Seguir
Ivan Pustogarov
Ivan Pustogarov
Research Fellow, Computer Science, University of Toronto
Dirección de correo verificada de utoronto.ca
Título
Citado por
Citado por
Año
Deanonymisation of clients in Bitcoin P2P network
A Biryukov, D Khovratovich, I Pustogarov
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
7732014
Trawling for tor hidden services: Detection, measurement, deanonymization
A Biryukov, I Pustogarov, RP Weinmann
2013 IEEE Symposium on Security and Privacy, 80-94, 2013
3082013
Bitcoin over Tor isn't a good idea
A Biryukov, I Pustogarov
2015 IEEE Symposium on Security and Privacy, 122-134, 2015
2672015
Content and popularity analysis of Tor hidden services
A Biryukov, I Pustogarov, F Thill, RP Weinmann
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
1902014
Proof-of-work as anonymous micropayment: Rewarding a Tor relay
A Biryukov, I Pustogarov
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
432015
Towards better understanding of bitcoin unreachable peers
L Wang, I Pustogarov
arXiv preprint arXiv:1709.06837, 2017
292017
Ex-vivo dynamic analysis framework for Android device drivers
I Pustogarov, Q Wu, D Lie
2020 IEEE Symposium on Security and Privacy (SP), 1088-1105, 2020
272020
IEEE 802.11 direct links: Interference classification and modeling
A Lyakhov, I Pustogarov, A Gudilov
Selected Lectures on Multiple Access and Queueing Systems. Revised Selected …, 2008
232008
Using program analysis to synthesize sensor spoofing attacks
I Pustogarov, T Ristenpart, V Shmatikov
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
222017
University of Luxembourg
A Biryukov, I Pustogarov
Jan 19, 5, 2016
182016
Starvation effect study in IEEE 802.11 mesh networks
A Lyakhov, I Pustogarov, A Safonov, M Yakimov
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
142009
TorScan: Tracing long-lived connections and differential scanning attacks
A Biryukov, I Pustogarov, RP Weinmann
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
132012
Deanonymisation techniques for Tor and Bitcoin
I Pustogarov
University of Luxembourg,​ Luxembourg,​​ Luxembourg, 2015
72015
Direct links in IEEE 802.11: Analytical study of unfairness problem
A Lyakhov, I Pustogarov, A Gudilov
Automation and Remote Control 69 (9), 1630-1645, 2008
52008
Intra-flow interference study in IEEE 802.11 s mesh networks
A Lyakhov, I Pustogarov
Multiple Access Communications: Third International Workshop, MACOM 2010 …, 2010
42010
Using inputs and context to verify user intentions in internet services
H Shuang, W Huang, P Bettadpur, L Zhao, I Pustogarov, D Lie
Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, 76-83, 2019
32019
TorScan: Deanonymizing connections using topology leaks
A Biryukov, I Pustogarov, RP Weinmann
ERCIM News, 2012
12012
FLexible Architecture for Virtualizable wireless future Internet Access
T Task, I Tinnirello, P Gallo, P Loreti, D Garlisi, C Pisa, Y Weizman, ...
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–18