{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:02Z","timestamp":1750306082038,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134608","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"577-589","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["The Devil's in The Details"],"prefix":"10.1145","author":[{"given":"Devashish","family":"Gosain","sequence":"first","affiliation":[{"name":"IIIT Delhi, India"}]},{"given":"Anshika","family":"Agarwal","sequence":"additional","affiliation":[{"name":"IIIT Delhi, India"}]},{"given":"Sambuddho","family":"Chakravarty","sequence":"additional","affiliation":[{"name":"IIIT Delhi, India"}]},{"given":"H. B.","family":"Acharya","sequence":"additional","affiliation":[{"name":"Rochester Inst of Tech"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"No direction home: The true cost of routing around decoys.\" in NDSS","author":"Houmansadr A.","year":"2014","unstructured":"A. Houmansadr , E. L. Wong , and V. Shmatikov , \" No direction home: The true cost of routing around decoys.\" in NDSS , 2014 . A. Houmansadr, E. L. Wong, and V. Shmatikov, \"No direction home: The true cost of routing around decoys.\" in NDSS, 2014."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"e_1_3_2_1_4_1","volume-title":"How the great firewall of china is blocking tor.\" in FOCI","author":"Winter P.","year":"2012","unstructured":"P. Winter and S. Lindskog , \" How the great firewall of china is blocking tor.\" in FOCI , 2012 . P. Winter and S. Lindskog, \"How the great firewall of china is blocking tor.\" in FOCI, 2012."},{"key":"e_1_3_2_1_5_1","volume-title":"Decoy routing: Toward unblockable internet communication.\" in FOCI","author":"Karlin J.","year":"2011","unstructured":"J. Karlin , D. Ellard , A. W. Jackson , C. E. Jones , G. Lauer , D. Mankins , and W. T. Strayer , \" Decoy routing: Toward unblockable internet communication.\" in FOCI , 2011 . J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. Mankins, and W. T. Strayer, \"Decoy routing: Toward unblockable internet communication.\" in FOCI, 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046730"},{"key":"e_1_3_2_1_7_1","volume-title":"Telex: Anticensorship in the network infrastructure.\" in USENIX Security Symposium","author":"Wustrow E.","year":"2011","unstructured":"E. Wustrow , S. Wolchok , I. Goldberg , and J. A. Halderman , \" Telex: Anticensorship in the network infrastructure.\" in USENIX Security Symposium , 2011 . E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman, \"Telex: Anticensorship in the network infrastructure.\" in USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_8_1","first-page":"159","volume-title":"Tapdance: End-to-middle anticensorship without flow blocking,\" in 23rd USENIX Security Symposium (USENIX Security 14)","author":"Wustrow E.","year":"2014","unstructured":"E. Wustrow , C. M. Swanson , and J. A. Halderman , \" Tapdance: End-to-middle anticensorship without flow blocking,\" in 23rd USENIX Security Symposium (USENIX Security 14) , 2014 , pp. 159 -- 174 . E. Wustrow, C. M. Swanson, and J. A. Halderman, \"Tapdance: End-to-middle anticensorship without flow blocking,\" in 23rd USENIX Security Symposium (USENIX Security 14), 2014, pp. 159--174."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366287"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978312"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382209"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978367"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"GLOBECOM'06","author":"Qiu J.","year":"2006","unstructured":"J. Qiu and L. Gao , \" As path inference by exploiting known as paths,\" in Global Telecommunications Conference, 2006 . GLOBECOM'06 . IEEE. IEEE, 2006 , pp. 1 -- 5 . J. Qiu and L. Gao, \"As path inference by exploiting known as paths,\" in Global Telecommunications Conference, 2006. GLOBECOM'06. IEEE. IEEE, 2006, pp. 1--5."