2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7996832
|View full text |Cite
|
Sign up to set email alerts
|

A closer look at Eclipse attacks against Tor hidden services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Security [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [21], [58], [59], [60], [61], [62], [63], [64], [19] 28…”
Section: Research Fieldmentioning
confidence: 99%
See 3 more Smart Citations
“…Security [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [21], [58], [59], [60], [61], [62], [63], [64], [19] 28…”
Section: Research Fieldmentioning
confidence: 99%
“…Research papers N. of papers Attacks to THS [40], [41], [42], [43], [44], [45], [47], [48], [50], [51], [52], [53], [54], [56], [57], [21], [58], [63], [49], [19] 20…”
Section: Focus Of the Researchmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2015, Matic et al [6] designed the detection tool CARONTE to locate the actual server IP address by detecting the unique string and certificate chain leaked in the content of the hidden service. Tan et al [25] used the Eclipse attack to destroy the DHT structure of the hidden service directory server, which could cover any hidden service under a small amount of IP resources.…”
Section: Hidden Service Attackmentioning
confidence: 99%