<--- Back to Details
First PageDocument Content
Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network
Date: 2014-10-08 09:38:20
Internet security
Internet Standards
Internet protocols
Routing
Secure communication
IP hijacking
Border Gateway Protocol
Tor
Traffic analysis
Onion routing
HTTPS
Computer network

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: vanbever.eu

Download Document from Source Website

File Size: 985,30 KB

Share Document on Facebook

Similar Documents

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, and Xenofontas Dimitropoulos FORTH / University of Crete, Greece  {gchaviaras, gkigkis, se

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, and Xenofontas Dimitropoulos FORTH / University of Crete, Greece {gchaviaras, gkigkis, se

DocID: 1r3Vh - View Document

Stealing The Internet  An Internet-Scale  Man In The Middle Attack   Defcon 16, Las Vegas, NV - August 10th, 2008

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

DocID: 1qn2z - View Document

TO P U S E C AS E S  WHAT YOU CAN DO WITH KENTIK DETECT Kentik Detect helps industry leaders like Yelp, Neustar, Dailymotion, and Pandora achieve better business results by unlocking the value of network data. Delivering

TO P U S E C AS E S WHAT YOU CAN DO WITH KENTIK DETECT Kentik Detect helps industry leaders like Yelp, Neustar, Dailymotion, and Pandora achieve better business results by unlocking the value of network data. Delivering

DocID: 1q9vY - View Document

Security and Predictability: Two Missing Pieces in BGP Lakshmi Subramanian UC Berkeley 1  Introduction

Security and Predictability: Two Missing Pieces in BGP Lakshmi Subramanian UC Berkeley 1 Introduction

DocID: 1pB61 - View Document

Outsourcing the Routing Control Logic: Better Internet Routing Based on SDN Principles Vasileios Kotronis ETH Zurich Zurich, Switzerland

Outsourcing the Routing Control Logic: Better Internet Routing Based on SDN Principles Vasileios Kotronis ETH Zurich Zurich, Switzerland

DocID: 1plXF - View Document