},{"key":"e_1_3_2_1_14_1","unstructured":"\"As relationships \" http:\/\/www.caida.org\/data\/as-relationships\/.  \"As relationships \" http:\/\/www.caida.org\/data\/as-relationships\/."},{"key":"e_1_3_2_1_15_1","first-page":"16","volume-title":"Exploiting internet route sharing for large scale available bandwidth estimation,\" in Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement","author":"Hu N.","year":"2005","unstructured":"N. Hu and P. Steenkiste , \" Exploiting internet route sharing for large scale available bandwidth estimation,\" in Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement . USENIX Association , 2005 , pp. 16 -- 16 . N. Hu and P. Steenkiste, \"Exploiting internet route sharing for large scale available bandwidth estimation,\" in Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. USENIX Association, 2005, pp. 16--16."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.09.002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2282756"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1202844"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.5.001431"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.47"},{"key":"e_1_3_2_1_22_1","first-page":"44","volume-title":"proceedings. 11th symposium on. IEEE","author":"Dharmapurikar S.","year":"2003","unstructured":"S. Dharmapurikar , P. Krishnamurthy , T. Sproull , and J. Lockwood , \" Deep packet inspection using parallel bloom filters,\" in High performance interconnects, 2003 . proceedings. 11th symposium on. IEEE , 2003 , pp. 44 -- 51 . S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood, \"Deep packet inspection using parallel bloom filters,\" in High performance interconnects, 2003. proceedings. 11th symposium on. IEEE, 2003, pp. 44--51."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382211"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_27_1","unstructured":"\"Route views project \" http:\/\/archive.routeviews.org\/.  \"Route views project \" http:\/\/archive.routeviews.org\/."},{"key":"e_1_3_2_1_28_1","volume-title":"Optimizing the placement of implicit proxies,\" https:\/\/www.cs.princeton.edu\/~jrex\/papers\/decoy-routing.pdf","author":"Cesareo J.","year":"2012","unstructured":"J. Cesareo , J. Karlin , J. Rexford , and M. Schapira , \" Optimizing the placement of implicit proxies,\" https:\/\/www.cs.princeton.edu\/~jrex\/papers\/decoy-routing.pdf , 2012 . J. Cesareo, J. Karlin, J. Rexford, and M. Schapira, \"Optimizing the placement of implicit proxies,\" https:\/\/www.cs.princeton.edu\/~jrex\/papers\/decoy-routing.pdf, 2012."},{"key":"e_1_3_2_1_29_1","volume-title":"Few throats to choke: On the current structure of the internet,\" in Local Computer Networks","author":"Acharya H. B.","year":"2017","unstructured":"H. B. Acharya , S. Chakravarty , and D. Gosain , \" Few throats to choke: On the current structure of the internet,\" in Local Computer Networks , 2017 . H. B. Acharya, S. Chakravarty, and D. Gosain, \"Few throats to choke: On the current structure of the internet,\" in Local Computer Networks, 2017."},{"key":"e_1_3_2_1_30_1","unstructured":"\"Archipelago (ark) measurement infrastructure \" http:\/\/www.caida.org\/projects\/ark\/.  \"Archipelago (ark) measurement infrastructure \" http:\/\/www.caida.org\/projects\/ark\/."},{"key":"e_1_3_2_1_31_1","first-page":"367","volume-title":"iplane: An information plane for distributed services,\" in Proceedings of the 7th symposium on Operating systems design and implementation","author":"Madhyastha H. V.","year":"2006","unstructured":"H. V. Madhyastha , T. Isdal , M. Piatek , C. Dixon , T. Anderson , A. Krishnamurthy , and A. Venkataramani , \" iplane: An information plane for distributed services,\" in Proceedings of the 7th symposium on Operating systems design and implementation . USENIX Association , 2006 , pp. 367 -- 380 . H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani, \"iplane: An information plane for distributed services,\" in Proceedings of the 7th symposium on Operating systems design and implementation. USENIX Association, 2006, pp. 367--380."