{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:44Z","timestamp":1750309124082,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"IAPMEI","award":["SmartRetail project (ref. C6632206063-00466847)"],"award-info":[{"award-number":["SmartRetail project (ref. C6632206063-00466847)"]}]},{"name":"NSERC","award":["RGPIN-2023-03304"],"award-info":[{"award-number":["RGPIN-2023-03304"]}]},{"name":"Fundacao para a Ciencia e a Tecnologia (FCT)","award":["PRT\/BD\/154197\/2022, UIDB\/50021\/2020"],"award-info":[{"award-number":["PRT\/BD\/154197\/2022, UIDB\/50021\/2020"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3603216.3624960","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:38:42Z","timestamp":1700703522000},"page":"147-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["TIGER: Tor Traffic Generator for Realistic Experiments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5209-5721","authenticated-orcid":false,"given":"Daniela","family":"Lopes","sequence":"first","affiliation":[{"name":"INESC-ID \/ IST, Universidade de Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7564-0454","authenticated-orcid":false,"given":"Daniel","family":"Castro","sequence":"additional","affiliation":[{"name":"INESC-ID \/ IST, Universidade de Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0338-2692","authenticated-orcid":false,"given":"Diogo","family":"Barradas","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9938-0653","authenticated-orcid":false,"given":"Nuno","family":"Santos","sequence":"additional","affiliation":[{"name":"INESC-ID \/ IST, Universidade de Lisboa, Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Madhyastha","author":"Akhoondi Masoud","year":"2012","unstructured":"Masoud Akhoondi, Curtis Yu, and Harsha V. Madhyastha. 2012. LASTor: A Low-Latency AS-Aware Tor Client. In IEEE Security and Privacy."},{"unstructured":"Armon Barton Matthew Wright Jiang Ming and Mohsen Imani. 2018. Towards Predicting Efficient and Anonymous Tor Circuits. In USENIX Security.","key":"e_1_3_2_2_2_1"},{"doi-asserted-by":"crossref","unstructured":"Kevin Bauer Damon McCoy Dirk Grunwald Tadayoshi Kohno and Douglas Sicker. 2007. Low-Resource Routing Attacks against Tor. In ACM WPES.","key":"e_1_3_2_2_3_1","DOI":"10.1145\/1314333.1314336"},{"unstructured":"Kevin Bauer Micah Sherr and Dirk Grunwald. 2011. ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. In CSET.","key":"e_1_3_2_2_4_1"},{"doi-asserted-by":"crossref","unstructured":"Terry Benzel. 2011. The Science of Cyber Security Experimentation: The DETER Project. In ACM ACSAC.","key":"e_1_3_2_2_5_1","DOI":"10.1145\/2076732.2076752"},{"key":"e_1_3_2_2_6_1","volume-title":"Content and Popularity Analysis of Tor Hidden Services. In IEEE ICDCS Workshops.","author":"Biryukov Alex","year":"2014","unstructured":"Alex Biryukov, Ivan Pustogarov, Fabrice Thill, and Ralf-Philipp Weinmann. 2014. Content and Popularity Analysis of Tor Hidden Services. In IEEE ICDCS Workshops."},{"volume-title":"Trawling for tor hidden services: Detection, measurement, deanonymization","author":"Biryukov Alex","unstructured":"Alex Biryukov, Ivan Pustogarov, and Ralf-Philipp Weinmann. 2013. Trawling for tor hidden services: Detection, measurement, deanonymization. In IEEE Security and Privacy.","key":"e_1_3_2_2_7_1"},{"doi-asserted-by":"crossref","unstructured":"L. Breslau Pei Cao Li Fan G. Phillips and S. Shenker. 1999. Web caching and Zipf-like distributions: evidence and implications. In IEEE INFOCOM.","key":"e_1_3_2_2_8_1","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"e_1_3_2_2_9_1","volume-title":"Keromytis","author":"Chakravarty Sambuddho","year":"2014","unstructured":"Sambuddho Chakravarty, Marco V. Barbera, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis. 2014. On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records. In Passive and Active Measurement."},{"unstructured":"Giovanni Cherubin Rob Jansen and Carmela Troncoso. 2022. Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. In USENIX Security.","key":"e_1_3_2_2_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_2_12_1","volume-title":"How Do Home Computer Users Browse the Web? ACM Transactions on the Web","author":"Crichton Kyle","year":"2022","unstructured":"Kyle Crichton, Nicolas Christin, and Lorrie Cranor. 2022. How Do Home Computer Users Browse the Web? ACM Transactions on the Web (2022)."},{"unstructured":"Anupam Das and Nikita Borisov. 