anonbib.bib 10.86 KiB
%
%
% Magic fields:
%
% www_tags -- used to control which page groups the paper appears in.
% This is a space-separated list.
% www_section -- the topic used under 'topics.html'
% www_{ps|pdf|ps_gz|txt|html|abstract}_url -- link for text/abstract of
% an entry.
% www_important -- set for important entries
% www_remarks -- annotation for an entry
%% List of sections
@string{comm = "Anonymous communication"}
@string{traffic = "Traffic analysis"}
@string{pub = "Anonymous publication"}
@string{proofs = "Provable shuffles"}
@string{methods = "Formal methods"}
@string{nym = "Pseudonymity"}
@string{pir = "Private Information Retrieval"}
@string{economics = "Economics"}
@string{censorship = "Communications Censorship"}
@string{credentials = "E-Cash / Anonymous Credentials"}
@string{misc = "Misc"}
#
# Proposed new sections: application privacy, data anonymization, ...
#
@string{lncs = "Lecture Notes in Computer Science"}
@inproceedings{egger2013:practical-attacks,
title = {Practical Attacks Against the I2P Network},
author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna},
booktitle = {Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013)},
year = {2013},
month = {October},
www_pdf_url = {http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf},
www_section = traffic,
}
%% hal-00744922, version 1
%% http://hal.inria.fr/hal-00744922
@inproceedings{timpanaro:hal-00744922,
hal_id = {hal-00744922},
url = {http://hal.inria.fr/hal-00744922},
title = {{Improving Content Availability in the I2P Anonymous File-Sharing Environment}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
abstract = {{Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTorrent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable.}},
language = {English},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
booktitle = {{Proceedings of the 4th International Symposium on Cyberspace Safety and Security}},
publisher = {Springer},
pages = {77--92},
address = {Melbourne, Australia},
volume = {4},
audience = {international },
doi = {10.1007/978-3-642-35362-8 },
year = {2012},
month = Dec,
www_pdf_url = {http://hal.inria.fr/hal-00744922/PDF/Improving\_Content\_Availability\_in\_the\_I2P\_0AAnonymous\_File-Sharing\_Environment\_0A.pdf},
www_section = comm,
}
%% hal-00744919, version 1
%% http://hal.inria.fr/hal-00744919
@inproceedings{timpanaro:hal-00744919,
hal_id = {hal-00744919},
url = {http://hal.inria.fr/hal-00744919},
title = {{A Bird's Eye View on the I2P Anonymous File-sharing Environment}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
abstract = {{Anonymous communications have been gaining more and more interest from Internet users as privacy and anonymity problems have emerged. Among anonymous enabled services, anonymous file-sharing is one of the most active one and is increasingly growing. Large scale monitoring on these systems allows us to grasp how they behave, which type of data is shared among users, the overall behaviour in the system. But does large scale monitoring jeopardize the system anonymity? In this work we present the first large scale monitoring architecture and experiments on the I2P network, a low-latency message-oriented anonymous network. We characterize the file-sharing environment within I2P, and evaluate if this monitoring affects the anonymity provided by the network. We show that most activities within the network are file-sharing oriented, along with anonymous web-hosting. We assess the wide geographical location of nodes and network popularity. We also demonstrate that group-based profiling is feasible on this particular network.}},
keywords = {Large scale monitoring, I2P, Security risks, Anonymous file-sharing},
language = {English},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
booktitle = {{Proceedings of the 6th International Conference on Network and System Security}},
address = {Wu Yi Shan, China},
audience = {international },
year = {2012},
month = Nov,
www_pdf_url = {http://hal.inria.fr/hal-00744919/PDF/A\_Birda\_s\_Eye\_View\_on\_the\_I2P\_Anonymous\_0AFile-sharing\_Environment\_0A.pdf},
www_section = traffic,
}
%% hal-00744902, version 1
%% http://hal.inria.fr/hal-00744902
@inproceedings{timpanaro:hal-00744902,
hal_id = {hal-00744902},
url = {http://hal.inria.fr/hal-00744902},
title = {{I2P's Usage Characterization}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