},{"key":"e_1_3_2_1_32_1","volume-title":"Denasa: Destination-naive as-awareness in anonymous communications,\" in Proceedings of the 16th Privacy Enhancing Technologies Symposium (PETS","author":"Barton A.","year":"2016","unstructured":"A. Barton and M. Wright , \" Denasa: Destination-naive as-awareness in anonymous communications,\" in Proceedings of the 16th Privacy Enhancing Technologies Symposium (PETS 2016 ), July 2016. A. Barton and M. Wright, \"Denasa: Destination-naive as-awareness in anonymous communications,\" in Proceedings of the 16th Privacy Enhancing Technologies Symposium (PETS 2016), July 2016."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653708"},{"key":"e_1_3_2_1_34_1","first-page":"33","volume-title":"ICOIN'09","author":"Pandey S.","year":"2009","unstructured":"S. Pandey , M.-J. Choi , S.-J. Lee , and J. W. Hong , \" Ip network topology discovery using snmp,\" in Proceedings of the 23rd International Conference on Information Networking, ser . ICOIN'09 . Piscataway, NJ, USA: IEEE Press , 2009 , pp. 33 -- 37 . S. Pandey, M.-J. Choi, S.-J. Lee, and J. W. Hong, \"Ip network topology discovery using snmp,\" in Proceedings of the 23rd International Conference on Information Networking, ser. ICOIN'09. Piscataway, NJ, USA: IEEE Press, 2009, pp. 33--37."},{"key":"e_1_3_2_1_35_1","unstructured":"\"Traceroute Looking Glass \" http:\/\/traceroute.org\/.  \"Traceroute Looking Glass \" http:\/\/traceroute.org\/."},{"key":"e_1_3_2_1_36_1","unstructured":"\"Midar \" http:\/\/www.caida.org\/tools\/measurement\/midar\/.  \"Midar \" http:\/\/www.caida.org\/tools\/measurement\/midar\/."},{"key":"e_1_3_2_1_37_1","unstructured":"\"Ip to asn mapping \" http:\/\/www.team-cymru.org\/IP-ASN-mapping.html.  \"Ip to asn mapping \" http:\/\/www.team-cymru.org\/IP-ASN-mapping.html."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4564479"},{"key":"e_1_3_2_1_39_1","unstructured":"\"Freedom house - freedom of press \" https:\/\/freedomhouse.org\/.  \"Freedom house - freedom of press \" https:\/\/freedomhouse.org\/."},{"key":"e_1_3_2_1_40_1","unstructured":"\"Open net initiative \" https:\/\/opennet.net\/.  \"Open net initiative \" https:\/\/opennet.net\/."},{"key":"e_1_3_2_1_41_1","unstructured":"\"Alexa - actionable analytics for the web \" http:\/\/www.alexa.com\/topsites.  \"Alexa - actionable analytics for the web \" http:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_1_42_1","unstructured":"\"Inferring mechanics of web censorship around the world \" in Presented as part of the 2nd USENIX Workshop on Free and Open Communications on the Internet Berkeley CA 2012.  \"Inferring mechanics of web censorship around the world \" in Presented as part of the 2nd USENIX Workshop on Free and Open Communications on the Internet Berkeley CA 2012."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317307.2317311"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/713848278"},{"key":"e_1_3_2_1_45_1","volume-title":"Isolario: a do-ut-des approach to improve the appeal of bgp route collecting,\" arXiv preprint arXiv:1611.06904","author":"Gregori E.","year":"2016","unstructured":"E. Gregori , A. Improta , and L. Sani , \" Isolario: a do-ut-des approach to improve the appeal of bgp route collecting,\" arXiv preprint arXiv:1611.06904 , 2016 . E. Gregori, A. Improta, and L. Sani, \"Isolario: a do-ut-des approach to improve the appeal of bgp route collecting,\" arXiv preprint arXiv:1611.06904, 2016."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2323128"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134608","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134608"}},"subtitle":["Placing Decoy Routers in the Internet"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":45,"alternative-id":["10.1145\/3134600.3134608","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134608","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}