{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:08:44Z","timestamp":1767704924460,"version":"3.44.0"},"reference-count":66,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"National Science Foundation","award":["CNS-1423163"],"award-info":[{"award-number":["CNS-1423163"]}]},{"DOI":"10.13039\/100015853","name":"Rochester Institute of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100015853","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Signature Interdisciplinary Research Areas"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2025,8,31]]},"abstract":"<jats:p>Tor users derive anonymity in part from the size of the Tor user base, but Tor struggles to attract and support more users due to performance limitations. Previous works have proposed modifications to Tor\u2019s path selection algorithm to enhance both performance and security, but many proposals have unintended consequences due to incorporating information related to client location. We instead propose selecting paths using a global view of the network, independent of client location, and we propose doing so with a machine learning classifier to predict the performance of a given path before building a circuit. We show through a variety of simulated and live experimental settings, across different time periods, that this approach can significantly improve performance compared to Tor\u2019s default path selection algorithm and two previously proposed approaches. In addition to evaluating the security of our approach with traditional metrics, we propose a novel anonymity metric that captures information leakage resulting from location-aware path selection, and we show that our path selection approach leaks no more information than the default path selection algorithm.<\/jats:p>","DOI":"10.1145\/3723356","type":"journal-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T06:49:55Z","timestamp":1741848595000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["PredicTor: A Global, Machine Learning Approach to Tor Path Selection"],"prefix":"10.1145","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8227-3621","authenticated-orcid":false,"given":"Armon","family":"Barton","sequence":"first","affiliation":[{"name":"Naval Postgraduate School","place":["Monterey, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1143-699X","authenticated-orcid":false,"given":"Timothy","family":"Walsh","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School","place":["Monterey, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7934-0301","authenticated-orcid":false,"given":"Mohsen","family":"Imani","sequence":"additional","affiliation":[{"name":"Anomali Inc.","place":["Redwood City, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9682-0502","authenticated-orcid":false,"given":"Jiang","family":"Ming","sequence":"additional","affiliation":[{"name":"Tulane University","place":["New Orleans, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8489-6347","authenticated-orcid":false,"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology","place":["Rochester, United States"]}]}],"member":"320","published-online":{"date-parts":[[2025,8,26]]},"reference":[{"key":"e_1_3_3_2_2","first-page":"476","volume-title":"IEEE Symposium on Security and Privacy","author":"Akhoondi Masoud","year":"2012","unstructured":"Masoud Akhoondi, Chu Yu, and Harsha V. Madhyastha. 2012. LASTor: A low-latency AS-aware Tor client. In IEEE Symposium on Security and Privacy. IEEE, New York, NY, USA, 476\u2013490."},{"key":"e_1_3_3_3_2","article-title":"Concrete problems in AI safety","author":"Amodei Dario","year":"2016","unstructured":"Dario Amodei, Chris Olah, Jacob Steinhardt, Paul Christiano, John Schulman, and Dan Man\u00e9. 2016. Concrete problems in AI safety. arXiv preprint arXiv:1606.06565 (2016).","journal-title":"arXiv preprint arXiv:1606.06565"},{"key":"e_1_3_3_4_2","first-page":"214","volume-title":"IEEE European Symposium on Security and Privacy","author":"Annessi Robert","year":"2016","unstructured":"Robert Annessi and Martin Schmiedecker. 2016. NavigaTor: Finding faster paths to anonymity. In IEEE European Symposium on Security and Privacy. IEEE, New York, NY, USA, 214\u2013226."