abstract = {{We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and show through three one-week measurement experiments the ability of the system to identify a significant number of all running applications, among web servers and file-sharing clients. Additionally, we identify 37\% of published I2P applications, which turn out to be unreachable after their publication on the I2P distributed database.}},
language = {English},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
booktitle = {{Proceedings of the 4th International Workshop on Traffic Monitoring and Analysis (TMA 2012)}},
address = {Vienne, Austria},
audience = {international },
year = {2012},
month = Mar,
www_pdf = {http://hal.inria.fr/hal-00744902/PDF/TMA2012-LNCS.pdf},
www_section = traffic,
}
@misc{ehlert2011:usability-comparison-i2p-tor,
title = {I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison},
author = {Mathias Ehlert},
howpublished = {Seminar, Humboldt University of Berlin},
year = {2011},
month = {November},
www_pdf_url = {http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf},
www_section = comm,
}
%% inria-00632259, version 1
%% http://hal.inria.fr/inria-00632259
@misc{timpanaro:inria-00632259,
hal_id = {inria-00632259},
url = {http://hal.inria.fr/inria-00632259},
title = {{Monitoring the I2P network}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
howpublished = {Preprint},
abstract = {{We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and we show through a one week long experiment that we are able to identify 32\% of all running applications, among web servers and file- sharing clients. Additionally, we identify 37\% of published I2P applications, which turn out to be unreachable after its publication on the I2P distributed database.}},
language = {English},
affiliation = {MADYNES - INRIA Lorraine - LORIA},
year = {2011},
month = Oct,
www_pdf_url = {http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf},
www_section = traffic,
}
@inproceedings{pets2011-i2p,
title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P},
author = {Michael Herrmann and Christian Grothoff},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)},
year = {2011},
month = {July},
location = {Waterloo, Canada},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf},
www_section = traffic,
}
@mastersthesis{hermann2011-mthesis,
title = {Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P},
author = {Michael Hermann},
school = {TU-Munich},
year = {2011},
month = {March},
www_section = traffic,
}
@inproceedings{BlackHat2011-crenshaw,
url = {http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers},
title = {Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts},
author = {Adrian Crenshaw},
booktitle = {Proceedings of Black Hat 2011},
year = {2011},
month = {January},
location = {Washington, DC},
www_pdf_url = {http://www.irongeek.com/downloads/Identifying%20the%20true%20IP%20of%20I2P%20service%20hosts.pdf},
www_section = traffic,
}
@mastersthesis{delmer-mthesis,
title = {L'{\'e}mergence au sein d'internet de communaut{\'e}s virtuelles et anonymes, Freenet et i2p},
author = {Laurie Delmer},
school = {Universit{\'e} catholique de Louvain - D{\'e}partement des sciences politiques et sociales},
year = {2009},
note = {Title : The rise in internet virtual and anonymous communities, Freenet and I2P. School: Catholic University of Leuven - Department of Political and Social Science},
www_section = comm,
}
@inproceedings{petcon2009-schomburg,
title = {Anonymity Techniques - Usability Tests of Major Anonymity Networks},
author = {Jens Schomburg},
booktitle = {Proceedings of PET-CON 2009.1},
location = {Dresden, Germany},
year = {2009},
month = {March},
pages = {49--58},
www_pdf_url = {https://people.torproject.org/~karsten/petcon-proceedings-2009.1.pdf},
www_section = comm,
}
@inproceedings{petcon2009-zzz,
title = {Peer Profiling and Selection in the I2P Anonymous Network},
author = {zzz (Pseudonym) and Lars Schimmer},
booktitle = {Proceedings of PET-CON 2009.1},
location = {Dresden, Germany},
year = {2009},
month = {March},
pages = {59--70},
www_pdf_url = {/_static/pdf/I2P-PET-CON-2009.1.pdf},
www_section = comm,
}
@misc{jrandom2003,
title = {Invisible Internet Project (I2P) Project Overview},
author = {jrandom (Pseudonym)},
howpublished = {Design document},
year = {2003},
month = Aug,
www_pdf_url = {/_static/pdf/i2p_philosophy.pdf},
www_section = comm,
}