Masoud Akhoondi, Chu Yu, and Harsha V Madhyastha. LASTor: A low-latency AS-aware Tor client. In IEEE S&P, 2012. [Web of Science]
 Alexa.com. Alexa top sites., June 2015. http://www.alexa.com/topsites.
 bgpVista. Swordqiu, March 2015. http://www.bgpvista.com/asinfer.php.
 Nikita Borisov, George Danezis, Prateek Mittal, and Parisa Tabriz. Denial of service or denial of security? In CCS, 2007.
 CAIDA. CAIDA AS ranking, June 2015. http://as-rank.caida.org/.
 CAIDA. The CAIDA UCSD IPv4 routed /24 topology dataset, June 2015. http://www.caida.org/data/active/ipv4routed24topologydataset.xml.
 CAIDA. The CAIDA AS relationships, January 2016. http: //www.caida.org/data/as-relationships/.
 Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In PETS, 2003.
 Roger Dingledine, Nicholas Hopper, George Kadianakis, and Nick Mathewson. One fast guard for life (or 9 months). In HotPETs, 2014.
 Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In USENIX Security, 2004.
 Matthew Edman and Paul Syverson. AS-awareness in Tor path selection. In CCS, 2009.
 Nick Feamster and Roger Dingledine. Location diversity in anonymity networks. In WPES, 2004.
 Lixin Gao. On inferring autonomous system relationships in the Internet. ACM/IEEE Transactions on Networks (TON), 9(6), 2001.
 Jamie Hayes and George Danezis. Guard sets for onion routing. In PETS, 2015.
 Tor Project Inc. Tor Metrics, June 2015. https://metrics.torproject.org.
 Rob Jansen, Kevin S Bauer, Nicholas Hopper, and Roger Dingledine. Methodically modeling the Tor network. In CSET, 2012.
 Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson. Never been KIST: Tor's congestion man- agement blossoms with kernel-informed socket transport. In USENIX Security, 2014.
 Rob Jansen and Nicholas Hopper. Shadow: Running Tor in a box for accurate and efficient experimentation. In NDSS, 2012.
 Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users get routed: Traffic correlation on Tor by realistic adversaries. In CCS, 2013.
 Joshua Juen. Protecting anonymity in the presence of autonomous system and Internet exchange level adversaries. Master's thesis, University of Illinois, http://hdl.handle.net/2142/34363, 2012.
 Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, and Matthew Caesar. Defending Tor from network adver- saries: A case study of network path prediction. In PETS, 2015.
 Z Morley Mao, Lili Qiu, Jia Wang, and Yin Zhang. On AS- level path inference. In SIGMETRICS, 2005.
 Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, and Randy H Katz. Towards an accurate AS-level traceroute tool. In SIGCOMM, 2003.
 Steven J Murdoch and George Danezis. Low-cost traffic analysis of Tor. In IEEE S&P, 2005.
 Steven J Murdoch and Piotr Zielinski. Sampled traffic analysis by Internet-exchange-level adversaries. In PETS, 2007.
 Lasse Overlier and Paul Syverson. Locating hidden servers. In IEEE S&P, 2006.
 Jian Qiu and Lixin Gao. Cam04-4: AS path inference by exploiting known AS paths. In GLOBECOM, 2006.
 Oleksii Starov, Rishab Nithyanand, Adva Zair, Phillipa Gill, and Michael Schapira. Measuring and mitigating AS-level adversaries against Tor. In NDSS, 2016.
 Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, and Prateek Mittal. RAP- TOR: Routing attacks on privacy in Tor. In USENIX Security, 2015.
 Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr. Towards an analysis of onion routing security. In Designing Privacy Enhancing Technologies, 2001.
 TorPS. TorPS: The Tor path simulator. http://torps.github.io.
 Chris Wacek, Henry Tan, Kevin S Bauer, and Micah Sherr. An empirical evaluation of relay selection in Tor. In NDSS, 2013.
 Matthew Wright, Micah Adler, Brian N Levine, and Clay Shields. Defending anonymous communications against passive logging attacks. In IEEE S&P, 2003.
 Matthew K Wright, Micah Adler, Brian Neil Levine, and Clay Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. TISSEC, 7(4), 2004.
 Matthew K Wright, Micah Adler, Brian Neil Levine, and Clay Shields. Passive-logging attacks against anonymous communications systems. TISSEC, 11(2), 2008. [Web of Science]
Published Online: 2016-07-14
Published in Print: 2016-10-01
Citation Information: Proceedings on Privacy Enhancing Technologies. Volume 2016, Issue 4, Pages 356–372, ISSN (Online) 2299-0984, DOI: https://doi.org/10.1515/popets-2016-0044, July 2016
© 2016. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. (CC BY-NC-ND 4.0)