{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T05:17:28Z","timestamp":1769318248159,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813667","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1455-1466","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["CARONTE"],"prefix":"10.1145","author":[{"given":"Srdjan","family":"Matic","sequence":"first","affiliation":[{"name":"Univerista degli Studi di Milano, Milano, Italy"}]},{"given":"Platon","family":"Kotzias","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"Juan","family":"Caballero","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Certificate Transparency. http:\/\/www.certificate-transparency.org\/.  Certificate Transparency. http:\/\/www.certificate-transparency.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Deep web links: .onion hidden service urls list. http:\/\/deepweblinks.org\/.  Deep web links: .onion hidden service urls list. http:\/\/deepweblinks.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Duckduckgo. http:\/\/3g2upl4pq6kufc4m.onion.  Duckduckgo. http:\/\/3g2upl4pq6kufc4m.onion."},{"key":"e_1_3_2_1_4_1","unstructured":"Hidden wiki: Tor .onion urls directories. http:\/\/thehiddenwiki.org\/.  Hidden wiki: Tor .onion urls directories. http:\/\/thehiddenwiki.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Public Suffix List. http:\/\/publicsuffix.org\/.  Public Suffix List. http:\/\/publicsuffix.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Rapid 7: Sonar Project. https:\/\/scans.io\/study\/sonar.ssl.  Rapid 7: Sonar Project. https:\/\/scans.io\/study\/sonar.ssl."},{"key":"e_1_3_2_1_7_1","unstructured":"Sameid. http:\/\/sameid.net\/.  Sameid. http:\/\/sameid.net\/."},{"key":"e_1_3_2_1_8_1","unstructured":"The ICSI Certificate Notary. http:\/\/notary.icsi.berkeley.edu\/.  The ICSI Certificate Notary. http:\/\/notary.icsi.berkeley.edu\/."},{"key":"e_1_3_2_1_9_1","unstructured":"The Invisible Internet Project. https:\/\/geti2p.net\/.  The Invisible Internet Project. https:\/\/geti2p.net\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Tor hidden service (.onion) search. https:\/\/ahmia.fi\/search\/.  Tor hidden service (.onion) search. https:\/\/ahmia.fi\/search\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Tor project: Configuring hidden services for tor. https:\/\/www.torproject.org\/docs\/tor-hidden-service.html.en.  Tor project: Configuring hidden services for tor. https:\/\/www.torproject.org\/docs\/tor-hidden-service.html.en."},{"key":"e_1_3_2_1_12_1","unstructured":"Tor project: Facebook hidden services and https certs. https:\/\/blog.torproject.org\/blog\/facebook-hidden-services-and-https-certs.  Tor project: Facebook hidden services and https certs. https:\/\/blog.torproject.org\/blog\/facebook-hidden-services-and-https-certs."},{"key":"e_1_3_2_1_13_1","unstructured":"Tor project: Tor rendezvous specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/rend-spec.txt.  Tor project: Tor rendezvous specification. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/rend-spec.txt."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.35"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_1_20_1","volume-title":"Identifying the true IP\/network identity of I2P service hosts","author":"Crenshaw A.","year":"2011"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653708"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381973"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123154"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855771"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029199"},{"key":"e_1_3_2_1_27_1","unstructured":"R. Graham. Reading the Silk Road configuration October 2014. http:\/\/blog.erratasec.com\/2014\/10\/reading-silk-road-configuration.html.  R. Graham. Reading the Silk Road configuration October 2014. http:\/\/blog.erratasec.com\/2014\/10\/reading-silk-road-configuration.html."},{"key":"e_1_3_2_1_28_1","volume-title":"Seizes Hundreds Of Dark Net Domains","author":"Greenberg A.","year":"2014"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698753"},{"key":"e_1_3_2_1_30_1","unstructured":"Html::Similarity. http:\/\/search.cpan.org\/~xern\/HTML-Similarity-0.2.0\/lib\/HTML\/Similarity.pm\/.  Html::Similarity. http:\/\/search.cpan.org\/~xern\/HTML-Similarity-0.2.0\/lib\/HTML\/Similarity.pm\/."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium","author":"Jansen R.","year":"2012"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23288"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_34_1","volume-title":"October","author":"Krebs B.","year":"2014"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046732"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779341"},{"key":"e_1_3_2_1_39_1","volume-title":"April","year":"2014"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_13"},{"key":"e_1_3_2_1_42_1","volume-title":"November","author":"Project T.","year":"2014"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.013"},{"key":"e_1_3_2_1_44_1","volume-title":"Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability","author":"Syverson P.","year":"2000"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673869"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830556"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Zander S.","year":"2008"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813667","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813667"}},"subtitle":["Detecting Location Leaks for Deanonymizing Tor Hidden Services"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":47,"alternative-id":["10.1145\/2810103.2813667","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813667","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}