• Publications
  • Influence
How Unique and Traceable Are Usernames?
TLDR
We investigate the feasibility of using usernames to trace or link multiple profiles across services that belong to the same individual. Expand
  • 181
  • 12
  • PDF
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network
TLDR
This paper provides a detailed analysis of the anonymized traffic traveling through the Tor network using a deep packet inspection approach. Expand
  • 94
  • 11
  • PDF
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
TLDR
In this paper, we show that linkability allows us to trace 193% of additional streams, including 27% of HTTP streams possibly originating from "secure" browsers. Expand
  • 60
  • 4
  • PDF
Compromising Tor Anonymity Exploiting P2P Information Leakage
TLDR
In this paper, we first present two techniques targeting BitTorrent users on top of Tor that reveal their real IP addresses. Expand
  • 33
  • 1
  • PDF
Geolocalization of proxied services and its application to fast-flux hidden servers
TLDR
This paper proposes a framework to geolocalize fast-flux servers, that is, to determine the physical location of the fast-Flux networks roots (mothership servers) based on network measurements. Expand
  • 20
  • PDF
De-anonymizing BitTorrent Users on Tor
TLDR
We discuss three different attacks to reveal the IP address of BitTorrent users on top of Tor to preserve their privacy. Expand
  • 6
  • PDF
Why spammers should thank Google?
TLDR
We exploit the notion of Followers/Follwing in Buzz to crawl Google for Gmail accounts, demonstrating how it is easy and practical to collect millions of valid Gmail accounts from a single machine, in a very short period of time and without being noticed. Expand
  • 5
  • PDF