Sources and inspiration include: * [CensorBib](https://censorbib.nymity.ch/) * [Free Haven](https://www.freehaven.net/anonbib/topic.html) * [Splinternet Reading Library](https://splintercon.net/resources/) ## Tor Project - [ ] https://gitlab.torproject.org/tpo/core/tor/-/issues/?sort=created_date&state=all&label_name%4B%5D=DoS - [ ] https://gitlab.torproject.org/tpo/onion-services - [ ] https://tpo.pages.torproject.net/onion-services/onionplan/ - [ ] Dingledine et al. (2003), ["Tor: The Second-Generation Onion Router"](https://svn-archive.torproject.org/svn/projects/design-paper/tor-design.pdf) * [ ] Döpmann et al. (2021), ["Operating Tor Relays at Universities: Experiences and Considerations"](https://arxiv.org/abs/2106.04277) * [ ] Fassl et al. (2023), ["Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon"](https://dl.acm.org/doi/10.1145/3610193) * [ ] Feigenbaum et al. (2007), ["A Model of Onion Routing with Provable Anonymity"](https://link.springer.com/chapter/10.1007/978-3-540-77366-5_9) * [ ] Hogan (2020), ["Security Analysis of Tor over QUIC"](https://dspace.mit.edu/bitstream/handle/1721.1/128590/1220836856-MIT.pdf?sequence=1) * [ ] Hopper (2013), ["Proving Security of Tor's Hidden Service Identity Blinding Protocol"](https://www-users.cse.umn.edu/~hoppernj/basic-proof.pdf) * [ ] Lu et al. (2011), ["Tor instead of IP"](https://dl.acm.org/doi/abs/10.1145/2070562.2070576) * [ ] Sucu (2015), ["Tor: Hidden Service Scaling"](https://www.benthamsgaze.org/wp-content/uploads/2015/11/sucu-torscaling.pdf) ### Denial of service - [ ] ["Onion Service DoS Guidelines"](https://community.torproject.org/onion-services/advanced/dos/) - [ ] asn (2020), ["How to Stop the Onion Denial (of Service)"](https://blog.torproject.org/tor-network-ddos-attack/) - [ ] bob1983 (2017), ["Layer-7 DoS Attack Against WWW Tor Hidden Service"](https://lists.torproject.org/pipermail/tor-talk/2017-November/043790.html) (thread) * [ ] Conrad and Shirazi (2014), ["Analyzing the Effectiveness of DoS Attacks on Tor"](https://dl.acm.org/doi/abs/10.1145/2659651.2659707) * [ ] Das and Borisov (2012), ["Securing Tor Tunnels under the Selective-DoS Attack"](https://arxiv.org/abs/1107.3863) - [ ] Dingledine (2021), ["New attack on the dir auths (Jan 27)"](https://lists.torproject.org/pipermail/network-health/2021-January/000661.html) (thread) * [ ] Danner et al. (2012), ["Effectiveness and Detection of Denial-of-Service Attacks in Tor"](https://ieeexplore.ieee.org/abstract/document/779758) * [ ] Döpmann et al. (2021), ["Onion Pass: Token-base Denial-of-Service Protection for Tor Onion Services"](https://ieeexplore.ieee.org/abstract/document/9472207) * [ ] Fraser et al. (2007), ["Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment"](https://ieeexplore.ieee.org/abstract/document/4288874) * [ ] Goulet (2017), ["Ongoing DDoS on the Network - Status"](https://lists.torproject.org/pipermail/tor-project/2017-December/001604.html) (thread) - [ ] Jansen (2014), ["New Tor Denial of Service Attacks and Defenses"](https://blog.torproject.org/new-tor-denial-service-attacks-and-defenses/) * [ ] Jansen (2019), ["Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor"](https://www.usenix.org/system/files/sec19-jansen.pdf) - [ ] Kadianakis (2019), ["Denial of service defense for onion services"](https://lists.torproject.org/pipermail/tor-dev/2019-April/013790.html) (thread) * [ ] Kadianakis et al. (2020), ["A First Take at PoW over Introduction Circuits"](https://github.com/torproject/torspec/blob/main/proposals/327-pow-over-intro.txt) * [ ] Kadianakis and Perry (2021), ["Res Tokens: Anonymous Credentials for Onion Service DoS Resilience"](https://github.com/torproject/torspec/blob/main/proposals/331-res-tokens-for-anti-dos.md) * [ ] Scott (2023), [onion-pow-example](https://gitlab.torproject.org/beth/onion-pow-example) * [ ] Tan et al. (2019), ["Toward