{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:43Z","timestamp":1772039503082,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T00:00:00Z","timestamp":1445990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Amazon Web Services in Education"},{"name":"National Science Foundation","award":["CNS-1409191"],"award-info":[{"award-number":["CNS-1409191"]}]},{"name":"National Security Agency"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,28]]},"DOI":"10.1145\/2815675.2815701","type":"proceedings-article","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T12:37:04Z","timestamp":1445949424000},"page":"289-302","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Ting"],"prefix":"10.1145","author":[{"given":"Frank","family":"Cangialosi","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Dave","family":"Levin","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Neil","family":"Spring","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592605"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.35"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_14"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655195"},{"key":"e_1_3_2_1_6_1","volume-title":"Workshop on Hot Topics in Networks (HotNets)","author":"Cox R.","year":"2003","unstructured":"R. Cox , F. Dabek , F. Kaashoek , J. Li , and R. Morris . Practical, distributed network coordinates . In Workshop on Hot Topics in Networks (HotNets) , 2003 . R. Cox, F. Dabek, F. Kaashoek, J. Li, and R. Morris. Practical, distributed network coordinates. In Workshop on Hot Topics in Networks (HotNets), 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_8_1","volume-title":"Performance improvements on Tor or, why Tor is slow and what we're going to do about it. Online: https:\/\/www.torproject.org\/press\/presskit\/2009-03--11-performance.pdf","author":"Dingledine R.","year":"2009","unstructured":"R. Dingledine and S. J. Murdoch . Performance improvements on Tor or, why Tor is slow and what we're going to do about it. Online: https:\/\/www.torproject.org\/press\/presskit\/2009-03--11-performance.pdf , 2009 . R. Dingledine and S. J. Murdoch. Performance improvements on Tor or, why Tor is slow and what we're going to do about it. Online: https:\/\/www.torproject.org\/press\/presskit\/2009-03--11-performance.pdf, 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Security Symposium","author":"Evans N. S.","year":"2009","unstructured":"N. S. Evans , R. Dingledine , and C. Grothoff . A practical congestion attack on Tor using long paths . In USENIX Security Symposium , 2009 . N. S. Evans, R. Dingledine, and C. Grothoff. A practical congestion attack on Tor using long paths. In USENIX Security Symposium, 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_6"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637203"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698753"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium","author":"Jansen R.","year":"2014","unstructured":"R. Jansen , J. Geddes , C. Wacek , M. Sherr , and P. Syverson . Never been KIST: Tor's congestion management blossoms with kernel-informed socket transport . In USENIX Security Symposium , 2014 . R. Jansen, J. Geddes, C. Wacek, M. Sherr, and P. Syverson. Never been KIST: Tor's congestion management blossoms with kernel-informed socket transport. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_14_1","volume-title":"Users get routed: Traffic correlation on Tor by realistic adversaries","author":"Johnson A.","year":"2013","unstructured":"A. Johnson , C. Wacek , R. Jansen , M. Sherr , and P. Syverson . Users get routed: Traffic correlation on Tor by realistic adversaries . 2013 . A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson. Users get routed: Traffic correlation on Tor by realistic adversaries. 2013."},{"key":"e_1_3_2_1_15_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Lumezanu C.","year":"2009","unstructured":"C. Lumezanu , R. Baden , D. Levin , N. Spring , and B. Bhattacharjee . Symbiotic relationships in Internet routing overlays . In Symposium on Networked Systems Design and Implementation (NSDI) , 2009 . C. Lumezanu, R. Baden, D. Levin, N. Spring, and B. Bhattacharjee. Symbiotic relationships in Internet routing overlays. In Symposium on Networked Systems Design and Implementation (NSDI), 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_17_1","unstructured":"Neustar IP Geolocation.hrefhttps:\/\/www.neustar.biz\/services\/ip-intelligence https:\/\/www.neustar.biz\/services\/ip-intelligence.  