2013. Securing Anonymous Communication Channels under the Selective DoS Attack. In Financial Cryptography.","key":"e_1_3_2_2_13_1"},{"volume-title":"Robust Multi-tab Website Fingerprinting Attacks in the Wild","author":"Deng Xinhao","unstructured":"Xinhao Deng, Qilei Yin, Zhuotao Liu, Qi Li, Mingwei Xu, Ke Xu, and Wu Jianping. 2023. Robust Multi-tab Website Fingerprinting Attacks in the Wild. In IEEE Security and Privacy.","key":"e_1_3_2_2_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.21236\/ADA465464"},{"doi-asserted-by":"crossref","unstructured":"Tobias Hoeller Michael Roland and Ren&#233; Mayrhofer. 2021. On the State of V3 Onion Services. In ACM FOCI.","key":"e_1_3_2_2_16_1","DOI":"10.1145\/3473604.3474565"},{"unstructured":"Alfonso Iacovazzi Daniel Frassinelli and Yuval Elovici. 2019. The DUSTER attack: Tor onion service attribution based on flow watermarking with track hiding. In ACM RAID.","key":"e_1_3_2_2_17_1"},{"key":"e_1_3_2_2_18_1","volume-title":"Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers","author":"Iacovazzi Alfonso","year":"2018","unstructured":"Alfonso Iacovazzi, Sanat Sarda, and Yuval Elovici. 2018. Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers. In IEEE INFOCOM."},{"unstructured":"Rob Jansen Kevin Bauer Nicholas Hopper and Roger Dingledine. 2012. Methodically Modeling the Tor Network. In USENIX CSET.","key":"e_1_3_2_2_19_1"},{"key":"e_1_3_2_2_20_1","volume-title":"Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. In NDSS.","author":"Jansen Rob","year":"2011","unstructured":"Rob Jansen and Nicholas Hopper. 2011. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. In NDSS."},{"doi-asserted-by":"crossref","unstructured":"Rob Jansen and Ryan Wails. 2023. Data-Explainable Website Fingerprinting with Network Simulation. (2023). See also https:\/\/explainwf-popets2023.github.io.","key":"e_1_3_2_2_21_1","DOI":"10.56553\/popets-2023-0125"},{"doi-asserted-by":"crossref","unstructured":"Aaron Johnson Chris Wacek Rob Jansen Micah Sherr and Paul Syverson. 2013. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. In ACM CCS.","key":"e_1_3_2_2_22_1","DOI":"10.1145\/2508859.2516651"},{"doi-asserted-by":"crossref","unstructured":"Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and Rachel Greenstadt. 2014. A Critical Evaluation of Website Fingerprinting Attacks. In ACM CCS.","key":"e_1_3_2_2_23_1","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_2_24_1","volume-title":"Claudia D'i az, and Matthew Wright","author":"Ju Marc","year":"2015","unstructured":"Marc Ju&#225; rez, Mohsen Imani, Mike Perry, Claudia D'i az, and Matthew Wright. 2015. WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor. (2015). http:\/\/arxiv.org\/abs\/1512.00524"},{"unstructured":"Albert Kwon Mashael AlSabah David Lazar Marc Dacier and Srinivas Devadas. 2015. Circuit fingerprinting attacks: Passive deanonymization of tor hidden services. In USENIX Security.","key":"e_1_3_2_2_25_1"},{"doi-asserted-by":"crossref","unstructured":"Chao Liu Ryen W. White and Susan Dumais. 2010. Understanding Web Browsing Behaviors through Weibull Analysis of Dwell Time. In ACM SIGIR.","key":"e_1_3_2_2_26_1","DOI":"10.1145\/1835449.1835513"},{"doi-asserted-by":"crossref","unstructured":"Anna Harbluk Lorimer Lindsey Tulloch Cecylia Bocovich and Ian Goldberg. 2021. OUStralopithecus: Overt User Simulation for Censorship Circumvention. In ACM WPES.","key":"e_1_3_2_2_27_1","DOI":"10.1145\/3463676.3485604"},{"doi-asserted-by":"crossref","unstructured":"Akshaya Mani T. Wilson-Brown Rob Jansen Aaron Johnson and Micah Sherr. 2018. Understanding Tor Usage with Privacy-Preserving Measurement. In ACM IMC.","key":"e_1_3_2_2_28_1","DOI":"10.1145\/3278532.3278549"},{"doi-asserted-by":"crossref","unstructured":"Milad Nasr Alireza Bahramali and Amir Houmansadr. 2018. DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning. In ACM CCS.","key":"e_1_3_2_2_29_1","DOI":"10.1145\/3243734.3243824"},{"key":"e_1_3_2_2_30_1","volume-title":"Nicholas Hopper, and Matthew Wright.","author":"Oh Se Eun","year":"2022","unstructured":"Se Eun Oh, Taiji Yang, Nate Mathews, James K Holland, Mohammad Saidur Rahman, Nicholas Hopper, and Matthew Wright. 2022. DeepCoFFEA: Improved flow correlation attacks on Tor via metric learning and amplification. In IEEE Security and Privacy."