International audienceThis paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show that a few content providers inject most contents into BitTorrent and that those content providers are located in foreign data centers. We also show that an adversary can compromise the privacy of any peer in BitTorrent and identify the big downloaders that we define as the peers who subscribe to a large number of contents. Thi...
The 5th Annual Symposium on Information Assurance (ASIA '10): Academic Track of 13th Annual NYS Cybe...
The beginning of the 21st century saw a widely publicized lawsuit against Napster. This was the firs...
The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybe...
International audienceThis paper presents a set of exploits an adversary can use to continuously spy...
International audienceSome BitTorrent users are running BitTorrent on top of Tor to preserve their p...
BitTorrent piracy is at the core of fierce debates around network neutrality. Most of the legal acti...
BitTorrent piracy is at the core of fierce debates around network neutrality. Most of the legal acti...
BitTorrent continues to comprise the largest fraction of Internet traffic. While significant progres...
The 5th Annual Symposium on Information Assurance (ASIA '10): Academic Track of 13th Annual NYS Cybe...
BitTorrent continues to comprise the largest fraction of Internet traffic. While significant progres...
International audienceTor is a popular low-latency anonymity network. However, Tor does not protect ...
In this paper we conduct a large scale measurement study in order to analyse the fake content publis...
BitTorrent is a popular peer-to-peer (P2P) file-sharing protocol that utilizes a central server, kno...
In this paper we conduct a large scale measurement study in order to analyse the fake content publis...
With the Peer-to-peer (P2P) paradigm, each user shares some of his resources (e.g., storage and band...
The 5th Annual Symposium on Information Assurance (ASIA '10): Academic Track of 13th Annual NYS Cybe...
The beginning of the 21st century saw a widely publicized lawsuit against Napster. This was the firs...
The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybe...
International audienceThis paper presents a set of exploits an adversary can use to continuously spy...
International audienceSome BitTorrent users are running BitTorrent on top of Tor to preserve their p...
BitTorrent piracy is at the core of fierce debates around network neutrality. Most of the legal acti...
BitTorrent piracy is at the core of fierce debates around network neutrality. Most of the legal acti...
BitTorrent continues to comprise the largest fraction of Internet traffic. While significant progres...
The 5th Annual Symposium on Information Assurance (ASIA '10): Academic Track of 13th Annual NYS Cybe...
BitTorrent continues to comprise the largest fraction of Internet traffic. While significant progres...
International audienceTor is a popular low-latency anonymity network. However, Tor does not protect ...
In this paper we conduct a large scale measurement study in order to analyse the fake content publis...
BitTorrent is a popular peer-to-peer (P2P) file-sharing protocol that utilizes a central server, kno...
In this paper we conduct a large scale measurement study in order to analyse the fake content publis...
With the Peer-to-peer (P2P) paradigm, each user shares some of his resources (e.g., storage and band...
The 5th Annual Symposium on Information Assurance (ASIA '10): Academic Track of 13th Annual NYS Cybe...
The beginning of the 21st century saw a widely publicized lawsuit against Napster. This was the firs...
The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybe...