{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:52:13Z","timestamp":1776783133563,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","award":["C15\/IS\/10486741 PETIT"],"award-info":[{"award-number":["C15\/IS\/10486741 PETIT"]}],"id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3139550.3139564","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"165-175","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Analysis of Fingerprinting Techniques for Tor Hidden Services"],"prefix":"10.1145","author":[{"given":"Andriy","family":"Panchenko","sequence":"first","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"given":"Asya","family":"Mitseva","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Fabian","family":"Lanze","sequence":"additional","affiliation":[{"name":"Huf Secure Mobile GmbH, Velbert, Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Better fairer circuit OOM handling. https:\/\/trac.torproject.org\/projects\/tor\/ticket\/9093. (2014).  2014. Better fairer circuit OOM handling. https:\/\/trac.torproject.org\/projects\/tor\/ticket\/9093. (2014)."},{"key":"e_1_3_2_1_2_1","unstructured":"2014. Thoughts and Concerns about Operation Onymous. https:\/\/blog.torproject.org\/blog\/thoughts-and-concerns-about-operation-onymous. (2014).  2014. Thoughts and Concerns about Operation Onymous. https:\/\/blog.torproject.org\/blog\/thoughts-and-concerns-about-operation-onymous. (2014)."},{"key":"e_1_3_2_1_3_1","unstructured":"2015. Getting the HSDir flag should require the Stable flag. https:\/\/github.com\/DonnchaC\/torspec\/blob\/master\/proposals\/243-hsdir-flag-need-stable.txt. (2015).  2015. Getting the HSDir flag should require the Stable flag. https:\/\/github.com\/DonnchaC\/torspec\/blob\/master\/proposals\/243-hsdir-flag-need-stable.txt. (2015)."},{"key":"e_1_3_2_1_4_1","unstructured":"2015. Load Balancing\/High Availability Hidden Services. http:\/\/archives.seul.org\/or\/talk\/Mar-2015\/msg00218.html. (2015).  2015. Load Balancing\/High Availability Hidden Services. http:\/\/archives.seul.org\/or\/talk\/Mar-2015\/msg00218.html. (2015)."},{"key":"e_1_3_2_1_5_1","unstructured":"2015. Possible Solutions for Increasing the Capacity of a Hidden Service. https:\/\/lists.torproject.org\/pipermail\/tor-talk\/2015-March\/037173.html. (2015).  2015. Possible Solutions for Increasing the Capacity of a Hidden Service. https:\/\/lists.torproject.org\/pipermail\/tor-talk\/2015-March\/037173.html. (2015)."},{"key":"e_1_3_2_1_6_1","unstructured":"2017. Tor Rendezvous Specification. https:\/\/gitweb.torproject.org\/torspec.git?a=blob_plain;hb=HEAD;f=rend-spec.txt. (2017).  2017. Tor Rendezvous Specification. https:\/\/gitweb.torproject.org\/torspec.git?a=blob_plain;hb=HEAD;f=rend-spec.txt. (2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.20"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_11_1","volume-title":"Version 3. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/dir-spec.txt.","author":"Dingledine Roger","year":"2017","unstructured":"Roger Dingledine and Nick Mathewson . 2017. Tor directory protocol , Version 3. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/dir-spec.txt. ( 2017 ). Roger Dingledine and Nick Mathewson. 2017. Tor directory protocol, Version 3. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/dir-spec.txt. (2017)."},{"key":"e_1_3_2_1_12_1","unstructured":"Roger Dingledine and Nick Mathewson. 2017. Tor Protocol Specification. https:\/\/gitweb.torproject.org\/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec.txt. (2017).  Roger Dingledine and Nick Mathewson. 2017. Tor Protocol Specification. https:\/\/gitweb.torproject.org\/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec.txt. (2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_15_1","volume-title":"Profiling Tor Users with Unsupervised Learning Techniques. In International Workshop on Inference and Privacy in a Hyperconnected World (INFER). DE GRUYTER","author":"G\u00e1lvez Rafael","year":"2016","unstructured":"Rafael G\u00e1lvez , Marc Juarez , and Claudia Diaz . 2016 . Profiling Tor Users with Unsupervised Learning Techniques. In International Workshop on Inference and Privacy in a Hyperconnected World (INFER). DE GRUYTER , Darmstadt, Germany. Rafael G\u00e1lvez, Marc Juarez, and Claudia Diaz. 2016. Profiling Tor Users with Unsupervised Learning Techniques. In International Workshop on Inference and Privacy in a Hyperconnected World (INFER). DE GRUYTER, Darmstadt, Germany."},{"key":"e_1_3_2_1_16_1","volume-title":"25th USENIX Security Symposium. USENIX Association","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis . 2016 . k-fingerprinting: a Robust Scalable Website Fingerprinting Technique . In 25th USENIX Security Symposium. USENIX Association , Austin, TX, 1187--1204. Jamie Hayes and George Danezis. 2016. k-fingerprinting: a Robust Scalable Website Fingerprinting Technique. In 25th USENIX Security Symposium. USENIX Association, Austin, TX, 1187--1204."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_18_1","volume-title":"The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. In 21st Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS). Internet Society","author":"Jansen Rob","year":"2014","unstructured":"Rob Jansen , Florian Tschorsch , Aaron Johnson , and Bjorn Scheuermann . 