},{"doi-asserted-by":"crossref","unstructured":"Rebekah Overdorf Mark Juarez Gunes Acar Rachel Greenstadt and Claudia Diaz. 2017. How unique is your. onion?: An analysis of the fingerprintability of tor onion services. In ACM CCS.","key":"e_1_3_2_2_31_1","DOI":"10.1145\/3133956.3134005"},{"doi-asserted-by":"crossref","unstructured":"Gareth Owen and Nick Savage. 2016. Empirical analysis of Tor hidden services. In IET Information Security.","key":"e_1_3_2_2_32_1","DOI":"10.1049\/iet-ifs.2015.0121"},{"doi-asserted-by":"crossref","unstructured":"Andriy Panchenko Fabian Lanze Andreas Zinnen Martin Henze Jan Pennekamp Klaus Wehrle and Thomas Engel. 2016. Website Fingerprinting at Internet Scale. In NDSS.","key":"e_1_3_2_2_33_1","DOI":"10.14722\/ndss.2016.23477"},{"doi-asserted-by":"crossref","unstructured":"Andriy Panchenko Asya Mitseva Martin Henze Fabian Lanze Klaus Wehrle and Thomas Engel. 2017. Analysis of Fingerprinting Techniques for Tor Hidden Services. In ACM WPES.","key":"e_1_3_2_2_34_1","DOI":"10.1145\/3139550.3139564"},{"key":"e_1_3_2_2_35_1","volume-title":"Samaneh Tajalizadehkhoob, Maciej Korczynski, and Wouter Joosen.","author":"Pochat Victor","year":"2019","unstructured":"Victor Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation."},{"unstructured":"The Tor Project. 2020. TorRelayGuide. https:\/\/gitlab.torproject.org\/legacy\/trac\/-\/wikis\/TorRelayGuide##Parttwo:technicalsetup. Accessed: 2023-07--15.","key":"e_1_3_2_2_36_1"},{"doi-asserted-by":"crossref","unstructured":"Mohammad Saidur Rahman Payap Sirinam Nate Mathews Kantha Gangadhara and Matthew Wright. 2020. Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. In PoPETS.","key":"e_1_3_2_2_37_1","DOI":"10.2478\/popets-2020-0043"},{"key":"e_1_3_2_2_38_1","volume-title":"Abel Romero, Wouter Joosen, and Katharina Kohls.","author":"Rimmer Vera","year":"2022","unstructured":"Vera Rimmer, Theodor Schnitzler, Tom Van Goethem, Abel Romero, Wouter Joosen, and Katharina Kohls. 2022. Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. In PoPETS."},{"doi-asserted-by":"crossref","unstructured":"Kimberly Ruth Aurore Fass Jonathan Azose Mark Pearson Emma Thomas Caitlin Sadowski and Zakir Durumeric. 2022. A World Wide View of Browsing the World Wide Web. In ACM IMC.","key":"e_1_3_2_2_39_1","DOI":"10.1145\/3517745.3561418"},{"key":"e_1_3_2_2_40_1","volume-title":"Tor Experimentation Tools. In IEEE Security and Privacy Workshops.","author":"Shirazi Fatemeh","year":"2015","unstructured":"Fatemeh Shirazi, Matthias Goehring, and Claudia Diaz. 2015. Tor Experimentation Tools. In IEEE Security and Privacy Workshops."},{"volume-title":"Master's thesis","author":"Singh Sukhbir","unstructured":"Sukhbir Singh. 2014. Large-scale emulation of anonymous communication networks. In Master's thesis, University of Waterloo.","key":"e_1_3_2_2_41_1"},{"doi-asserted-by":"crossref","unstructured":"Can Tang and Ian Goldberg. 2010. An Improved Algorithm for Tor Circuit Scheduling. In ACM CCS.","key":"e_1_3_2_2_42_1","DOI":"10.1145\/1866307.1866345"},{"unstructured":"The Tor Project. 2016. Research Safety Board. https:\/\/research.torproject.org\/safetyboard\/. Accessed: 2023-06-04.","key":"e_1_3_2_2_43_1"},{"unstructured":"The Tor Project. [n. d.] a. CollecTor. https:\/\/metrics.torproject.org\/collector.html. Accessed: 2023-06-04.","key":"e_1_3_2_2_44_1"},{"unstructured":"The Tor Project. [n. d.] b. Tor Metrics. https:\/\/metrics.torproject.org\/. Accessed: 2023-06-04.","key":"e_1_3_2_2_45_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_46_1","DOI":"10.1109\/P2P.2009.5284497"},{"key":"e_1_3_2_2_47_1","article-title":"An Integrated Experimental Environment for Distributed Systems and Networks. In ACM SIGOPS","author":"White Brian","year":"2003","unstructured":"Brian White, Jay Lepreau, Leigh Stoller, Robert Ricci, Shashi Guruprasad, Mac Newbold, Mike Hibler, Chad Barb, and Abhijeet Joglekar. 2003. An Integrated Experimental Environment for Distributed Systems and Networks. In ACM SIGOPS Oper. Syst. Rev. io","journal-title":"Oper. Syst. Rev. io"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '23","name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark"},"container-title":["Proceedings of the 22nd Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603216.3624960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:11Z","timestamp":1750286951000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":47,"alternative-id":["10.1145\/3603216.3624960","10.1145\/3603216"],"URL":"https:\/\/doi.org\/10.1145\/3603216.3624960","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}