Philipp Winter
Philipp Winter
The Tor Project
Verified email at - Homepage
TitleCited byYear
How the Great Firewall of China is Blocking Tor
P Winter, S Lindskog
Free and Open Communications on the Internet (FOCI), 2012
Inductive intrusion detection in flow-based network data using one-class support vector machines
P Winter, E Hermann, M Zeilinger
New Technologies, Mobility and Security (NTMS), 2011
ScrambleSuit: A polymorphic network protocol to circumvent censorship
P Winter, T Pulls, J Fuss
Workshop on Privacy in the Electronic Society (WPES), 213-224, 2013
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
Privacy Enhancing Technologies Symposium (PETS), 304-331, 2014
Examining how the Great Firewall discovers hidden circumvention servers
R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson
Internet Measurement Conference (IMC), 445-458, 2015
Analyzing the Great Firewall of China over space and time
R Ensafi, P Winter, A Mueen, JR Crandall
Proceedings on privacy enhancing technologies (PoPETs) 2015 (1), 61-76, 2015
How China is Blocking Tor
P Winter, S Lindskog
arXiv preprint arXiv:1204.0447, 2012
On detecting abrupt changes in network entropy time series
P Winter, H Lampesberger, M Zeilinger, E Hermann
IFIP International Conference on Communications and Multimedia Security (CMS …, 2011
Identifying and Characterizing Sybils in the Tor Network.
P Winter, R Ensafi, K Loesing, N Feamster
USENIX Security Symposium, 1169-1185, 2016
The Effect of DNS on Tor's Anonymity
B Greschbach, T Pulls, LM Roberts, P Winter, N Feamster
arXiv preprint arXiv:1609.08187, 2016
Flow-based brute-force attack detection
J Vykopal, M Drašar, P Winter
Fraunhofer Research Institution AISEC, Garching near Muenchen, 41-51, 2013
An on-line learning statistical model to detect malicious web requests
H Lampesberger, P Winter, M Zeilinger, E Hermann
International Conference on Security and Privacy in Communication Systems …, 2011
Towards a censorship analyser for Tor
P Winter
Free and Open Communications on the Internet (FOCI), 2013
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
Z Liu, Y Liu, P Winter, P Mittal, YC Hu
2017 IEEE 25th International Conference on Network Protocols (ICNP), 1-10, 2017
How do tor users interact with onion services?
P Winter, A Edmundson, LM Roberts, A Dutkowska-Żuk, M Chetty, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 411-428, 2018
Global censorship detection over the RIPE Atlas network
C Anderson, P Winter, Roya
Free and Open Communications on the Internet (FOCI), 2014
The Great Firewall of China: How it blocks Tor and why it is hard to pinpoint
P Winter, JR Crandall
Login: The Usenix Magazine 37 (6), 42-50, 2012
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall
R Ensafi, P Winter, A Mueen, JR Crandall
arXiv preprint arXiv:1410.0735, 2014
Measuring and circumventing Internet censorship
P Winter
Karlstads Universitet, 2014
Global Network Interference Detection Over the {RIPE} Atlas Network
C Anderson, P Winter
4th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20