Philipp Winter

According to our database1, Philipp Winter authored at least 31 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse.
Proceedings of the 33rd USENIX Security Symposium, 2024

2022
Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers?
CoRR, 2022

A Framework for Building Secure, Scalable, Networked Enclaves.
CoRR, 2022

Tango or square dance?: how tightly should we integrate network functionality in browsers?
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022

2021
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union).
CoRR, 2021

What's in Your Wallet? Privacy and Security Issues in Web 3.0.
CoRR, 2021

2019
Geo-locating BGP prefixes.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2019

Chocolatine: Outage Detection for Internet Background Radiation.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2019

2018
How Do Tor Users Interact With Onion Services?
Proceedings of the 27th USENIX Security Symposium, 2018

"Major Key Alert!" Anomalous Keys in Tor Relays.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems.
CoRR, 2017

Anomalous keys in Tor relays.
CoRR, 2017

The Effect of DNS on Tor's Anonymity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

2016
Identifying and Characterizing Sybils in the Tor Network.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Analyzing the Great Firewall of China Over Space and Time.
Proc. Priv. Enhancing Technol., 2015

Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
Spoiled Onions: Exposing Malicious Tor Exit Relays.
CoRR, 2014

Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall.
CoRR, 2014

Global Network Interference Detection Over the RIPE Atlas Network.
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014

Spoiled Onions: Exposing Malicious Tor Exit Relays.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

2013
ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship
CoRR, 2013

ScrambleSuit: a polymorphic network protocol to circumvent censorship.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Towards a Censorship Analyser for Tor.
Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, 2013

2012
The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint.
login Usenix Mag., 2012

How China Is Blocking Tor
CoRR, 2012

How the Great Firewall of China is Blocking Tor.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

2011
Anomalieerkennung in Computernetzen.
Datenschutz und Datensicherheit, 2011

An On-Line Learning Statistical Model to Detect Malicious Web Requests.
Proceedings of the Security and Privacy in Communication Networks, 2011

Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

On Detecting Abrupt Changes in Network Entropy Time Series.
Proceedings of the Communications and Multimedia Security, 2011


  Loading...