},{"key":"e_1_3_3_5_2","first-page":"163","volume-title":"IEEE Computer Security Foundations Symposium","author":"Backes Michael","year":"2013","unstructured":"Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, and Esfandiar Mohammadi. 2013. AnoA: A framework for analyzing anonymous communication protocols. In IEEE Computer Security Foundations Symposium. IEEE, New York, NY, USA, 163\u2013178."},{"key":"e_1_3_3_6_2","first-page":"40","volume-title":"Privacy Enhancing Technologies Symposium","author":"Backes Michael","year":"2016","unstructured":"Michael Backes, Sebastian Meiser, and Marcin Slowik. 2016. Your choice MATor (s). In Privacy Enhancing Technologies Symposium. De Gruyter Open, 40\u201360."},{"key":"e_1_3_3_7_2","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","article-title":"The security of machine learning","volume":"81","author":"Barreno Marco","year":"2010","unstructured":"Marco Barreno, Blaine Nelson, Anthony D. Joseph, and J. Doug Tygar. 2010. The security of machine learning. Mach. Learn. 81 (2010), 121\u2013148.","journal-title":"Mach. Learn."},{"key":"e_1_3_3_8_2","first-page":"429","volume-title":"USENIX Security Symposium (USENIX Security\u201918)","author":"Barton Armon","year":"2018","unstructured":"Armon Barton, Mohsen Imani, Jiang Ming, and Matthew Wright. 2018. Towards predicting efficient and anonymous Tor circuits. In USENIX Security Symposium (USENIX Security\u201918). USENIX Association, 429\u2013444."},{"key":"e_1_3_3_9_2","first-page":"356","volume-title":"Privacy Enhancing Technologies Symposium","author":"Barton Armon","year":"2016","unstructured":"Armon Barton and Matthew Wright. 2016. DeNASA: Destination-Naive AS-awareness in anonymous communications. In Privacy Enhancing Technologies Symposium. De Gruyter Open, 356\u2013372."},{"key":"e_1_3_3_10_2","doi-asserted-by":"crossref","first-page":"28769","DOI":"10.1109\/ACCESS.2021.3059672","article-title":"QuicTor: Enhancing Tor for real-time communication using QUIC transport protocol","volume":"9","author":"Basyoni Lamiaa","year":"2021","unstructured":"Lamiaa Basyoni, Aiman Erbad, Mashael Alsabah, Noora Fetais, Amr Mohamed, and Mohsen Guizani. 2021. QuicTor: Enhancing Tor for real-time communication using QUIC transport protocol. IEEE Access 9 (2021), 28769\u201328784.","journal-title":"IEEE Access"},{"key":"e_1_3_3_11_2","first-page":"2154","volume-title":"ACM Conference on Computer and Communications Security","author":"Biggio Battista","year":"2018","unstructured":"Battista Biggio and Fabio Roli. 2018. Wild patterns: Ten years after the rise of adversarial machine learning. In ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, 2154\u20132156."},{"key":"e_1_3_3_12_2","first-page":"92","volume-title":"ACM Conference on Computer and Communications Security","author":"Borisov Nikita","year":"2007","unstructured":"Nikita Borisov, George Danezis, Prateek Mittal, and Parisa Tabriz. 2007. Denial of service or denial of security? In ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, 92\u2013102."},{"key":"e_1_3_3_13_2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman. 2001. Random forests. Mach. Learn. 45 (2001), 5\u201332.","journal-title":"Mach. Learn."},{"key":"e_1_3_3_14_2","first-page":"249","volume-title":"USENIX Symposium on Networked Systems Design and Implementation","author":"Bromberg Y\u00e9rom-David","year":"2022","unstructured":"Y\u00e9rom-David Bromberg, Quentin Dufour, Davide Frey, and Etienne Rivi\u00e8re. 2022. Donar: Anonymous VoIP over Tor. In USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, 249\u2013265."},{"key":"e_1_3_3_15_2","unstructured":"CAIDA. 2018. CAIDA AS Ranking. Retrieved from http:\/\/as-rank.caida.org\/"},{"key":"e_1_3_3_16_2","first-page":"753","volume-title":"31st USENIX Security Symposium (USENIX Security\u201922)","author":"Cherubin Giovanni","year":"2022","unstructured":"Giovanni Cherubin, Rob Jansen, and Carmela Troncoso. 2022. Online website fingerprinting: Evaluating website fingerprinting attacks on Tor in the real world. In 31st USENIX Security Symposium (USENIX Security\u201922). 753\u2013770."},{"key":"e_1_3_3_17_2","volume-title":"Network and Distributed System Security Symposium","author":"Darir Hussein","year":"2023","unstructured":"Hussein Darir, Geir E. Dullerud, and Nikita Borisov. 2023. ProbFlow: Using probabilistic programming in anonymous communication networks. