usenix conference policies
You are here
Home » One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
Abstract:
BibTeX
@inproceedings {266992,
author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous},
title = {One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users},
booktitle = {4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11)},
year = {2011},
address = {Boston, MA},
url = {https://www.usenix.org/conference/leet11/one-bad-apple-spoils-bunch-exploiting-p2p-applications-trace-and-profile-tor-users},
publisher = {USENIX Association},
month = mar
}
author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous},
title = {One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users},
booktitle = {4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11)},
year = {2011},
address = {Boston, MA},
url = {https://www.usenix.org/conference/leet11/one-bad-apple-spoils-bunch-exploiting-p2p-applications-trace-and-profile-tor-users},
publisher = {USENIX Association},
month = mar
}
Website Maintenance Alert
Due to scheduled maintenance, the USENIX website may not be available on Monday, March 17, from 10:00 am–6:00 pm Pacific Daylight Time (UTC -7). We apologize for the inconvenience and thank you for your patience.
If you would like to register for NSDI '25, SREcon25 Americas, or PEPR '25, please complete your registration before or after this time period.
connect with us