2014 . The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. In 21st Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS). Internet Society , San Diego, CA, USA. Rob Jansen, Florian Tschorsch, Aaron Johnson, and Bjorn Scheuermann. 2014. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. In 21st Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_20_1","volume-title":"Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. In 24th USENIX Security Symposium. USENIX Association, Washington, D.C., 287--302","author":"Kwon Albert","year":"2015","unstructured":"Albert Kwon , Mashael AlSabah , David Lazar , Marc Dacier , and Srinivas Devadas . 2015 . Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. In 24th USENIX Security Symposium. USENIX Association, Washington, D.C., 287--302 . Albert Kwon, Mashael AlSabah, David Lazar, Marc Dacier, and Srinivas Devadas. 2015. Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services. In 24th USENIX Security Symposium. USENIX Association, Washington, D.C., 287--302."},{"key":"e_1_3_2_1_21_1","unstructured":"Nick Mathewson. 2015. Next-Generation Hidden Services in Tor. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/224-rend-spec-ng.txt. (2015).  Nick Mathewson. 2015. Next-Generation Hidden Services in Tor. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/224-rend-spec-ng.txt. (2015)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813667"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2989054"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"e_1_3_2_1_25_1","unstructured":"Juha Nurmi. 2015. Warning: 255 fake and booby trapped onion sites. (2015). https:\/\/lists.torproject.org\/pipermail\/tor-talk\/2015-July\/038318.html  Juha Nurmi. 2015. Warning: 255 fake and booby trapped onion sites. (2015). https:\/\/lists.torproject.org\/pipermail\/tor-talk\/2015-July\/038318.html"},{"key":"e_1_3_2_1_26_1","unstructured":"Donncha O'Cearbhaill. 2017. OnionBalance. https:\/\/onionbalance.readthedocs.org\/en\/latest\/. (2017).  Donncha O'Cearbhaill. 2017. OnionBalance. https:\/\/onionbalance.readthedocs.org\/en\/latest\/. (2017)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_30_1","unstructured":"Mike Perry. 2015. Notes and Action Items from Hidden Service Fingerprinting Session. https:\/\/lists.torproject.org\/pipermail\/tor-dev\/2015-October\/009632.html. (2015).  Mike Perry. 2015. Notes and Action Items from Hidden Service Fingerprinting Session. https:\/\/lists.torproject.org\/pipermail\/tor-dev\/2015-October\/009632.html. (2015)."},{"key":"e_1_3_2_1_31_1","volume-title":"Patel","author":"Tata Sandeep","year":"2007","unstructured":"Sandeep Tata and Jignesh M . Patel . 2007 . Estimating the Selectivity of tf-idf Based Cosine Similarity Predicates. Newsletter ACM SIGMOD Record 36 (June 2007), 7--12. Issue 2. Sandeep Tata and Jignesh M. Patel. 2007. Estimating the Selectivity of tf-idf Based Cosine Similarity Predicates. Newsletter ACM SIGMOD Record 36 (June 2007), 7--12. Issue 2."},{"key":"e_1_3_2_1_32_1","volume-title":"Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd USENIX conference on Security Symposium. USENIX Association, 1--15","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , Rob Johnson , and Ian Goldberg . 2014 . Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd USENIX conference on Security Symposium. USENIX Association, 1--15 . Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd USENIX conference on Security Symposium. USENIX Association, 1--15."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0027"},{"key":"e_1_3_2_1_35_1","unstructured":"Chih wei Hsu Chih-Chung Chang and Chih-Jen Lin. 2010. A Practical Guide to Support Vector Classification. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/guide\/guide.pdf. (2010).  Chih wei Hsu Chih-Chung Chang and Chih-Jen Lin. 2010. A Practical Guide to Support Vector Classification. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/guide\/guide.pdf. (2010)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199325"},{"key":"e_1_3_2_1_37_1","volume-title":"An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In 17th conference on USENIX Security symposium. USENIX Association","author":"Zander Sebastian","year":"2008","unstructured":"Sebastian Zander and Steven Murdoch . 2008 . An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In 17th conference on USENIX Security symposium. USENIX Association , Berkeley, CA, USA, 211--225. Sebastian Zander and Steven Murdoch. 2008. An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In 17th conference on USENIX Security symposium. USENIX Association, Berkeley, CA, USA, 211--225."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139564","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:14:02Z","timestamp":1750212842000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139564"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":37,"alternative-id":["10.1145\/3139550.3139564","10.1145\/3139550"],"URL":"https:\/\/doi.org\/10.1145\/3139550.3139564","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}