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_3_18_2","first-page":"54","volume-title":"Workshop on Privacy Enhancing Technologies","author":"Diaz Claudia","year":"2002","unstructured":"Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. 2002. Towards measuring anonymity. In Workshop on Privacy Enhancing Technologies. Springer, New York, NY, USA, 54\u201368."},{"key":"e_1_3_3_19_2","unstructured":"Roger Dingledine Nicholas Hopper George Kadianakis and Nick Mathewson. 2014. One fast guard for life (or 9 months)."},{"key":"e_1_3_3_20_2","first-page":"303","volume-title":"USENIX Security Symposium (USENIX Security\u201904)","author":"Dingledine Roger","year":"2004","unstructured":"Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The second-generation onion router. In USENIX Security Symposium (USENIX Security\u201904). USENIX Association, 303\u2013320."},{"key":"e_1_3_3_21_2","first-page":"380","volume-title":"ACM Conference on Computer and Communications Security","author":"Edman Matthew","year":"2009","unstructured":"Matthew Edman and Paul Syverson. 2009. AS-awareness in Tor path selection. In ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, 380\u2013389."},{"key":"e_1_3_3_22_2","first-page":"863","volume-title":"IEEE Conference on Control Technology and Applications","author":"Fiedler Felix","year":"2020","unstructured":"Felix Fiedler, Christoph D\u00f6pmann, Florian Tschorsch, and Sergio Lucia. 2020. PredicTor: Predictive congestion control for the Tor network. In IEEE Conference on Control Technology and Applications. IEEE, New York, NY, USA, 863\u2013870."},{"issue":"4","key":"e_1_3_3_23_2","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/S1364-6613(99)01294-2","article-title":"Catastrophic forgetting in connectionist networks","volume":"3","author":"French Robert M.","year":"1999","unstructured":"Robert M. French. 1999. Catastrophic forgetting in connectionist networks. Trends Cog. Sci. 3, 4 (1999), 128\u2013135.","journal-title":"Trends Cog. Sci."},{"key":"e_1_3_3_24_2","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-642-39077-7_9","volume-title":"Privacy Enhancing Technologies Symposium","author":"Geddes John","year":"2013","unstructured":"John Geddes, Rob Jansen, and Nicholas Hopper. 2013. How low can you go: Balancing performance with anonymity in Tor. In Privacy Enhancing Technologies Symposium. Springer, New York, NY, USA, 164\u2013184."},{"key":"e_1_3_3_25_2","first-page":"165","volume-title":"ACM Workshop on Privacy in the Electronic Society","author":"Geddes John","year":"2016","unstructured":"John Geddes, Mike Schliep, and Nicholas Hopper. 2016. ABRA CADABRA: Magically increasing network utilization in Tor by avoiding bottlenecks. In ACM Workshop on Privacy in the Electronic Society. ACM, New York, NY, USA, 165\u2013176."},{"key":"e_1_3_3_26_2","first-page":"1933","volume-title":"IEEE Symposium on Security and Privacy","author":"Hogan Kyle","year":"2022","unstructured":"Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman, Ben Weintraub, Cristina Nita-Rotaru, and Srinivas Devadas. 2022. ShorTor: Improving Tor network latency via multi-hop overlay routing. In IEEE Symposium on Security and Privacy. IEEE, New York, NY, USA, 1933\u20131952."},{"issue":"17","key":"e_1_3_3_27_2","doi-asserted-by":"crossref","first-page":"2723","DOI":"10.1049\/iet-com.2018.5591","article-title":"Modified relay selection and circuit selection for faster Tor","volume":"13","author":"Imani Mohsen","year":"2019","unstructured":"Mohsen Imani, Mehrdad Amirabadi, and Matthew Wright. 2019. Modified relay selection and circuit selection for faster Tor. IET Commun. 13, 17 (2019), 2723\u20132734.","journal-title":"IET Commun."},{"key":"e_1_3_3_28_2","first-page":"145","volume-title":"Privacy Enhancing Technologies Symposium","author":"Imani Mohsen","year":"2018","unstructured":"Mohsen Imani, Armon Barton, and Matthew Wright. 2018. Guard sets in Tor using AS relationships. In Privacy Enhancing Technologies Symposium. De Gruyter Open, 145\u2013165."},{"key":"e_1_3_3_29_2","unstructured":"Alexa Internet.2017. Alexa top sites.Retrieved from http:\/\/www.alexa.com\/topsites"},{"key":"e_1_3_3_30_2","unstructured":"Rob Jansen Kevin S. Bauer Nicholas Hopper and Roger Dingledine. 