DEFENSES
tor Tor (onion routing)
Use as a defense tag when the paper specifically evaluates Tor or its bridges, beyond using Tor as plumbing.
32 PAPERS ON FILE
- 2025-h-ller-evaluating Evaluating Onion Address Collection Methods
- 2025-rodriguez-revisiting Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks
- 2025-sharma-cenpush CenPush: Blocking-Resistant Control Channel Using Push Notifications
- 2025-wang-custom Is Custom Congestion Control a Bad Idea for Circumvention Tools?
- 2024-holland-detorrent DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
- 2023-amich-deresistor DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
- 2023-arora-detor-onion Provably Avoiding Geographic Regions for Tor's Onion Services
- 2023-fifield-running Running a high-performance pluggable transports Tor bridge
- 2019-iszaevich-distributed Distributed Detection of Tor Directory Authorities Censorship in Mexico
- 2019-nasr-enemy Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
- 2018-dunna-analyzing Analyzing China's Blocking of Unpublished Tor Bridges
- 2018-wright-identifying On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship
- 2017-lee-usability A Usability Evaluation of Tor Launcher
- 2017-li-detor DeTor: Provably Avoiding Geographic Regions in Tor
- 2017-matic-dissecting Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
- 2017-singh-characterizing Characterizing the Nature and Dynamics of Tor Exit Blocking
- 2016-al-saqaf-internet Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
- 2016-fifield-censors Censors' Delay in Blocking Circumvention Proxies
- 2016-khattak-sok SoK: Making Sense of Censorship Resistance Systems
- 2016-tschantz-sok SoK: Towards Grounding Censorship Circumvention in Empiricism
- 2013-wang-rbridge rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
- 2013-winter-towards Towards a Censorship Analyser for Tor
- 2012-ling-extensive Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
- 2012-moghaddam-skypemorph SkypeMorph: Protocol Obfuscation for Tor Bridges
- 2012-weinberg-stegotorus StegoTorus: A Camouflage Proxy for the Tor Anonymity System
- 2012-winter-great How the Great Firewall of China is Blocking Tor
- 2011-danezis-anomaly-based An anomaly-based censorship-detection system for Tor
- 2011-jones-hiding Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
- 2011-liu-tor Tor Instead of IP
- 2011-smits-bridgespa BridgeSPA: Improving Tor Bridges with Single Packet Authorization
- 2009-mclachlan-risks On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design
- 2006-dingledine-design Design of a blocking-resistant anonymity system