{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:14Z","timestamp":1750220174437,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3559613.3563208","type":"proceedings-article","created":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T22:13:51Z","timestamp":1667340831000},"page":"35-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Sauteed Onions"],"prefix":"10.1145","author":[{"given":"Rasmus","family":"Dahlberg","sequence":"first","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"Paul","family":"Syverson","sequence":"additional","affiliation":[{"name":"U.S. Naval Research Laboratory, Washington D.C., DC, USA"}]},{"given":"Linus","family":"Nordberg","sequence":"additional","affiliation":[{"name":"Verkligen Data AB, Stockholm, Sweden"}]},{"given":"Matthew","family":"Finkel","sequence":"additional","affiliation":[{"name":"Independent, Grand Junction CO, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"unstructured":"Ahmia. Indexing and crawling. https:\/\/ahmia.fi\/documentation\/indexing\/.  Ahmia. Indexing and crawling. https:\/\/ahmia.fi\/documentation\/indexing\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"Artifact. https:\/\/gitlab.torproject.org\/tpo\/onion-services\/sauteed-onions 02022.  Artifact. https:\/\/gitlab.torproject.org\/tpo\/onion-services\/sauteed-onions 02022.","key":"e_1_3_2_1_2_1"},{"volume-title":"Proc. ACM CCS, 02019","author":"Aas J.","unstructured":"J. Aas , R. Barnes , B. Case , Z. Durumeric , P. Eckersley , A. Flores-L\u00f3pez , J.A. Halderman , J. Hoffman-Andrews , J. Kasten , E. Rescorla , S.D. Schoen , B. Warren . Let's Encrypt : An automated certificate authority to encrypt the entire web . Proc. ACM CCS, 02019 . J. Aas, R. Barnes, B. Case, Z. Durumeric, P. Eckersley, A. Flores-L\u00f3pez, J.A. Halderman, J. Hoffman-Andrews, J. Kasten, E. Rescorla, S.D. Schoen, B. Warren. Let's Encrypt: An automated certificate authority to encrypt the entire web. Proc. ACM CCS, 02019.","key":"e_1_3_2_1_3_1"},{"volume-title":"Proc. USENIX Sec., 02021","author":"Birge-Lee H.","unstructured":"H. Birge-Lee , L. Wang , D. McCarney , R. Shoemaker , J. Rexford , P. Mittal . Experiences deploying multi-vantage-point domain validation at Let's Encrypt . Proc. USENIX Sec., 02021 . H. Birge-Lee, L. Wang, D. McCarney, R. Shoemaker, J. Rexford, P. Mittal. Experiences deploying multi-vantage-point domain validation at Let's Encrypt. Proc. USENIX Sec., 02021.","key":"e_1_3_2_1_4_1"},{"unstructured":"CA\/Browser Forum. Ballot 144 -- validation rules for .onion names. https:\/\/ cabforum.org\/2015\/02\/18\/ballot-144-validation-rules-dot-onion-names\/ 02015.  CA\/Browser Forum. Ballot 144 -- validation rules for .onion names. https:\/\/ cabforum.org\/2015\/02\/18\/ballot-144-validation-rules-dot-onion-names\/ 02015.","key":"e_1_3_2_1_5_1"},{"unstructured":"CA\/Browser Forum. Ballot sc27v3: Version 3 onion certificates. https:\/\/ cabforum.org\/2020\/02\/20\/ballot-sc27v3-version-3-onion-certificates\/ 02020.  CA\/Browser Forum. Ballot sc27v3: Version 3 onion certificates. https:\/\/ cabforum.org\/2020\/02\/20\/ballot-sc27v3-version-3-onion-certificates\/ 02020.","key":"e_1_3_2_1_6_1"},{"volume-title":"Proc. IEEE CNS, 02015","author":"Chuat L.","unstructured":"L. Chuat , P. Szalachowski , A. Perrig , B. Laurie , E. Messeri . Efficient gossip protocols for verifying the consistency of certificate logs . Proc. IEEE CNS, 02015 . L. Chuat, P. Szalachowski, A. Perrig, B. Laurie, E. Messeri. Efficient gossip protocols for verifying the consistency of certificate logs. Proc. IEEE CNS, 02015.","key":"e_1_3_2_1_7_1"},{"volume-title":"Proc. NordSec, 02018","author":"Pulls R. Dahlberg T.","unstructured":"R. Dahlberg T. Pulls . Verifiable light-weight monitoring for Certificate Transparency logs . Proc. NordSec, 02018 . R. Dahlberg T. Pulls. Verifiable light-weight monitoring for Certificate Transparency logs. Proc. NordSec, 02018.","key":"e_1_3_2_1_8_1"},{"volume-title":"Proc. NordSec, 02016","author":"Dahlberg R.","unstructured":"R. Dahlberg , T. Pulls , R. Peeters . Efficient sparse Merkle trees - caching strategies and secure (non-)membership proofs . Proc. NordSec, 02016 . R. Dahlberg, T. Pulls, R. Peeters. Efficient sparse Merkle trees - caching strategies and secure (non-)membership proofs. Proc. NordSec, 02016.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"crossref","unstructured":"R. Dahlberg T. Pulls T. Ritter P. Syverson. Privacy-preserving & incrementallydeployable support for Certificate Transparency in Tor. PoPETs 2021(2) 02021.  R. Dahlberg T. Pulls T. Ritter P. Syverson. Privacy-preserving & incrementallydeployable support for Certificate Transparency in Tor. PoPETs 2021(2) 02021.","key":"e_1_3_2_1_10_1","DOI":"10.2478\/popets-2021-0024"},{"unstructured":"DigiCert Inc. Ordering a .onion certificate from DigiCert. https:\/\/ www.digicert.com\/blog\/ordering-a-onion-certificate-from-digicert.  DigiCert Inc. Ordering a .onion certificate from DigiCert. https:\/\/ www.digicert.com\/blog\/ordering-a-onion-certificate-from-digicert.","key":"e_1_3_2_1_11_1"},{"volume-title":"Proc. USENIX Sec., 02004","author":"Dingledine R.","unstructured":"R. Dingledine , N. Mathewson , P. Syverson . Tor: The Second-Generation Onion Router . Proc. USENIX Sec., 02004 . R. Dingledine, N. Mathewson, P. Syverson. Tor: The Second-Generation Onion Router. Proc. USENIX Sec., 02004.","key":"e_1_3_2_1_12_1"},{"volume-title":"Proc. ESORICS, 02016","author":"Dowling B.","unstructured":"B. Dowling , F. G\u00fcnther , U. Herath , D. Stebila . Secure logging schemes and certificate transparency . Proc. ESORICS, 02016 . B. Dowling, F. G\u00fcnther, U. Herath, D. Stebila. Secure logging schemes and certificate transparency. Proc. ESORICS, 02016.","key":"e_1_3_2_1_13_1"},{"unstructured":"A. Eijdenberg B. Laurie A. Cutter. Verifiable data structures. https: \/\/github.com\/google\/trillian\/blob\/111e9369ab032e493a2f19f9be6d16c4f78ccca5\/ docs\/papers\/VerifiableDataStructures.pdf 02018.  A. Eijdenberg B. Laurie A. Cutter. Verifiable data structures. https: \/\/github.com\/google\/trillian\/blob\/111e9369ab032e493a2f19f9be6d16c4f78ccca5\/ docs\/papers\/VerifiableDataStructures.pdf 02018.","key":"e_1_3_2_1_14_1"},{"unstructured":"EFF. Changing a certificate's domain. https:\/\/eff-certbot.readthedocs.io\/en\/ stable\/using.html#changing-a-certificate-s-domains.  EFF. Changing a certificate's domain. https:\/\/eff-certbot.readthedocs.io\/en\/ stable\/using.html#changing-a-certificate-s-domains.","key":"e_1_3_2_1_15_1"},{"unstructured":"A. Fink. Mnemonic .onion URLs. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/ proposals\/194-mnemonic-urls.txt 02012.  A. Fink. Mnemonic .onion URLs. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/ proposals\/194-mnemonic-urls.txt 02012.","key":"e_1_3_2_1_16_1"},{"unstructured":"D.K. Gillmor. Dangerous Labels in DNS and E-mail. Internet-Draft draft-dkgintarea-dangerous-labels-01 IETF 02022.  D.K. Gillmor. Dangerous Labels in DNS and E-mail. Internet-Draft draft-dkgintarea-dangerous-labels-01 IETF 02022.","key":"e_1_3_2_1_17_1"},{"unstructured":"Google Inc. Known logs. https:\/\/github.com\/google\/certificate-transparencycommunity-site\/blob\/master\/docs\/google\/known-logs.md 02022.  Google Inc. Known logs. https:\/\/github.com\/google\/certificate-transparencycommunity-site\/blob\/master\/docs\/google\/known-logs.md 02022.","key":"e_1_3_2_1_18_1"},{"unstructured":"Harica. DV certificates for onion websites. https:\/\/news.harica.gr\/article\/ onion_announcement\/ 02021.  Harica. DV certificates for onion websites. https:\/\/news.harica.gr\/article\/ onion_announcement\/ 02021.","key":"e_1_3_2_1_19_1"},{"unstructured":"G. Kadianakis Y. Angel D. Goulet. A name system API for Tor Onion Services. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/279-naminglayer-api.txt 02016.  G. Kadianakis Y. Angel D. Goulet. A name system API for Tor Onion Services. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals\/279-naminglayer-api.txt 02016.","key":"e_1_3_2_1_20_1"},{"issue":"10","key":"e_1_3_2_1_21_1","first-page":"40","volume":"57","author":"B.","unstructured":"B. Laurie. Certificate Transparency. Commun. ACM , 57 ( 10 ): 40 -- 46 , 02014. B. Laurie. Certificate Transparency. Commun. ACM, 57(10):40--46, 02014.","journal-title":"Laurie. Certificate Transparency. Commun. ACM"},{"unstructured":"B. Laurie. Re: [Trans] Mozilla's basic take on binary transparency. https:\/\/ mailarchive.ietf.org\/arch\/msg\/trans\/1FxzTkn4LVxU6KN2P3YfbVsKpho\/ 02017.  B. Laurie. Re: [Trans] Mozilla's basic take on binary transparency. https:\/\/ mailarchive.ietf.org\/arch\/msg\/trans\/1FxzTkn4LVxU6KN2P3YfbVsKpho\/ 02017.","key":"e_1_3_2_1_22_1"},{"unstructured":"B. Laurie A. Langley E. Kasper. Certificate Transparency. https:\/\/tools.ietf.org\/ html\/rfc6962 02013.  B. Laurie A. Langley E. Kasper. Certificate Transparency. https:\/\/tools.ietf.org\/ html\/rfc6962 02013.","key":"e_1_3_2_1_23_1"},{"volume-title":"Proc. ACM CCS, 02019","author":"Li B.","unstructured":"B. Li , J. Lin , F. Li , Q. Wang , Qi Li , J. Jing , C. Wang . Certificate Transparency in the wild: Exploring the reliability of monitors . Proc. ACM CCS, 02019 . B. Li, J. Lin, F. Li, Q. Wang, Qi Li, J. Jing, C. Wang. Certificate Transparency in the wild: Exploring the reliability of monitors. Proc. ACM CCS, 02019.","key":"e_1_3_2_1_24_1"},{"unstructured":"M.S. Melara A. Blankstein J. Bonneau E.W. Felten M.J. Freedman. CONIKS: Bringing key transparency to end users. USENIX Sec. 02015.  M.S. Melara A. Blankstein J. Bonneau E.W. Felten M.J. Freedman. CONIKS: Bringing key transparency to end users. USENIX Sec. 02015.","key":"e_1_3_2_1_25_1"},{"unstructured":"S. Migliano S. Woodhams. Websites blocked in Russia since Ukraine invasion. https:\/\/www.top10vpn.com\/research\/websites-blocked-in-russia\/ 02022.  S. Migliano S. Woodhams. Websites blocked in Russia since Ukraine invasion. https:\/\/www.top10vpn.com\/research\/websites-blocked-in-russia\/ 02022.","key":"e_1_3_2_1_26_1"},{"unstructured":"mkp224o-vanity address generator for ed25519 onion services. https:\/\/ github.com\/cathugger\/mkp224o 02022.  mkp224o-vanity address generator for ed25519 onion services. https:\/\/ github.com\/cathugger\/mkp224o 02022.","key":"e_1_3_2_1_27_1"},{"unstructured":"Mozilla. Security\/binary transparency. https:\/\/wiki.mozilla.org\/Security\/ Binary_Transparency 02017.  Mozilla. Security\/binary transparency. https:\/\/wiki.mozilla.org\/Security\/ Binary_Transparency 02017.","key":"e_1_3_2_1_28_1"},{"unstructured":"A. Muffet. Real-world onion sites. https:\/\/github.com\/alecmuffett\/real-worldonion-sites 02022.  A. Muffet. Real-world onion sites. https:\/\/github.com\/alecmuffett\/real-worldonion-sites 02022.","key":"e_1_3_2_1_29_1"},{"unstructured":"A. Muffett. Same origin onion certificates. https:\/\/crt.sh\/?id=6819596552 02020.  A. Muffett. Same origin onion certificates. https:\/\/crt.sh\/?id=6819596552 02020.","key":"e_1_3_2_1_30_1"},{"unstructured":"Namecoin. https:\/\/www.namecoin.org\/.  Namecoin. https:\/\/www.namecoin.org\/.","key":"e_1_3_2_1_31_1"},{"unstructured":"L. Nordberg. Tor consensus transparency. https:\/\/gitweb.torproject.org\/ torspec.git\/tree\/proposals\/267-tor-consensus-transparency.txt 02014.  L. Nordberg. Tor consensus transparency. https:\/\/gitweb.torproject.org\/ torspec.git\/tree\/proposals\/267-tor-consensus-transparency.txt 02014.","key":"e_1_3_2_1_32_1"},{"unstructured":"L. Nordberg D.K. Gillmor T. Ritter. Gossiping in CT. Internet-draft draft-ietftrans-gossip-05 IETF 02018.  L. Nordberg D.K. Gillmor T. Ritter. Gossiping in CT. Internet-draft draft-ietftrans-gossip-05 IETF 02018.","key":"e_1_3_2_1_33_1"},{"unstructured":"J. Nurmi. Understanding the Usage of Anonymous Onion Services. PhD thesis Tampere University Tampere Finland 02019.  J. Nurmi. Understanding the Usage of Anonymous Onion Services. PhD thesis Tampere University Tampere Finland 02019.","key":"e_1_3_2_1_34_1"},{"unstructured":"nusenu. HAROI: Human readable authenticated relay operator identifier. https: \/\/lists.torproject.org\/pipermail\/tor-dev\/2021-December\/014688.html 02021.  nusenu. HAROI: Human readable authenticated relay operator identifier. https: \/\/lists.torproject.org\/pipermail\/tor-dev\/2021-December\/014688.html 02021.","key":"e_1_3_2_1_35_1"},{"unstructured":"Tor Project. Onion-location. https:\/\/community.torproject.org\/onion-services\/ advanced\/onion-location\/.  Tor Project. Onion-location. https:\/\/community.torproject.org\/onion-services\/ advanced\/onion-location\/.","key":"e_1_3_2_1_36_1"},{"unstructured":"Tor Project. Onion services. https:\/\/community.torproject.org\/onion-services\/.  Tor Project. Onion services. https:\/\/community.torproject.org\/onion-services\/.","key":"e_1_3_2_1_37_1"},{"unstructured":"Silvio Rhatto. Sauteed week API backend. https:\/\/gitlab.torproject.org\/rhatto\/ sauteed-week\/-\/blob\/main\/docs\/api.md 02022.  Silvio Rhatto. Sauteed week API backend. https:\/\/gitlab.torproject.org\/rhatto\/ sauteed-week\/-\/blob\/main\/docs\/api.md 02022.","key":"e_1_3_2_1_38_1"},{"unstructured":"Sauteed onion certificate. https:\/\/crt.sh\/?id=5957691193 02022.  