De-anonymisation attacks on tor: A survey

I Karunanayake, N Ahmed, R Malaney… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Anonymity networks are becoming increasingly popular in today's online world as more
users attempt to safeguard their online privacy. Tor is currently the most popular anonymity …

The rise of website fingerprinting on Tor: Analysis on techniques and assumptions

MAIM Aminuddin, ZF Zaaba, A Samsudin, F Zaki… - Journal of Network and …, 2023 - Elsevier
Tor is one of the most popular anonymity networks that allows Internet users to hide their
browsing activity. Hiding browsing activity is essential for Internet users to increase their …

Bitcoin over Tor isn't a good idea

A Biryukov, I Pustogarov - 2015 IEEE Symposium on Security …, 2015 - ieeexplore.ieee.org
Bit coin is a decentralized P2P digital currency in which coins are generated by a distributed
set of miners and transactions are broadcasted via a peer-to-peer network. While Bit coin …

Circuit fingerprinting attacks: Passive deanonymization of tor hidden services

A Kwon, M AlSabah, D Lazar, M Dacier… - 24th USENIX Security …, 2015 - usenix.org
This paper sheds light on crucial weaknesses in the design of hidden services that allow us
to break the anonymity of hidden service clients and operators passively. In particular, we …

Darkbert: A language model for the dark side of the internet

Y **, E Jang, J Cui, JW Chung, Y Lee… - arxiv preprint arxiv …, 2023 - arxiv.org
Recent research has suggested that there are clear differences in the language used in the
Dark Web compared to that of the Surface Web. As studies on the Dark Web commonly …

Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web

S Lee, C Yoon, H Kang, Y Kim, Y Kim… - 26th Annual Network …, 2019 - pure.kaist.ac.kr
Abstract The Dark Web is notorious for being a major distribution channel of harmful content
as well as unlawful goods. Perpetrators have also used cryptocurrencies to conduct illicit …

Toward a comprehensive insight into the eclipse attacks of tor hidden services

Q Tan, Y Gao, J Shi, X Wang, B Fang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Tor hidden services (HSs) are used to provide anonymity services to users on the Internet
without disclosing the location of the servers so as to enable freedom of speech. However …

Content and popularity analysis of Tor hidden services

A Biryukov, I Pustogarov, F Thill… - 2014 IEEE 34th …, 2014 - ieeexplore.ieee.org
Tor hidden services allow running Internet services while protecting the location of the
servers. Their main purpose is to enable freedom of speech even in situations in which …

A decentralized peer-to-peer remote health monitoring system

MS Ali, M Vecchio, GD Putra, SS Kanhere, F Antonelli - Sensors, 2020 - mdpi.com
Within the Internet of Things (IoT) and blockchain research, there is a growing interest in
decentralizing health monitoring systems, to provide improved privacy to patients, without …

Understanding tor usage with privacy-preserving measurement

A Mani, T Wilson-Brown, R Jansen, A Johnson… - Proceedings of the …, 2018 - dl.acm.org
The Tor anonymity network is difficult to measure because, if not done carefully,
measurements could risk the privacy (and potentially the safety) of the network's users …