usenix conference policies
You are here
Home ยป One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
Abstract:
BibTeX
@inproceedings {266992,
author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous},
title = {One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users},
booktitle = {4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11)},
year = {2011},
address = {Boston, MA},
url = {https://www.usenix.org/conference/leet11/one-bad-apple-spoils-bunch-exploiting-p2p-applications-trace-and-profile-tor-users},
publisher = {USENIX Association},
month = mar
}
author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous},
title = {One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users},
booktitle = {4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11)},
year = {2011},
address = {Boston, MA},
url = {https://www.usenix.org/conference/leet11/one-bad-apple-spoils-bunch-exploiting-p2p-applications-trace-and-profile-tor-users},
publisher = {USENIX Association},
month = mar
}
connect with us