{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:42Z","timestamp":1763468022394},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642222627"},{"type":"electronic","value":"9783642222634"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22263-4_8","type":"book-chapter","created":{"date-parts":[[2011,7,18]],"date-time":"2011-07-18T13:34:45Z","timestamp":1310996085000},"page":"134-154","source":"Crossref","is-referenced-by-count":27,"title":["DefenestraTor: Throwing Out Windows in Tor"],"prefix":"10.1007","author":[{"given":"Mashael","family":"AlSabah","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Bauer","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Grunwald","sequence":"additional","affiliation":[]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA (October 2007)","key":"8_CR1","DOI":"10.1145\/1314333.1314336"},{"unstructured":"Bauer, K., Sherr, M., McCoy, D., Grunwald, D.: ExperimenTor: A testbed for safe and realistic Tor experimentation. Technical Report CACR 2011-12 (May 2011), http:\/\/www.cacr.math.uwaterloo.ca\/techreports\/2011\/cacr2011-12.pdf","key":"8_CR2"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/190314.190317","volume-title":"Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM 1994","author":"L.S. Brakmo","year":"1994","unstructured":"Brakmo, L.S., O\u2019Malley, S.W., Peterson, L.L.: TCP Vegas: New techniques for congestion detection and avoidance. In: Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM 1994, pp. 24\u201335. ACM, New York (1994)"},{"unstructured":"Chen, F., Perry, M.: Improving Tor path selection (July 2008), https:\/\/gitweb.torproject.org\/torspec.git\/blob_plain\/HEAD:\/proposals\/151-path-selection-improvements.txt","key":"8_CR4"},{"key":"8_CR5","volume-title":"Peer-to-Peer Computing","author":"P. Dhungel","year":"2010","unstructured":"Dhungel, P., Steiner, M., Rimac, I., Hilt, V., Ross, K.W.: Waiting for anonymity: Understanding delays in the Tor overlay. In: Peer-to-Peer Computin. IEEE, Los Alamitos (2010)"},{"unstructured":"Dingledine, R.: Prop 168: Reduce default circuit window (August 2009), https:\/\/gitweb.torproject.org\/torspec.git\/blob_plain\/HEAD:\/proposals\/168-reduce-circwindow.txt","key":"8_CR6"},{"unstructured":"Dingledine, R.: Research problem: adaptive throttling of Tor clients by entry guards (September 2010), https:\/\/blog.torproject.org\/blog\/research-problem-adaptive-hrottling-tor-clients-entry-guards","key":"8_CR7"},{"unstructured":"Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: Workshop on the Economics of Information Security (June 2006)","key":"8_CR8"},{"unstructured":"Dingledine, R., Mathewson, N.: Tor Protocol Specificiation (2010), https:\/\/gitweb.torproject.org\/tor.git\/blob_plain\/HEAD:\/doc\/spec\/tor-spec.txt","key":"8_CR9"},{"doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)","key":"8_CR10","DOI":"10.21236\/ADA465464"},{"unstructured":"Dingledine, R., Murdoch, S.: Performance improvements on Tor or, why Tor is slow and what we\u2019re going to do about it (March 2009), http:\/\/www.torproject.org\/press\/presskit\/2009-03-11-performance.pdf","key":"8_CR11"},{"unstructured":"Evans, N., Dingledine, R., Grothoff, C.: A practical congestion attack on Tor using long paths. In: Proceedings of the 18th USENIX Security Symposium (2009)","key":"8_CR12"},{"unstructured":"Goldberg, I.: Prop 174: Optimistic data for Tor: Server side, https:\/\/trac.torproject.org\/projects\/tor\/ticket\/1795","key":"8_CR13"},{"doi-asserted-by":"crossref","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Proceedings of Information Hiding: First International Workshop (May 1996)","key":"8_CR14","DOI":"10.1007\/3-540-61996-8_37"},{"doi-asserted-by":"crossref","unstructured":"Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? In: Proceedings of ACM CCS (October 2007)","key":"8_CR15","DOI":"10.1145\/1315245.1315257"},{"doi-asserted-by":"crossref","unstructured":"Jain, R.: Congestion control and traffic management in ATM networks: Recent advances and a survey. Computer Networks and ISDN Systems (1995)","key":"8_CR16","DOI":"10.21236\/ADA386244"},{"doi-asserted-by":"crossref","unstructured":"Jansen, R., Hopper, N., Kim, Y.: Recruiting new Tor relays with BRAIDS. In: Proceedings of the ACM CCS (2010)","key":"8_CR17","DOI":"10.1145\/1866307.1866344"},{"unstructured":"Kiraly, C., Bianchi, G., Cigno, R.L.: Solving performance issues in anonymiziation overlays with a L3 approach. University of Trento Information Engineering and Computer Science Department Technical Report DISI-08-041 (September 2008)","key":"8_CR18"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/190809.190324","volume":"24","author":"H.T. Kung","year":"1994","unstructured":"Kung, H.T., Blackwell, T., Chapman, A.: Credit-based flow control for ATM networks: credit update protocol, adaptive credit allocation and statistical multiplexing. SIGCOMM Comput. Commun. Rev.