"},{"key":"16_CR7","unstructured":"Dingledine, R.: The lifecycle of a new relay (2013)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: The second-generation onion router. In: USENIX Security Symposium, Tor (2004)","DOI":"10.21236\/ADA465464"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Edman, M., Syverson, P.: AS-awareness in Tor path selection. In: Conference on Computer and Communications Security. ACM (2009)","DOI":"10.1145\/1653662.1653708"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Fanou, R., Francois, P., Aben, E.: On the diversity of interdomain routing in Africa. In: Passive and Active Network Measurement Conference (2015)","DOI":"10.1007\/978-3-319-15509-8_4"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Feamster, N., Dingledine, R.: Location diversity in anonymity networks. In: Workshop on Privacy in the Electronic Society. ACM (2004)","DOI":"10.1145\/1029179.1029199"},{"issue":"1","key":"16_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2096149.2096155","volume":"42","author":"P Gill","year":"2012","unstructured":"Gill, P., Schapira, M., Goldberg, S.: Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data. ACM SIGCOMM Comput. Commun. Rev. 42(1), 40\u201346 (2012)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Giotsas, V., Luckie, M., Huffaker, B., Claffy, K.C.: Inferring complex AS relationships. In: Internet Measurement Conference. ACM (2014)","DOI":"10.1145\/2663716.2663743"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Hanley, H., Sun, Y., Wagh, S., Mittal, P.: DPSelect: a differential privacy based Guard relay selection algorithm for Tor. In: Proceedings on Privacy Enhancing Technologies (2019)","DOI":"10.2478\/popets-2019-0025"},{"issue":"2","key":"16_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1698750.1698753","volume":"13","author":"N Hopper","year":"2010","unstructured":"Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur. (TISSEC) 13(2), 1\u201328 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.: Users get routed: traffic correlation on Tor by realistic adversaries. In: Conference on Computer and Communications Security. ACM (2013)","DOI":"10.1145\/2508859.2516651"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Mittal, P., Khurshid, A., Juen, J., Caesar, M., Borisov, N.: Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. In: Conference on Computer and Communications Security. ACM (2011)","DOI":"10.1145\/2046707.2046732"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Nasr, M., Bahramali, A., Houmansadr, A.: DeepCorr: strong flow correlation attacks on Tor using deep learning. In: Conference on Computer and Communications Security. ACM (2018)","DOI":"10.1145\/3243734.3243824"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Nithyanand, R., Starov, O., Zair, A., Gill, P., Schapira, M.: Measuring and mitigating AS-level adversaries against Tor. In: Network and Distributed System Security Symposium (NDSS) (2016)","DOI":"10.14722\/ndss.2016.23322"},{"key":"16_CR20","unstructured":"Pochat, V.L., Van Goethem, T., Tajalizadehkhoob, S., Korczynski, M., Joosen, W.: Tranco: a research-oriented top sites ranking hardened against manipulation. In: Network and Distributed System Security Symposium (2019)"},{"key":"16_CR21","unstructured":"Staff, R.N.: RIPE atlas: a global internet measurement network. Internet Protoc. J. 18(3), (2015)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Sun, Y., Edmundson, A., Feamster, N., Chiang, M., Mittal, P.: Counter-RAPTOR: safeguarding Tor against active routing attacks. In: Symposium on Security and Privacy. IEEE (2017)","DOI":"10.1109\/SP.2017.34"},{"key":"16_CR23","unstructured":"Sun, Y., et al.: Routing attacks on privacy in Tor. In: USENIX Security Symposium, RAPTOR (2015)"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Vanbever, L., Li, O., Rexford, J., Mittal, P.: Anonymity on QuickSand: using BGP to compromise Tor. In: Proceedings of the 13th ACM Workshop on Hot Topics in Networks. ACM (2014)","DOI":"10.1145\/2670518.2673869"},{"key":"16_CR25","unstructured":"Wacek, C., Tan, H., Bauer, K.S., Sherr, M.: An empirical evaluation of relay selection in Tor. In: Network and Distributed System Security Symposium (2013)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Wan, G., Johnson, A., Wails, R., Wagh, S., Mittal, P.: Guard placement attacks on path selection algorithms for Tor. In: Proceedings on Privacy Enhancing Technologies (2019)","DOI":"10.2478\/popets-2019-0069"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58201-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T00:07:30Z","timestamp":1726272450000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58201-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582005","9783030582012"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58201-2_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2020.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.88","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.14","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}