{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:30:13Z","timestamp":1759332613809,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046731","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"201-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Forensic investigation of the OneSwarm anonymous filesharing system"],"prefix":"10.1145","author":[{"given":"Swagatika","family":"Prusty","sequence":"first","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Brian Neil","family":"Levine","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]},{"given":"Marc","family":"Liberatore","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"issue":"1","key":"e_1_3_2_1_2_1","volume":"21","author":"Brenner S.","year":"2004","unstructured":"S. Brenner , B. Carrier , and J. Henninger . The Trojan Horse Defense in Cybercrime Cases. Santa Clara Computer and High Technology Law Journal , 21 ( 1 ), 2004 . S. Brenner, B. Carrier, and J. Henninger. The Trojan Horse Defense in Cybercrime Cases. Santa Clara Computer and High Technology Law Journal, 21(1), 2004.","journal-title":"The Trojan Horse Defense in Cybercrime Cases. Santa Clara Computer and High Technology Law Journal"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.475282"},{"key":"e_1_3_2_1_4_1","volume-title":"Incentives Build Robustness in BitTorrent. In International Workshop on Peer-to-Peer Systems (IPTPS)","author":"Cohen B.","year":"2003","unstructured":"B. Cohen . Incentives Build Robustness in BitTorrent. In International Workshop on Peer-to-Peer Systems (IPTPS) , Berkeley, CA , February 2003 . B. Cohen. Incentives Build Robustness in BitTorrent. In International Workshop on Peer-to-Peer Systems (IPTPS), Berkeley, CA, February 2003."},{"key":"e_1_3_2_1_5_1","volume-title":"Journ\u00e9e Donn\u00e9es et Apprentissage Artificiel (DAPA)","author":"Denoyer L.","year":"2009","unstructured":"L. Denoyer and M. Latapy . Measurement and Analysis of P2P Activity Against Paedophile . Journ\u00e9e Donn\u00e9es et Apprentissage Artificiel (DAPA) , March 2009 . L. Denoyer and M. Latapy. Measurement and Analysis of P2P Activity Against Paedophile. Journ\u00e9e Donn\u00e9es et Apprentissage Artificiel (DAPA), March 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. USENIX Security Symposium","author":"Geambasu R.","year":"2009","unstructured":"R. Geambasu , T. Kohno , A. Levy , and H. M. Levy . Vanish: Increasing Data Privacy with Self-Destructing Data . In Proc. USENIX Security Symposium , 2009 . R. Geambasu, T. Kohno, A. Levy, and H. M. Levy. Vanish: Increasing Data Privacy with Self-Destructing Data. In Proc. USENIX Security Symposium, 2009."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851198"},{"key":"e_1_3_2_1_9_1","volume-title":"Dept. CS and Eng., Univ.\\ of Washington","author":"Isdal T.","year":"2010","unstructured":"T. Isdal , M. Piatek , A. Krishnamurthy , and T. Anderson . Privacy-preserving P2P data sharing with OneSwarm. Technical report , Dept. CS and Eng., Univ.\\ of Washington , 2010 . http:\/\/oneswarm.cs.washington.edu\/f2f_tr.pdf. T. Isdal, M. Piatek, A. Krishnamurthy, and T. Anderson. Privacy-preserving P2P data sharing with OneSwarm. Technical report, Dept. CS and Eng., Univ.\\ of Washington, 2010. http:\/\/oneswarm.cs.washington.edu\/f2f_tr.pdf."},{"key":"e_1_3_2_1_10_1","volume-title":"Quantifying paedophile activity in a large P2P system","author":"Latapy M.","year":"2011","unstructured":"M. Latapy , C. Magnien , and R. Fournier . Quantifying paedophile activity in a large P2P system . In IEEE Infocom Mini-Conference . http:\/\/antipaedo.lip6.fr, April 2011 . M. Latapy, C. Magnien, and R. Fournier. Quantifying paedophile activity in a large P2P system. In IEEE Infocom Mini-Conference. http:\/\/antipaedo.lip6.fr, April 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921193"},{"key":"e_1_3_2_1_13_1","first-page":"351","volume-title":"Proc. USENIX OSDI","author":"Peterson L.","year":"2006","unstructured":"L. Peterson , A. Bavier , M. E. Fiuczynski , and S. Muir . Experiences building PlanetLab . In Proc. USENIX OSDI , pages 351 -- 366 , 2006 . L. Peterson, A. Bavier, M. E. Fiuczynski, and S. Muir. Experiences building PlanetLab. In Proc. USENIX OSDI, pages 351--366, 2006."