Neustar IP Geolocation.hrefhttps:\/\/www.neustar.biz\/services\/ip-intelligence https:\/\/www.neustar.biz\/services\/ip-intelligence."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505206"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_19"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2009.26"},{"key":"e_1_3_2_1_21_1","volume-title":"Workshop on Hot Topics in Networks (HotNets)","author":"Peterson L.","year":"2002","unstructured":"L. Peterson , T. Anderson , D. Culler , and T. Roscoe . A blueprint for introducing disruptive technology into the Internet . In Workshop on Hot Topics in Networks (HotNets) , 2002 . L. Peterson, T. Anderson, D. Culler, and T. Roscoe. A blueprint for introducing disruptive technology into the Internet. In Workshop on Hot Topics in Networks (HotNets), 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_2_1_23_1","volume-title":"Mar.","author":"Borders Reporters Without","year":"2013","unstructured":"Reporters Without Borders . Enemies of the Internet 2013 Report. https:\/\/surveillance.rsf.org\/en\/wp-content\/uploads\/sites\/2\/2013\/03\/enemies-of-the-internet_2013.pdf , Mar. 2013 . Reporters Without Borders. Enemies of the Internet 2013 Report. https:\/\/surveillance.rsf.org\/en\/wp-content\/uploads\/sites\/2\/2013\/03\/enemies-of-the-internet_2013.pdf, Mar. 2013."},{"key":"e_1_3_2_1_24_1","unstructured":"RIPE NCC. RIPE Atlas. https:\/\/atlas.ripe.net.  RIPE NCC. RIPE Atlas. https:\/\/atlas.ripe.net."},{"key":"e_1_3_2_1_25_1","unstructured":"SamKnows. https:\/\/www.samknows.com.  SamKnows. https:\/\/www.samknows.com."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316233"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068819"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2005-13602"},{"key":"e_1_3_2_1_30_1","unstructured":"Stem Controller Library. https:\/\/stem.torproject.org.  Stem Controller Library. https:\/\/stem.torproject.org."},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Annual Technical Conference","author":"Sundaresan S.","year":"2014","unstructured":"S. Sundaresan , S. Burnett , N. Feamster , and W. De Donato . BISmark: A testbed for deploying measurements and applications in broadband access networks . In USENIX Annual Technical Conference , 2014 . S. Sundaresan, S. Burnett, N. Feamster, and W. De Donato. BISmark: A testbed for deploying measurements and applications in broadband access networks. In USENIX Annual Technical Conference, 2014."},{"key":"e_1_3_2_1_32_1","unstructured":"Tor Metrics. https:\/\/metrics.torproject.org.  Tor Metrics. https:\/\/metrics.torproject.org."},{"key":"e_1_3_2_1_33_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Wong B.","year":"2007","unstructured":"B. Wong , I. Stoyanov , and E. G. Sirer . Octant: A comprehensive framework for the geolocalization of Internet hosts . In Symposium on Networked Systems Design and Implementation (NSDI) , 2007 . B. Wong, I. Stoyanov, and E. G. Sirer. Octant: A comprehensive framework for the geolocalization of Internet hosts. In Symposium on Networked Systems Design and Implementation (NSDI), 2007."}],"event":{"name":"IMC '15: Internet Measurement Conference","location":"Tokyo Japan","acronym":"IMC '15","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2015 Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815701","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815675.2815701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:22Z","timestamp":1750225702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815701"}},"subtitle":["Measuring and Exploiting Latencies Between All Tor Nodes"],"short-title":[],"issued":{"date-parts":[[2015,10,28]]},"references-count":33,"alternative-id":["10.1145\/2815675.2815701","10.1145\/2815675"],"URL":"https:\/\/doi.org\/10.1145\/2815675.2815701","relation":{},"subject":[],"published":{"date-parts":[[2015,10,28]]},"assertion":[{"value":"2015-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}