\u00a024, 101\u2013114 (1994)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"unstructured":"Loesing, K.: Measuring the Tor network: Evaluation of client requests to the directories. Tor Project Technical Report (June 2009)","key":"8_CR20"},{"doi-asserted-by":"crossref","unstructured":"McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: Understanding the Tor network. In: Proceedings of the 8th Privacy Enhancing Technologies Symposium (July 2008)","key":"8_CR21","DOI":"10.1007\/978-3-540-70630-4_5"},{"key":"8_CR22","volume-title":"Proceedings of the 2005 IEEE Symposium on Security and Privacy","author":"S.J. Murdoch","year":"2005","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS, Los Alamitos (2005)"},{"unstructured":"Murdoch, S.J., Zieli\u0144ski, P.: Sampled traffic analysis by Internet-exchange-level adversaries. In: Privacy Enhancing Technologies Workshop (June 2007)","key":"8_CR23"},{"unstructured":"Ngan, T.W.J., Dingledine, R., Wallach, D.S.: Building Incentives into Tor. In: Proceedings of Financial Cryptography (January 2010)","key":"8_CR24"},{"key":"8_CR25","volume-title":"Proceedings of the 2006 IEEE Symposium on Security and Privacy","author":"L. \u00d8verlier","year":"2006","unstructured":"\u00d8verlier, L., Syverson, P.: Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS, Los Alamitos (2006)"},{"doi-asserted-by":"crossref","unstructured":"Pries, R., Yu, W., Graham, S., Fu, X.: On performance bottleneck of anonymous communication networks. In: Parallel and Distributed Processing (2008)","key":"8_CR26","DOI":"10.1109\/IPDPS.2008.4536239"},{"unstructured":"Ramachandran, S.: Web metrics: Size and number of resources, https:\/\/code.google.com\/speed\/articles\/web-metrics.html","key":"8_CR27"},{"key":"8_CR28","volume-title":"15th Mardi Gras Conference on Distributed Applications","author":"C. Rapier","year":"2008","unstructured":"Rapier, C., Bennett, B.: High speed bulk data transfer using the SSH protocol. In: 15th Mardi Gras Conference on Distributed Applications. ACM, New York (2008)"},{"unstructured":"Reardon, J., Goldberg, I.: Improving Tor using a TCP-over-DTLS tunnel. In: Proceedings of the 18th USENIX Security Symposium (August 2009)","key":"8_CR29"},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/505696.505704","volume":"29","author":"S. Savage","year":"1999","unstructured":"Savage, S., Cardwell, N., Wetherall, D., Anderson, T.: TCP congestion control with a misbehaving receiver. SIGCOMM Comput. Commun. Rev.\u00a029, 71\u201378 (1999)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-39650-5_7","volume-title":"Computer Security \u2013 ESORICS 2003","author":"A. Serjantov","year":"2003","unstructured":"Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 116\u2013131. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Sherwood, R., Bhattacharjee, B., Braud, R.: Misbehaving TCP receivers can cause Internet-wide congestion collapse. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (2005)","key":"8_CR32","DOI":"10.1145\/1102120.1102170"},{"key":"8_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11863908_2","volume-title":"Computer Security \u2013 ESORICS 2006","author":"V. Shmatikov","year":"2006","unstructured":"Shmatikov, V., Wang, M.H.: Timing analysis in low-latency mix networks: Attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 18\u201333. Springer, Heidelberg (2006)"},{"key":"8_CR34","volume-title":"Proceedings of the 2010 ACM Conference on Computer and Communications Security","author":"C. Tang","year":"2010","unstructured":"Tang, C., Goldberg, I.: An improved algorithm for Tor circuit scheduling. In: Proceedings of the 2010 ACM Conference on Computer and Communications Security. ACM, New York (2010)"},{"key":"8_CR35","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1145\/844128.844154","volume":"36","author":"A. Vahdat","year":"2002","unstructured":"Vahdat, A., Yocum, K., Walsh, K., Mahadevan, P., Kosti\u0107, D., Chase, J., Becker, D.: Scalability and accuracy in a large-scale network emulator. SIGOPS Oper. Syst. Rev.\u00a036, 271\u2013284 (2002)","journal-title":"SIGOPS Oper. Syst. Rev."},{"unstructured":"Viecco, C.: UDP-OR: A fair onion transport. HotPETS (July 2008)","key":"8_CR36"},{"key":"8_CR37","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/141800.141801","volume":"22","author":"Z. Wang","year":"1992","unstructured":"Wang, Z., Crowcroft, J.: Eliminating periodic packet losses in the 4.3-Tahoe BSD TCP congestion control algorithm. SIGCOMM Comput. Commun. Rev.\u00a022, 9\u201316 (1992)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"4","key":"8_CR38","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1145\/1042031.1042032","volume":"7","author":"M.K. Wright","year":"2004","unstructured":"Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur.\u00a07(4), 489\u2013522 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22263-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T22:06:59Z","timestamp":1606169219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22263-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642222627","9783642222634"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22263-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}