{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:02:50Z","timestamp":1755993770110,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"REPHRAIN","award":["EP\/V011189\/1"],"award-info":[{"award-number":["EP\/V011189\/1"]}]},{"name":"CyberExcellence project of the Public Service of Wallonia (SPW Recherche)","award":["2110186"],"award-info":[{"award-number":["2110186"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,20]]},"DOI":"10.1145\/3689943.3695038","type":"proceedings-article","created":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T18:21:04Z","timestamp":1732213264000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Flexible Anonymous Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5275-9308","authenticated-orcid":false,"given":"Florentin","family":"Rochet","sequence":"first","affiliation":[{"name":"University of Namur, Namur, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4970-3730","authenticated-orcid":false,"given":"Jules","family":"Dejaeghere","sequence":"additional","affiliation":[{"name":"University of Namur, Namur, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7559-8383","authenticated-orcid":false,"given":"Tariq","family":"Elahi","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_26"},{"volume-title":"Tor security advisory: \"relay early\" traffic confirmation attack. https:\/\/blog.torproject.org\/tor-security-advisory-relay-early-traffic-confirmation-attack","year":"2021","key":"e_1_3_2_1_2_1","unstructured":"arma. 2014. Tor security advisory: \"relay early\" traffic confirmation attack. https:\/\/blog.torproject.org\/tor-security-advisory-relay-early-traffic-confirmation-attack. Accessed: July 2021."},{"volume-title":"Did the FBI Pay a University to Attack Tor Users? https:\/\/blog.torproject.org\/did-fbi-pay-university-attack-tor-users","year":"2021","key":"e_1_3_2_1_3_1","unstructured":"arma. 2015. Did the FBI Pay a University to Attack Tor Users? https:\/\/blog.torproject.org\/did-fbi-pay-university-attack-tor-users. Accessed: July 2021."},{"volume-title":"Announcing the Vanguards Add-On for Onion Services. https:\/\/blog.torproject.org\/announcing-vanguards-add-onion-services","year":"2021","key":"e_1_3_2_1_4_1","unstructured":"asn. 2018. Announcing the Vanguards Add-On for Onion Services. https:\/\/blog.torproject.org\/announcing-vanguards-add-onion-services. Accessed: July 2021."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"e_1_3_2_1_6_1","volume-title":"Wasmtime a small and efficient runtime for WebAssembly & WASI. https:\/\/wasmtime.dev\/","author":"Alliance Bytecode","year":"2021","unstructured":"Bytecode Alliance. 2021. Wasmtime a small and efficient runtime for WebAssembly & WASI. https:\/\/wasmtime.dev\/. Accessed: July 2021."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342078"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3609021.3609306"},{"key":"e_1_3_2_1_9_1","volume-title":"Avoiding infinite length circuits. https:\/\/gitlab.torproject.org\/dgoulet\/torspec\/-\/blob\/master\/proposals\/110-avoid-infinite-circuits.txt","author":"Dingledine Roger","year":"2021","unstructured":"Roger Dingledine. 2007. Avoiding infinite length circuits. https:\/\/gitlab.torproject.org\/dgoulet\/torspec\/-\/blob\/master\/proposals\/110-avoid-infinite-circuits.txt. Accessed: July 2021."},{"key":"e_1_3_2_1_10_1","volume-title":"A Conflict Example in Distribution Packaging. https:\/\/bugs.launchpad.net\/ubuntu\/source\/tor\/bug\/328442","author":"Dingledine Roger","year":"2023","unstructured":"Roger Dingledine. 2009. A Conflict Example in Distribution Packaging. https:\/\/bugs.launchpad.net\/ubuntu\/source\/tor\/bug\/328442. Accessed: February 2023."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"volume-title":"What is eBPF? https:\/\/ebpf.io","year":"2021","key":"e_1_3_2_1_12_1","unstructured":"eBPF.io. 2021. What is eBPF? https:\/\/ebpf.io. Accessed: July 2021."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660280"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855771"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Network and Distributed Security Symposium - NDSS'11","author":"Houmansadr Amir","year":"2011","unstructured":"Amir Houmansadr and Nikita Borisov. 2011. SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In Proceedings of the Network and Distributed Security Symposium - NDSS'11. Internet Society."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Network and Distributed Security Symposium - NDSS'09","author":"Houmansadr Amir","year":"2009","unstructured":"Amir Houmansadr, Negar Kiyavash, and Nikita Borisov. 2009. RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows. In Proceedings of the Network and Distributed Security Symposium - NDSS'09. Internet Society."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET","author":"Jansen Rob","year":"2012","unstructured":"Rob Jansen, Kevin Bauer, Nicholas Hopper, and Roger Dingledine. 2012. Methodically Modeling the Tor Network. In Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test (CSET 2012)."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium - NDSS'12","author":"Jansen Rob","year":"2012","unstructured":"Rob Jansen and Nicholas Hopper. 2012. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. In Proceedings of the Network and Distributed System Security Symposium - NDSS'12. Internet Society."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978310"},{"key":"e_1_3_2_1_20_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Jansen Rob","year":"2021","unstructured":"Rob Jansen, Justin Tracey, and Ian Goldberg. 2021. Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 3415--3432. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/jansen"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23288"},{"key":"e_1_3_2_1_22_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Jansen Rob","year":"2019","unstructured":"Rob Jansen, Tavish Vaidya, and Micah Sherr. 2019. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1823--1840. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/jansen"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2103.03831"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--99073--6_25"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"B Laurie E Messeri and R Stradling. 2021. RFC 9162: Certificate Transparency Version 2.0.","DOI":"10.17487\/RFC9162"},{"key":"e_1_3_2_1_27_1","volume-title":"The LLVM Compiler Infrastructure. https:\/\/llvm.org","author":"Project LLVM","year":"2021","unstructured":"LLVM Project. 2021. The LLVM Compiler Infrastructure. https:\/\/llvm.org. Accessed: July 2021."},{"volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Melara Marcela S.","key":"e_1_3_2_1_28_1","unstructured":"Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, and Michael J. Freedman. 2015. CONIKS: Bringing Key Transparency to End Users. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 383--398. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/melara"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243824"},{"volume-title":"More than 23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks. https:\/\/lists.torproject.org\/pipermail\/tor-relays\/2020-July\/018643.html","year":"2021","key":"e_1_3_2_1_30_1","unstructured":"Nusenu. 2020. More than 23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks. https:\/\/lists.torproject.org\/pipermail\/tor-relays\/2020-July\/018643.html. Accessed: July 2021."},{"volume-title":"https:\/\/nusenu.github.io\/OrNetStats\/#exit-families","year":"2021","key":"e_1_3_2_1_31_1","unstructured":"Nusenu. 2021. OrNetStats. https:\/\/nusenu.github.io\/OrNetStats\/#exit-families. Accessed: July 2021."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.00083"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.24"},{"key":"e_1_3_2_1_34_1","volume-title":"Client-Side Command Acceptance Validation. https:\/\/gitlab.torproject.org\/tpo\/core\/torspec\/-\/blob\/main\/proposals\/349-command-state-validation.md","author":"Perry Mike","year":"2024","unstructured":"Mike Perry. 2023. Client-Side Command Acceptance Validation. https:\/\/gitlab.torproject.org\/tpo\/core\/torspec\/-\/blob\/main\/proposals\/349-command-state-validation.md. Accessed: June 2024."