Linked Presentation: You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation