{"id":"https://openalex.org/W2146117736","doi":"https://doi.org/10.1145/2046707.2046731","title":"Forensic investigation of the OneSwarm anonymous filesharing system","display_name":"Forensic investigation of the OneSwarm anonymous filesharing system","publication_year":2011,"publication_date":"2011-10-17","ids":{"openalex":"https://openalex.org/W2146117736","doi":"https://doi.org/10.1145/2046707.2046731","mag":"2146117736"},"language":"en","primary_location":{"id":"doi:10.1145/2046707.2046731","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070156138","display_name":"Swagatika Prusty","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Swagatika Prusty","raw_affiliation_strings":["University of Massachusetts Amherst, Amherst, MA, USA","University Of Massachusetts Amherst, Amherst, MA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University Of Massachusetts Amherst, Amherst, MA, USA#TAB#","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102976517","display_name":"Brian Neil Levine","orcid":"https://orcid.org/0000-0003-2262-0617"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian Neil Levine","raw_affiliation_strings":["University of Massachusetts Amherst, Amherst, MA, USA","University Of Massachusetts Amherst, Amherst, MA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University Of Massachusetts Amherst, Amherst, MA, USA#TAB#","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000827936","display_name":"Marc Liberatore","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marc Liberatore","raw_affiliation_strings":["University of Massachusetts Amherst, Amherst, MA, USA","University Of Massachusetts Amherst, Amherst, MA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University Of Massachusetts Amherst, Amherst, MA, USA#TAB#","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070156138"],"corresponding_institution_ids":["https://openalex.org/I24603500"],"apc_list":null,"apc_paid":null,"fwci":2.2012,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.89590429,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8261228203773499},{"id":"https://openalex.org/keywords/bittorrent","display_name":"BitTorrent","score":0.7797921895980835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6355522871017456},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5063925981521606},{"id":"https://openalex.org/keywords/file-sharing","display_name":"File sharing","score":0.49578437209129333},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.48358386754989624},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44456878304481506},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4444776475429535},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4331151247024536},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.4283275008201599},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.28653037548065186},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.274458110332489},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24979469180107117},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10566017031669617}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8261228203773499},{"id":"https://openalex.org/C520566109","wikidata":"https://www.wikidata.org/wiki/Q133862","display_name":"BitTorrent","level":3,"score":0.7797921895980835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6355522871017456},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5063925981521606},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.49578437209129333},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48358386754989624},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44456878304481506},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4444776475429535},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4331151247024536},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.4283275008201599},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28653037548065186},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.274458110332489},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24979469180107117},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10566017031669617},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2046707.2046731","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.300.2514","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.2514","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.freehaven.net/anonbib/cache/ccs2011-oneswarm.