A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
If an attacker gains access to the topological information about the Tor network instead of having to consider the network as a fully connected graph, this anonymity may be reduced. ... We demonstrate how the resulting leakage of the Tor network topology can be used and present attacks to trace back a user from an exit relay to a small set of potential entry nodes. ... Based on this, we described several novel attacks that use this information to deanonymize the entry points of the users into the Tor network. ...doi:10.1007/978-3-642-33167-1_27 fatcat:7vsfmgdp5ndehe65igck6voajy