{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:49:15Z","timestamp":1775328555441,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314333.1314336","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"11-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":191,"title":["Low-resource routing attacks against tor"],"prefix":"10.1145","author":[{"given":"Kevin","family":"Bauer","sequence":"first","affiliation":[{"name":"University of Colorado, Boulder, CO"}]},{"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[{"name":"University of Colorado, Boulder, CO"}]},{"given":"Dirk","family":"Grunwald","sequence":"additional","affiliation":[{"name":"University of Colorado, Boulder, CO"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA"}]},{"given":"Douglas","family":"Sicker","sequence":"additional","affiliation":[{"name":"University of Colorado, Boulder, CO"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bauer K. and McCoy D. Tor specification proposal 109: No more than one server per ip address. http:\/\/tor.eff.org\/svn\/trunk\/doc\/spec\/proposals\/109-no-sharing-ips.txt March 2007.  Bauer K. and McCoy D. Tor specification proposal 109: No more than one server per ip address. http:\/\/tor.eff.org\/svn\/trunk\/doc\/spec\/proposals\/109-no-sharing-ips.txt March 2007."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060317"},{"key":"e_1_3_2_1_4_1","volume-title":"Workshop on Design Issues in Anonymity and Unobservability","author":"Clarke I.","year":"2000","unstructured":"Clarke , I. , Sandberg , O. , Wiley , B. , and Hong , T. W . Freenet: A distributed anonymous information storage and retrieval system . In Workshop on Design Issues in Anonymity and Unobservability ( 2000 ). Clarke, I., Sandberg, O., Wiley, B., and Hong, T. W. Freenet: A distributed anonymous information storage and retrieval system. In Workshop on Design Issues in Anonymity and Unobservability (2000)."},{"key":"e_1_3_2_1_5_1","volume-title":"October","author":"Dingledine R.","year":"2006","unstructured":"Dingledine , R. Personal communication ., October 2006 . Dingledine, R. Personal communication., October 2006."},{"key":"e_1_3_2_1_6_1","unstructured":"Dingledine R. and Mathewson N. Tor path specification. http:\/\/tor.eff.org\/cvs\/doc\/path-spec.txt.  Dingledine R. and Mathewson N. Tor path specification. http:\/\/tor.eff.org\/cvs\/doc\/path-spec.txt."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of Financial Cryptography (FC","author":"Dingledine R.","year":"2002","unstructured":"Dingledine , R. , and Syverson , P . Reliable MIX Cascade Networks through Reputation . In Proceedings of Financial Cryptography (FC 2002 ). Dingledine, R., and Syverson, P. Reliable MIX Cascade Networks through Reputation. In Proceedings of Financial Cryptography (FC 2002)."},{"key":"e_1_3_2_1_10_1","volume-title":"J. The Sybil Attack. In Proceedings of International Peer To Peer Systems Workshop (IPTPS","author":"Douceur","year":"2002","unstructured":"Douceur , J. The Sybil Attack. In Proceedings of International Peer To Peer Systems Workshop (IPTPS 2002 ). Douceur, J. The Sybil Attack. In Proceedings of International Peer To Peer Systems Workshop (IPTPS 2002)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029199"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586137"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_18"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731526"},{"key":"e_1_3_2_1_15_1","unstructured":"Iperf - The TCP\/UDP Bandwidth Measurement Tool. http:\/\/dast.nlanr.net\/Projects\/Iperf.  Iperf - The TCP\/UDP Bandwidth Measurement Tool. http:\/\/dast.nlanr.net\/Projects\/Iperf."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779341"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"e_1_3_2_1_20_1","volume-title":"Securing the tor network. Defcon","author":"Perry M.","year":"2007","unstructured":"Perry , M. Securing the tor network. Defcon 2007 . http:\/\/fscked.org\/transient\/SecuringTheTorNetwork.pdf. Perry, M. Securing the tor network. Defcon 2007. http:\/\/fscked.org\/transient\/SecuringTheTorNetwork.pdf."},{"key":"e_1_3_2_1_21_1","unstructured":"Perry M. Torflow. http:\/\/tor.eff.org\/svn\/torflow\/README.  Perry M. Torflow. http:\/\/tor.eff.org\/svn\/torflow\/README."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644537"},{"key":"e_1_3_2_1_25_1","volume-title":"Eclipse attacks on overlay networks: Threats and defenses","author":"Singh A.","year":"2006","unstructured":"Singh , A. , Druschel , P. , and Wallach , D. S . Eclipse attacks on overlay networks: Threats and defenses . In IEEE INFOCOM ( 2006 ). Singh, A., Druschel, P., and Wallach, D. S. Eclipse attacks on overlay networks: Threats and defenses. In IEEE INFOCOM (2006)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371981"},{"key":"e_1_3_2_1_27_1","unstructured":"Transparent SOCKS Proxying Library. http:\/\/tsocks.sourceforge.net.  Transparent SOCKS Proxying Library. http:\/\/tsocks.sourceforge.net."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102133"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Alexandria Virginia USA","acronym":"CCS07","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2007 ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314336","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314333.1314336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314336"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":25,"alternative-id":["10.1145\/1314333.1314336","10.1145\/1314333"],"URL":"https:\/\/doi.org\/10.1145\/1314333.1314336","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}