{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:49Z","timestamp":1750306489715,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Ministry for Education and Research (BMBF)","award":["Center for IT-Security Privacy and Accountability"],"award-info":[{"award-number":["Center for IT-Security Privacy and Accountability"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2810115","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1626-1628","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[{"name":"CISPA, Saarland University, MPI-SWS, Saarbr\u00fccken, Germany"}]},{"given":"Simon","family":"Koch","sequence":"additional","affiliation":[{"name":"CISPA, Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Sebastian","family":"Meiser","sequence":"additional","affiliation":[{"name":"CISPA, Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Esfandiar","family":"Mohammadi","sequence":"additional","affiliation":[{"name":"CISPA, Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[{"name":"CISPA, Saarland University, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"volume-title":"https:\/\/torproject.org, accessed","year":"2015","key":"e_1_3_2_1_1_1","unstructured":"Torproject. https:\/\/torproject.org, accessed 2015 . Torproject. https:\/\/torproject.org, accessed 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714627"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660371"},{"key":"e_1_3_2_1_4_1","volume-title":"DTIC Document","author":"Dingledine R.","year":"2004","unstructured":"R. Dingledine , N. Mathewson , and P. Syverson . Tor: The second-generation onion router. Technical report , DTIC Document , 2004 . R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, DTIC Document, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_7_1","volume-title":"Defending tor from network adversaries: A case study of network path prediction. CoRR, abs\/1410.1823","author":"Juen J.","year":"2014","unstructured":"J. Juen , A. Das , A. Johnson , N. Borisov , and M. Caesar . Defending tor from network adversaries: A case study of network path prediction. CoRR, abs\/1410.1823 , 2014 . J. Juen, A. Das, A. Johnson, N. Borisov, and M. Caesar. Defending tor from network adversaries: A case study of network path prediction. CoRR, abs\/1410.1823, 2014."},{"key":"e_1_3_2_1_8_1","first-page":"367","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Madhyastha H. V.","year":"2006","unstructured":"H. V. Madhyastha , T. Isdal , M. Piatek , C. Dixon , T. Anderson , A. Krishnamurthy , and A. Venkataramani . iplane: An information plane for distributed services . In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI) , pages 367 -- 380 . USENIX Association , 2006 . H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iplane: An information plane for distributed services. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI), pages 367--380. USENIX Association, 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673869"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2810115","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2810115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:35Z","timestamp":1750225715000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2810115"}},"subtitle":["In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":10,"alternative-id":["10.1145\/2810103.2810115","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2810115","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}