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W114020513","https://openalex.org/W157207381","https://openalex.org/W239964209","https://openalex.org/W1493379994","https://openalex.org/W1542162318","https://openalex.org/W1655958391","https://openalex.org/W1781225673","https://openalex.org/W1985454260","https://openalex.org/W2049655317","https://openalex.org/W2092201353","https://openalex.org/W2098120415","https://openalex.org/W2103200909","https://openalex.org/W2105726509","https://openalex.org/W2108716870","https://openalex.org/W2116039228","https://openalex.org/W2136347453","https://openalex.org/W2138719936","https://openalex.org/W2140655729","https://openalex.org/W2156410527","https://openalex.org/W2161721751","https://openalex.org/W2970647192","https://openalex.org/W6609205758","https://openalex.org/W6629467671","https://openalex.org/W6632738333","https://openalex.org/W6673800192","https://openalex.org/W6680093816"],"related_works":["https://openalex.org/W2081918782","https://openalex.org/W1522332202","https://openalex.org/W2103200909","https://openalex.org/W2246125847","https://openalex.org/W2154319279","https://openalex.org/W2028860399","https://openalex.org/W2034787661","https://openalex.org/W1979635763","https://openalex.org/W2883808777","https://openalex.org/W2086592751"],"abstract_inverted_index":{"OneSwarm":[0,81,103,176],"is":[1,49,70,128,136,240],"a":[2,52,223,227,232,238,246,279,290],"system":[3],"for":[4,144,248,311],"anonymous":[5],"p2p":[6],"file":[7],"sharing":[8],"in":[9,29,113,192,278,307],"use":[10,193,207,285,303],"by":[11,125,194],"thousands":[12,195],"of":[13,73,80,87,153,157,170,174,196,202,213,226,243,273,289,309],"peers.":[14],"It":[15],"aims":[16],"to":[17,39,51,62,66,93,122,166,235],"provide":[18],"Onion":[19,114,140],"Routing-like":[20],"privacy":[21],"and":[22,32,96,135,268],"BitTorrent-like":[23],"performance.":[24],"We":[25,142],"demonstrate":[26],"several":[27],"flaws":[28],"OneSwarm's":[30,120],"design":[31,48],"implementation":[33,191],"through":[34],"three":[35],"different":[36],"attacks":[37,275],"available":[38],"forensic":[40],"investigators.":[41],"First,":[42],"we":[43,83,117,220],"prove":[44],"that":[45,56,119,148,185,199,222,251],"the":[46,63,71,100,111,158,168,175,182,190,203,241,254,270],"current":[47],"vulnerable":[50],"novel":[53,224],"timing":[54],"attack":[55,101,147,210,230,261],"allows":[57,231],"just":[58],"two":[59,94],"attackers":[60,77,95,127,198],"attached":[61,92],"same":[64],"target":[65],"determine":[67],"if":[68],"it":[69],"source":[72,177,242],"queried":[74],"content.":[75,171],"When":[76],"comprise":[78,151,200],"15%":[79],"peers,":[82,154],"expect":[84],"over":[85,155],"90%":[86],"remaining":[88,214],"peers":[89,215],"will":[90],"be":[91,161,263],"therefore":[97],"vulnerable.":[98],"Thwarting":[99],"increases":[102],"query":[104],"response":[105],"times,":[106],"making":[107],"them":[108,286,304],"longer":[109],"than":[110,131,139],"equivalent":[112],"Routing.":[115,141],"Second,":[116],"show":[118,143,221],"vulnerability":[121],"traffic":[123],"analysis":[124],"colluding":[126],"much":[129,137],"greater":[130],"was":[132],"previously":[133],"reported,":[134],"worse":[138],"this":[145,208],"second":[146,209],"when":[149],"investigators":[150,266],"25%":[152,201],"40%":[156],"network":[159,204],"can":[160,205,262,284,302],"investigated":[162],"with":[163,181,216],"80%":[164],"precision":[165],"find":[167],"sources":[169],"Our":[172],"examination":[173],"code":[178],"found":[179],"differences":[180],"technical":[183],"paper":[184],"significantly":[186],"reduce":[187],"security.":[188],"For":[189],"people,":[197],"successfully":[206],"against":[211],"98%":[212],"95%":[217],"precision.":[218],"Finally,":[219],"application":[225],"known":[228],"TCP-based":[229],"single":[233],"attacker":[234],"identify":[236],"whether":[237],"neighbor":[239],"data":[244],"or":[245],"proxy":[247],"it.":[249],"Users":[250],"turn":[252],"off":[253],"default":[255],"rate-limit":[256],"setting":[257],"are":[258,276],"exposed.":[259],"Each":[260],"repeated":[264],"as":[265,315],"leave":[267],"rejoin":[269],"network.":[271],"All":[272],"our":[274],"successful":[277],"forensics":[280],"context:":[281],"Law":[282],"enforcement":[283],"legally":[287],"ahead":[288],"warrant.":[291],"Furthermore,":[292],"private":[293],"investigators,":[294],"who":[295],"have":[296],"fewer":[297],"restrictions":[298],"on":[299],"their":[300],"behavior,":[301],"more":[305],"easily":[306],"pursuit":[308],"evidence":[310],"such":[312],"civil":[313],"suits":[314],"copyright":[316],"infringement.":[317]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