a Comprehensive Insight into the Eclipse Attacks of Tor Hidden Services"](https://ieeexplore.ieee.org/abstract/document/8382237) * [ ] Traudt (2021), ["Tracking Tor's Network-Wide V3 Onion Service Outages"](https://blog.pastly.net/posts/2021-01-13-tracking-tors-v3-onion-outages/) ## Censorship and circumvention - [ ] [Censored Planet](https://censoredplanet.org) - [ ] Chen et al. (2024), ["Extended Abstract: Oscur0: One-Shot Circumvention without Registration"](https://www.petsymposium.org/foci/2024/foci-2024-0005.php) * [ ] Clark (2012), ["Control Point Analysis"](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2032124) * [ ] Raman et al. (2022), ["Network Measurement Methods for Locating and Examining Censorship Devices"](https://ramakrishnansr.com/assets/censorship_devices.pdf) * [ ] Sridhar et al. (2023), ["Content Censorship in the InterPlanetary File System"](https://arxiv.org/abs/2307.12212) * [ ] Wu et al. (2023), ["How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic"](https://gfw.report/publications/usenixsecurity23/data/paper/paper.pdf) ## Denial of service * [x] [[Hussain et al. (2003)]], ["A Framework for Classifying Denial of Service Attacks"](https://dl.acm.org/doi/abs/10.1145/863955.863968) * [ ] Meadows, ["A Formal Framework and Evaluation Method for Network Denial of Service"](https://ieeexplore.ieee.org/abstract/document/779758) * [ ] Tripathi and Hubballi (2021), ["Application Layer Denial-of-Service Attacks and Defense Mechanisms: A Survey"](https://dl.acm.org/doi/abs/10.1145/3448291) ## Denial of service as censorship * [ ] Borisov et al. (2007), ["Denial of Service or Denial of Security?"](https://dl.acm.org/doi/abs/10.1145/1315245.1315258) * [ ] [[Deibert et al. (eds.), "Access Controlled"]] * [ ] Deibert and Rohozinski, ["Beyond Denial"](https://cyber.harvard.edu/teaching/ilaw/2011/sites/teaching/images/Chapter-1.pdf) * [ ] Zuckerman, ["Intermediary Censorship"](https://techliberation.com/wp-content/uploads/2010/06/chapter-5.pdf) * [ ] Lutscher et al. (2019), ["At Home and Abroad: The Use of Denial-of-Service Attacks during Elections in Nondemocratic Regimes"](https://journals.sagepub.com/doi/full/10.1177/0022002719861676)A * [ ] Lutscher (2019), ["Censor & Contend: The Use of Denial-of-Service Attacks in Autocracies"](https://kops.uni-konstanz.de/entities/publication/022388b9-8331-45e1-b287-1041d84b8bbb) * [ ] Kawerau et al. (2022), ["Attack or Block? Repertoires of Digital Censorship in Autocracies"](https://www.tandfonline.com/doi/abs/10.1080/19331681.2022.2037118) * [ ] Nazario (2009), ["Politically Motivated Denial of Service Attacks"](https://ccdcoe.org/uploads/2018/10/12_NAZARIO-Politically-Motivated-DDoS.pdf) ## Reputation * [ ] ["Anonymous Reputation-based Blacklisting"](https://privacypatterns.org/patterns/Anonymous-reputation-based-blacklisting) * [ ] Dingledine et al. (2003), ["Reputation in P2P Anonymity Systems"](https://www.freehaven.net/doc/econp2p03/econp2p03.pdf) * [ ] Henry (2010), ["Nymbler: Privacy-enhanced Protection from Abuses of Anonymity"](https://uwspace.uwaterloo.ca/bitstream/handle/10012/5699/Henry_Ryan.pdf) * [ ] Henry and Goldberg (2013), ["Formalizing Anonymous Blacklisting Systems"](https://www.cypherpunks.ca/~iang/pubs/fabs-oakland.pdf) * [ ] Henry and Goldberg (2013), ["Thinking Inside the BLAC Box: Smarter Protocols for Faster Anonymous Blacklisting"](https://www-users.cse.umn.edu/~hoppernj/bnymble.pdf) * [ ] Lofgren and Hopper (2011), ["BNymble: More Anonymous Blacklisting at Almost No Cost"](https://www-users.cse.umn.edu/~hoppernj/bnymble.pdf) * [ ] Tsang et al. (2009), ["Nymble: Blocking Misbehaving Users in Anonymizing Networks"](https://www.freehaven.net/anonbib/cache/nymble-tdsc.pdf) * [ ] Xi and Feng (2014), ["FARB: Fast Anonymous Reputation-Based Blacklitsing without TTPs"](https://dl.acm.org/doi/10.1145/2665943.2665947)