2012. Methodically modeling the Tor network. USENIX Workshop on Cyber Security Experimentation and Test. USENIX Association Berkeley CA USA."},{"key":"e_1_3_3_31_2","first-page":"127","volume-title":"USENIX Security Symposium (USENIX Security\u201914","author":"Jansen Rob","year":"2014","unstructured":"Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson. 2014. Never been KIST: Tor\u2019s congestion management blossoms with kernel-informed socket transport. In USENIX Security Symposium (USENIX Security\u201914). USENIX Association, 127\u2013142."},{"key":"e_1_3_3_32_2","volume-title":"Network and Distributed System Security Symposium","author":"Jansen Rob","year":"2011","unstructured":"Rob Jansen and Nicholas Hopper. 2011. Shadow: Running Tor in a box for accurate and efficient experimentation. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_3_33_2","first-page":"1553","volume-title":"ACM Conference on Computer and Communications Security","author":"Jansen Rob","year":"2016","unstructured":"Rob Jansen and Aaron Johnson. 2016. Safely measuring Tor. In ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, 1553\u20131567."},{"key":"e_1_3_3_34_2","first-page":"3415","volume-title":"USENIX Security Symposium (USENIX Security\u201921)","author":"Jansen Rob","year":"2021","unstructured":"Rob Jansen, Justin Tracey, and Ian Goldberg. 2021. Once is never enough: Foundations for sound statistical inference in Tor network experimentation. In USENIX Security Symposium (USENIX Security\u201921). USENIX Association, 3415\u20133432."},{"key":"e_1_3_3_35_2","volume-title":"Network and Distributed System Security Symposium","author":"Johnson Aaron","year":"2017","unstructured":"Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, and Paul Syverson. 2017. Avoiding the man on the wire: Improving Tor\u2019s security with trust-aware path selection. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_3_36_2","first-page":"337","volume-title":"ACM Conference on Computer and Communications Security","author":"Johnson Aaron","year":"2013","unstructured":"Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. 2013. Users get routed: Traffic correlation on Tor by realistic adversaries. In ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, 337\u2013348."},{"key":"e_1_3_3_37_2","volume-title":"Protecting Anonymity in the Presence of Autonomous System and Internet Exchange Level Adversaries","author":"Juen Joshua","year":"2012","unstructured":"Joshua Juen. 2012. Protecting Anonymity in the Presence of Autonomous System and Internet Exchange Level Adversaries. M.S. Thesis, University of Illinois at Urbana-Champaign, Urbana, USA."},{"key":"e_1_3_3_38_2","first-page":"1003","volume-title":"USENIX Security Symposium (USENIX Security\u201920)","author":"Komlo Chelsea H.","year":"2020","unstructured":"Chelsea H. Komlo, Nick Mathewson, and Ian Goldberg. 2020. Walking onions: Scaling anonymity networks while protecting users. In USENIX Security Symposium (USENIX Security\u201920). USENIX Association, Berkeley, CA, USA, 1003\u20131020."},{"key":"e_1_3_3_39_2","first-page":"590","volume-title":"ACM Conference on Computer and Communications Security","author":"McLachlan Jon","year":"2009","unstructured":"Jon McLachlan, Andrew Tran, Nicholas Hopper, and Yongdae Kim. 2009. Scalable onion routing with torsk. In ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, 590\u2013599."},{"key":"e_1_3_3_40_2","volume-title":"Machine Learning","author":"Mitchell Tom","year":"1997","unstructured":"Tom Mitchell. 1997. Machine Learning. McGraw-Hill, New York, NY, USA."},{"key":"e_1_3_3_41_2","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-540-70630-4_8","volume-title":"Privacy Enhancing Technologies Symposium","author":"Murdoch Steven J.","year":"2008","unstructured":"Steven J. Murdoch and Robert N. M. Watson. 2008. Metrics for security and performance in low-latency anonymity systems. In Privacy Enhancing Technologies Symposium. Springer, New York, NY, USA, 115\u2013132."},{"key":"e_1_3_3_42_2","first-page":"100","volume-title":"IEEE Symposium on Security and Privacy","author":"Overlier Lasse","year":"2006","unstructured":"Lasse Overlier and Paul Syverson. 2006. Locating hidden servers. In IEEE Symposium on Security and Privacy. IEEE, New York, NY, USA, 100\u2013114."