},{"key":"e_1_3_2_1_35_1","volume-title":"Prioritizing Protocol Information Leaks in Tor. https:\/\/gitlab.torproject.org\/tpo\/core\/torspec\/-\/blob\/main\/proposals\/344-protocol-info-leaks.txt","author":"Perry Mike","year":"2023","unstructured":"Mike Perry. 2023. Prioritizing Protocol Information Leaks in Tor. https:\/\/gitlab.torproject.org\/tpo\/core\/torspec\/-\/blob\/main\/proposals\/344-protocol-info-leaks.txt. Accessed: August 2023."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"J. Postel. 1981. Transmission Control Protocol. RFC 793. Internet Engineering Task Force.","DOI":"10.17487\/rfc0793"},{"key":"e_1_3_2_1_37_1","volume-title":"uBPF machine. https:\/\/github.com\/iovisor\/ubpf","author":"Visor Project IO","year":"2021","unstructured":"IO Visor Project. 2015. uBPF machine. https:\/\/github.com\/iovisor\/ubpf. Accessed: July 2021."},{"key":"e_1_3_2_1_38_1","unstructured":"Tobias Pulls. 2020. Towards Effective and Efficient Padding Machines for Tor. https:\/\/arxiv.org\/abs\/2011.13471."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472919"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0074"},{"key":"e_1_3_2_1_41_1","unstructured":"Florentin Rochet. 2017. Dropmark code. https:\/\/github.com\/frochet\/dropping_on_the_edge."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0013"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0011"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417279"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866315"},{"key":"e_1_3_2_1_46_1","volume-title":"eBPF in the Linux Kernel. https:\/\/www.kernel.org\/doc\/html\/latest\/bpf\/index.html","author":"The","year":"2021","unstructured":"The kernel development community. 2021. eBPF in the Linux Kernel. https:\/\/www.kernel.org\/doc\/html\/latest\/bpf\/index.html. Accessed: July 2021."},{"key":"e_1_3_2_1_47_1","unstructured":"The Tor Project. 2023. Core Tor releases \u00b7 Wiki \u00b7 The Tor Project \/ Core \/ Team \u00b7 GitLab. https:\/\/gitlab.torproject.org\/tpo\/core\/team\/-\/wikis\/NetworkTeam\/CoreTorReleases"},{"key":"e_1_3_2_1_48_1","volume-title":"Tor Metrics Portal. https:\/\/metrics.torproject.org\/","author":"Project The Tor","year":"2023","unstructured":"The Tor Project. 2023. Tor Metrics Portal. https:\/\/metrics.torproject.org\/. Accessed: August 2023."},{"key":"e_1_3_2_1_49_1","volume-title":"Relay EOL policy. https:\/\/gitlab.torproject.org\/tpo\/network-health\/team\/-\/wikis\/Relay-EOL-policy","author":"Project The Tor","year":"2024","unstructured":"The Tor Project. 2024. Relay EOL policy. https:\/\/gitlab.torproject.org\/tpo\/network-health\/team\/-\/wikis\/Relay-EOL-policy. Accessed: June 2024."},{"key":"e_1_3_2_1_50_1","volume-title":"Proteus: Programmable Protocols for Censorship Circumvention. In Free and Open Communications on the Internet. https:\/\/www.petsymposium.org\/foci\/2023\/foci-2023-0013.php","author":"Wails Ryan","year":"2023","unstructured":"Ryan Wails, Rob Jansen, Aaron Johnson, and Micah Sherr. 2023. Proteus: Programmable Protocols for Censorship Circumvention. In Free and Open Communications on the Internet. https:\/\/www.petsymposium.org\/foci\/2023\/foci-2023-0013.php"},{"key":"e_1_3_2_1_51_1","volume-title":"Accessed","author":"Wasmer","year":"2021","unstructured":"Wasmer, Inc. 2021. Wasmer - The Universal WebAssembly Runtime. https:\/\/wasmer.io\/. Accessed: July 2021."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 23rd Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689943.3695038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689943.3695038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:15:06Z","timestamp":1755915306000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689943.3695038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":51,"alternative-id":["10.1145\/3689943.3695038","10.1145\/3689943"],"URL":"https:\/\/doi.org\/10.1145\/3689943.3695038","relation":{},"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"2024-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}