},{"key":"e_1_3_2_1_14_1","first-page":"1","volume":"12","author":"Piatek M.","year":"2008","unstructured":"M. Piatek , T. Kohno , and A. Krishnamurthy . Challenges and directions for monitoring P2P file sharing networks. In Proc. USENIX Hot Topics in Security (HotSec), pages 12 : 1 -- 12 :7, July 2008 . M. Piatek, T. Kohno, and A. Krishnamurthy. Challenges and directions for monitoring P2P file sharing networks. In Proc. USENIX Hot Topics in Security (HotSec), pages 12:1--12:7, July 2008.","journal-title":"In Proc. USENIX Hot Topics in Security (HotSec), pages"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978369"},{"key":"e_1_3_2_1_16_1","unstructured":"J. Rorher. MUTE. http:\/\/mute-net.sourceforge.net.  J. Rorher. MUTE. http:\/\/mute-net.sourceforge.net."},{"key":"e_1_3_2_1_17_1","unstructured":"RShare. http:\/\/www.stealthnet.de\/en\\_index.php and http:\/\/www.planetpeer.de\/wiki\/index.php\/RShare_documentation_%28English%29.  RShare. http:\/\/www.stealthnet.de\/en\\_index.php and http:\/\/www.planetpeer.de\/wiki\/index.php\/RShare_documentation_%28English%29."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/505696.505704"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102170"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371981"},{"key":"e_1_3_2_1_21_1","unstructured":"U.S. Dept. of Justice. National Strategy for Child Exploitation Prevention and Interdiction: A Report to Congress. http:\/\/www.projectsafechildhood.gov\/docs\/natstrategyreport.pdf August 2010.  U.S. Dept. of Justice. National Strategy for Child Exploitation Prevention and Interdiction: A Report to Congress. http:\/\/www.projectsafechildhood.gov\/docs\/natstrategyreport.pdf August 2010."},{"key":"e_1_3_2_1_22_1","volume-title":"Statement Before Congress; Linda D. Koontz, Information Management Issues","author":"General Accounting Office U.S.","year":"2003","unstructured":"U.S. General Accounting Office . File-Sharing Programs . Child Pornography Is Readily Accessible over Peer-to-Peer Networks. GAO-03--537T . Statement Before Congress; Linda D. Koontz, Information Management Issues , March 2003 . U.S. General Accounting Office. File-Sharing Programs. Child Pornography Is Readily Accessible over Peer-to-Peer Networks. GAO-03--537T. Statement Before Congress; Linda D. Koontz, Information Management Issues, March 2003."},{"key":"e_1_3_2_1_23_1","unstructured":"U.S. Government. Federal Rules of Evidence. Rule 401. http:\/\/www.law.cornell.edu\/rules\/fre\/rules.htm.  U.S. Government. Federal Rules of Evidence. Rule 401. http:\/\/www.law.cornell.edu\/rules\/fre\/rules.htm."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc.\\ USENIX Workshop on Hot Topics in Security (HotSec)","author":"Walls R. J.","year":"2011","unstructured":"R. J. Walls , B. N. Levine , M. Liberatore , and C. Shields . Effective Digital Forensics Research is Investigator-Centric . In Proc.\\ USENIX Workshop on Hot Topics in Security (HotSec) , August 2011 . R. J. Walls, B. N. Levine, M. Liberatore, and C. Shields. Effective Digital Forensics Research is Investigator-Centric. In Proc.\\ USENIX Workshop on Hot Topics in Security (HotSec), August 2011."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. ISOC Symposium Network and Distributed System Security (NDSS)","author":"Wolchok S.","year":"2010","unstructured":"S. Wolchok , O. Hofmann , N. Heninger , E. Felten , J. Halderman , C. Rossbach , B. Waters , and E. Witchel . Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs . In Proc. ISOC Symposium Network and Distributed System Security (NDSS) , February 2010 . S. Wolchok, O. Hofmann, N. Heninger, E. Felten, J. Halderman, C. Rossbach, B. Waters, and E. Witchel. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. In Proc. ISOC Symposium Network and Distributed System Security (NDSS), February 2010."},{"key":"e_1_3_2_1_26_1","first-page":"38","volume-title":"Proc. ISOC Symposium Network and Distributed System Security (NDSS)","author":"Wright M.","year":"2002","unstructured":"M. Wright , M. Adler , B. N. Levine , and C. Shields . An Analysis of the Degradation of Anonymous Protocols . In Proc. ISOC Symposium Network and Distributed System Security (NDSS) , pages 38 -- 50 , February 2002 . M. Wright, M. Adler, B. N. Levine, and C. Shields. An Analysis of the Degradation of Anonymous Protocols. In Proc. ISOC Symposium Network and Distributed System Security (NDSS), pages 38--50, February 2002."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830556"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":27,"alternative-id":["10.1145\/2046707.2046731","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046731","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}