Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
Tweet

connect with us

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

Abstract: 

Stevens Le Blond, I.N.R.I.A., France

Pere Manils, I.N.R.I.A., France

Abdelberi Chaabane, I.N.R.I.A., France

Mohamed Ali Kaafar, I.N.R.I.A., France

Claude Castelluccia, I.N.R.I.A., France

Arnaud Legout, I.N.R.I.A., France

Walid Dabbous, I.N.R.I.A., France

BibTeX
@inproceedings {266992,
author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous},
title = {One Bad Apple Spoils the Bunch: Exploiting {P2P} Applications to Trace and Profile Tor Users},
booktitle = {4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11)},
year = {2011},
address = {Boston, MA},
url = {https://www.usenix.org/conference/leet11/one-bad-apple-spoils-bunch-exploiting-p2p-applications-trace-and-profile-tor-users},
publisher = {USENIX Association},
month = mar,
}
Download

Links

Paper: 
http://www.usenix.org/events/leet11/tech/full_papers/LeBlond.pdf
Paper (HTML): 
http://www.usenix.org/events/leet11/tech/techAbstracts.html#LeBlond
Slides: 
http://www.usenix.org/events/leet11/tech/slides/leblond.pdf

© USENIX

  • Privacy Policy
  • Contact Us