},{"key":"e_1_3_3_43_2","unstructured":"PyPI.2025. PycURL\u2014A Python interface to the cURL Library.Retrieved from https:\/\/pypi.org\/project\/pycurl\/"},{"key":"e_1_3_3_44_2","volume-title":"International Conference on Learning Representations","author":"Raghunathan Aditi","year":"2018","unstructured":"Aditi Raghunathan, Jacob Steinhardt, and Percy Liang. 2018. Certified defenses against adversarial examples. In International Conference on Learning Representations."},{"key":"e_1_3_3_45_2","first-page":"4","volume-title":"Privacy Enhancing Technologies Symposium","author":"Rochet Florentin","year":"2017","unstructured":"Florentin Rochet and Olivier Pereira. 2017. Waterfilling: Balancing the Tor network with maximum diversity. In Privacy Enhancing Technologies Symposium. De Gruyter Open, 4\u201322."},{"key":"e_1_3_3_46_2","first-page":"17","volume-title":"ACM Conference on Computer and Communications Security","author":"Rochet Florentin","year":"2020","unstructured":"Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, and Olivier Pereira. 2020. CLAPS: Client-location-aware path selection in Tor. In ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, 17\u201334."},{"issue":"5","key":"e_1_3_3_47_2","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1038\/s42256-019-0048-x","article-title":"Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead","volume":"1","author":"Rudin Cynthia","year":"2019","unstructured":"Cynthia Rudin. 2019. Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nat. Mach. Intell. 1, 5 (2019), 206\u2013215.","journal-title":"Nat. Mach. Intell."},{"key":"e_1_3_3_48_2","first-page":"41","volume-title":"Workshop on Privacy Enhancing Technologies","author":"Serjantov Andrei","year":"2002","unstructured":"Andrei Serjantov and George Danezis. 2002. Towards an information theoretic metric for anonymity. In Workshop on Privacy Enhancing Technologies. Springer, New York, NY, USA, 41\u201353."},{"issue":"2","key":"e_1_3_3_49_2","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1561\/2200000018","article-title":"Online learning and online convex optimization","volume":"4","author":"Shalev-Shwartz Shai","year":"2012","unstructured":"Shai Shalev-Shwartz. 2012. Online learning and online convex optimization. Found. Trends Mach. Learn. 4, 2 (2012), 107\u2013194.","journal-title":"Found. Trends Mach. Learn."},{"issue":"1","key":"e_1_3_3_50_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/584091.584093","article-title":"A mathematical theory of communication","volume":"5","author":"Shannon Claude Elwood","year":"2001","unstructured":"Claude Elwood Shannon. 2001. A mathematical theory of communication. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5, 1 (2001), 3\u201355.","journal-title":"ACM SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"e_1_3_3_51_2","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-642-03168-7_5","volume-title":"Privacy Enhancing Technologies Symposium","author":"Sherr Micah","year":"2009","unstructured":"Micah Sherr, Matt Blaze, and Boon Thau Loo. 2009. Scalable link-based relay selection for anonymous routing. In Privacy Enhancing Technologies Symposium. Springer, New York, NY, USA, 73\u201393."},{"key":"e_1_3_3_52_2","volume-title":"Network and Distributed System Security Symposium","author":"Snader Robin","year":"2008","unstructured":"Robin Snader and Nikita Borisov. 2008. A tune-up for Tor: Improving security and performance in the Tor network. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_3_53_2","volume-title":"Network and Distributed System Security Symposium","author":"Starov Oleksii","year":"2016","unstructured":"Oleksii Starov, Rishab Nithyanand, Adva Zair, Phillipa Gill, and Michael Schapira. 2016. Measuring and mitigating AS-level adversaries against Tor. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_3_54_2","first-page":"977","volume-title":"IEEE Symposium on Security and Privacy","author":"Sun Yixin","year":"2017","unstructured":"Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, and Prateek Mittal. 2017. Counter-RAPTOR: Safeguarding Tor against active routing attacks. In IEEE Symposium on Security and Privacy. IEEE, New York, NY, USA, 977\u2013992."},{"key":"e_1_3_3_55_2","first-page":"271","volume-title":"USENIX Security Symposium (USENIX Security\u201915)","author":"Sun Yixin","year":"2015","unstructured":"Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, and Prateek Mittal. 2015. RAPTOR: Routing attacks on privacy in Tor. In USENIX Security Symposium (USENIX Security\u201915). USENIX Association, 271\u2013286."},{"key":"e_1_3_3_56_2","first-page":"213","volume-title":"International Workshop on Security Protocols","author":"Syverson Paul","year":"2009","unstructured":"Paul Syverson. 2009. Why I\u2019m not an entropist. In International Workshop on Security Protocols. Springer, New York, NY, USA, 213\u2013230."},{"key":"e_1_3_3_57_2","unstructured":"Akamai Technologies.2025. AkaRank website rankings.Retrieved from https:\/\/www.akamai.com\/security-research\/akarank"},{"key":"e_1_3_3_58_2","unstructured":"The Tor Project. 2025. Consensus Health. Retrieved from https:\/\/consensus-health.torproject.org\/"},{"key":"e_1_3_3_59_2","unstructured":"The Tor Project. 2025. Tor metrics. Retrieved from https:\/\/metrics.torproject.org"},{"key":"e_1_3_3_60_2","unstructured":"TorPS.2013. TorPS: The Tor path simulator.Retrieved from http:\/\/torps.github.io"},{"key":"e_1_3_3_61_2","first-page":"381","volume-title":"IEEE International Conference on Distributed Computing Systems","author":"Traudt Matthew","year":"2021","unstructured":"Matthew Traudt, Rob Jansen, and Aaron Johnson. 2021. FlashFlow: A secure speed test for Tor. In IEEE International Conference on Distributed Computing Systems. IEEE, New York, NY, USA, 381\u2013391."},{"issue":"176","key":"e_1_3_3_62_2","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1179\/sre.1975.23.176.88","article-title":"Direct and inverse solutions of geodesics on the ellipsoid with application of nested equations","volume":"23","author":"Vincenty Thaddeus","year":"1975","unstructured":"Thaddeus Vincenty. 1975. Direct and inverse solutions of geodesics on the ellipsoid with application of nested equations. Surv. Rev. 23, 176 (1975), 88\u201393.","journal-title":"Surv. Rev."},{"key":"e_1_3_3_63_2","volume-title":"Network and Distributed System Security Symposium","author":"Wacek Chris","year":"2013","unstructured":"Chris Wacek, Henry Tan, Kevin S. Bauer, and Micah Sherr. 2013. An empirical evaluation of relay selection in Tor. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_3_64_2","volume-title":"Network and Distributed System Security Symposium","author":"Wang Tao","year":"2020","unstructured":"Tao Wang. 2020. Designing a better browser for Tor with BLAST. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_3_65_2","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-642-32946-3_9","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Wang Tao","year":"2012","unstructured":"Tao Wang, Kevin Bauer, Clara Forero, and Ian Goldberg. 2012. Congestion-aware path selection for Tor. In International Conference on Financial Cryptography and Data Security. Springer, New York, NY, USA, 98\u2013113."},{"key":"e_1_3_3_66_2","first-page":"28","volume-title":"IEEE Symposium on Security and Privacy","author":"Wright Matthew","year":"2003","unstructured":"Matthew Wright, Micah Adler, Brian N. Levine, and Clay Shields. 2003. Defending anonymous communications against passive logging attacks. In IEEE Symposium on Security and Privacy. IEEE, New York, NY, USA, 28\u201341."},{"issue":"2","key":"e_1_3_3_67_2","first-page":"3","article-title":"Passive-logging attacks against anonymous communications systems","volume":"11","author":"Wright Matthew K.","year":"2008","unstructured":"Matthew K. Wright, Micah Adler, Brian Neil Levine, and Clay Shields. 2008. Passive-logging attacks against anonymous communications systems. ACM Trans. Inf. Syst. Secur. 11, 2 (2008), 3.","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T08:41:44Z","timestamp":1756197704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,26]]},"references-count":66,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,8,31]]}},"alternative-id":["10.1145\/3723356"],"URL":"https:\/\/doi.org\/10.1145\/3723356","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2025,8,26]]},"assertion":[{"value":"2024-09-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-03","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}