Deanonymisation of clients in Bitcoin P2P network A Biryukov, D Khovratovich, I Pustogarov Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 817 | 2014 |
Trawling for tor hidden services: Detection, measurement, deanonymization A Biryukov, I Pustogarov, RP Weinmann 2013 IEEE Symposium on Security and Privacy, 80-94, 2013 | 321 | 2013 |
Bitcoin over Tor isn't a good idea A Biryukov, I Pustogarov 2015 IEEE Symposium on Security and Privacy, 122-134, 2015 | 289 | 2015 |
Content and popularity analysis of Tor hidden services A Biryukov, I Pustogarov, F Thill, RP Weinmann 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 199 | 2014 |
Proof-of-work as anonymous micropayment: Rewarding a Tor relay A Biryukov, I Pustogarov Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 46 | 2015 |
Ex-vivo dynamic analysis framework for Android device drivers I Pustogarov, Q Wu, D Lie 2020 IEEE Symposium on Security and Privacy (SP), 1088-1105, 2020 | 31 | 2020 |
Towards better understanding of bitcoin unreachable peers L Wang, I Pustogarov arXiv preprint arXiv:1709.06837, 2017 | 31 | 2017 |
IEEE 802.11 direct links: Interference classification and modeling A Lyakhov, I Pustogarov, A Gudilov Selected Lectures on Multiple Access and Queueing Systems. Revised Selected …, 2008 | 23 | 2008 |
Using program analysis to synthesize sensor spoofing attacks I Pustogarov, T Ristenpart, V Shmatikov Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 22 | 2017 |
University of Luxembourg A Biryukov, I Pustogarov Jan 19, 5, 2016 | 18 | 2016 |
TorScan: Tracing long-lived connections and differential scanning attacks A Biryukov, I Pustogarov, RP Weinmann Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 14 | 2012 |
Starvation effect study in IEEE 802.11 mesh networks A Lyakhov, I Pustogarov, A Safonov, M Yakimov 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009 | 14 | 2009 |
Deanonymisation techniques for Tor and Bitcoin I Pustogarov Unilu-University of Luxembourg, Luxembourg, Luxembourg, 2015 | 7 | 2015 |
Direct links in IEEE 802.11: Analytical study of unfairness problem A Lyakhov, I Pustogarov, A Gudilov Automation and Remote Control 69 (9), 1630-1645, 2008 | 5 | 2008 |
Intra-flow interference study in IEEE 802.11 s mesh networks A Lyakhov, I Pustogarov Multiple Access Communications: Third International Workshop, MACOM 2010 …, 2010 | 4 | 2010 |
Using inputs and context to verify user intentions in internet services H Shuang, W Huang, P Bettadpur, L Zhao, I Pustogarov, D Lie Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, 76-83, 2019 | 3 | 2019 |
TorScan: Deanonymizing connections using topology leaks A Biryukov, I Pustogarov, RP Weinmann ERCIM News, 2012 | 1 | 2012 |
FLexible Architecture for Virtualizable wireless future Internet Access T Task, I Tinnirello, P Gallo, P Loreti, D Garlisi, C Pisa, Y Weizman, ... | | |