Sauteed onion certificate. https:\/\/crt.sh\/?id=5957691193 02022.","key":"e_1_3_2_1_39_1"},{"volume-title":"Proc. IEEE CNS, 02015","author":"Scaife N.","unstructured":"N. Scaife , H. Carter , P. Traynor . OnionDNS : A seizure-resistant top-level domain . Proc. IEEE CNS, 02015 . N. Scaife, H. Carter, P. Traynor. OnionDNS: A seizure-resistant top-level domain. Proc. IEEE CNS, 02015.","key":"e_1_3_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/MSEC.2021.3103461"},{"volume-title":"Proc. IEEE Security and Privacy, 02019","author":"Stark E.","unstructured":"E. Stark , R. Sleevi , R. Muminovic , D. O'Brien , E. Messeri , A. Porter Felt , B. McMillion , P. Tabriz . Does certificate transparency break the web? measuring adoption and error rate . Proc. IEEE Security and Privacy, 02019 . E. Stark, R. Sleevi, R. Muminovic, D. O'Brien, E. Messeri, A. Porter Felt, B. McMillion, P. Tabriz. Does certificate transparency break the web? measuring adoption and error rate. Proc. IEEE Security and Privacy, 02019.","key":"e_1_3_2_1_42_1"},{"volume-title":"Proc. ESORICS, 02017","author":"Syverson P.","unstructured":"P. Syverson . The once and future onion . Proc. ESORICS, 02017 . P. Syverson. The once and future onion. Proc. ESORICS, 02017.","key":"e_1_3_2_1_43_1"},{"unstructured":"P. Syverson M. Finkel S. Eskandarian D. Boneh. Attacks on onion discovery and remedies via self-authenticating traditional addresses. ACM WPES 02021.  P. Syverson M. Finkel S. Eskandarian D. Boneh. Attacks on onion discovery and remedies via self-authenticating traditional addresses. ACM WPES 02021.","key":"e_1_3_2_1_44_1"},{"volume-title":"Proc. IEEE SecDev, 02019","author":"Traudt P. Syverson M.","unstructured":"P. Syverson M. Traudt . Self-authenticating traditional domain names . Proc. IEEE SecDev, 02019 . P. Syverson M. Traudt. Self-authenticating traditional domain names. Proc. IEEE SecDev, 02019.","key":"e_1_3_2_1_45_1"},{"unstructured":"F. Valsorda. How Plex is doing HTTPS for all its users. https:\/\/words.filippo.io\/ how-plex-is-doing-https-for-all-its-users\/ 02015.  F. Valsorda. How Plex is doing HTTPS for all its users. https:\/\/words.filippo.io\/ how-plex-is-doing-https-for-all-its-users\/ 02015.","key":"e_1_3_2_1_46_1"},{"unstructured":"SecureDrop. Getting an onion name for your SecureDrop. https:\/\/securedrop.org\/ faq\/getting-onion-name-your-securedrop\/.  SecureDrop. Getting an onion name for your SecureDrop. https:\/\/securedrop.org\/ faq\/getting-onion-name-your-securedrop\/.","key":"e_1_3_2_1_47_1"},{"unstructured":"J. Victors M. Li X. Fu. The onion name system. PoPETs 02017(1) 02017.  J. Victors M. Li X. Fu. The onion name system. PoPETs 02017(1) 02017.","key":"e_1_3_2_1_48_1"},{"volume-title":"Proc.USENIX Sec., 02018","author":"Winter P.","unstructured":"P. Winter , A. Edmundson , L.M. Roberts , A. Dutkowska-Zuk , M. Chetty , N. Feamster . How do Tor users interact with onion services? Proc.USENIX Sec., 02018 . P. Winter, A. Edmundson, L.M. Roberts, A. Dutkowska-Zuk, M. Chetty, N. Feamster. How do Tor users interact with onion services? Proc.USENIX Sec., 02018.","key":"e_1_3_2_1_49_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '22","name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA"},"container-title":["Proceedings of the 21st Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3559613.3563208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3559613.3563208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:47Z","timestamp":1750186847000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3559613.3563208"}},"subtitle":["Transparent Associations from Domain Names to Onion Addresses"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":49,"alternative-id":["10.1145\/3559613.3563208","10.1145\/3559613"],"URL":"https:\/\/doi.org\/10.1145\/3559613.3563208","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}