Follow
Ivan Pustogarov
Ivan Pustogarov
Research Fellow, Computer Science, University of Toronto
Verified email at utoronto.ca
Title
Cited by
Cited by
Year
Deanonymisation of clients in Bitcoin P2P network
A Biryukov, D Khovratovich, I Pustogarov
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
7672014
Trawling for tor hidden services: Detection, measurement, deanonymization
A Biryukov, I Pustogarov, RP Weinmann
2013 IEEE Symposium on Security and Privacy, 80-94, 2013
3042013
Bitcoin over Tor isn't a good idea
A Biryukov, I Pustogarov
2015 IEEE Symposium on Security and Privacy, 122-134, 2015
2632015
Content and popularity analysis of Tor hidden services
A Biryukov, I Pustogarov, F Thill, RP Weinmann
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
1862014
Proof-of-work as anonymous micropayment: Rewarding a Tor relay
A Biryukov, I Pustogarov
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
422015
Towards better understanding of bitcoin unreachable peers
L Wang, I Pustogarov
arXiv preprint arXiv:1709.06837, 2017
292017
Ex-vivo dynamic analysis framework for Android device drivers
I Pustogarov, Q Wu, D Lie
2020 IEEE Symposium on Security and Privacy (SP), 1088-1105, 2020
252020
IEEE 802.11 direct links: Interference classification and modeling
A Lyakhov, I Pustogarov, A Gudilov
Selected Lectures on Multiple Access and Queueing Systems. Revised Selected …, 2008
232008
Using program analysis to synthesize sensor spoofing attacks
I Pustogarov, T Ristenpart, V Shmatikov
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
222017
University of Luxembourg
A Biryukov, I Pustogarov
Jan 19, 5, 2016
182016
Starvation effect study in IEEE 802.11 mesh networks
A Lyakhov, I Pustogarov, A Safonov, M Yakimov
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
142009
TorScan: Tracing long-lived connections and differential scanning attacks
A Biryukov, I Pustogarov, RP Weinmann
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
132012
Deanonymisation techniques for Tor and Bitcoin
I Pustogarov
University of Luxembourg, Luxembourg, Luxembourg, 2015
62015
Direct links in IEEE 802.11: Analytical study of unfairness problem
A Lyakhov, I Pustogarov, A Gudilov
Automation and Remote Control 69 (9), 1630-1645, 2008
52008
Intra-flow interference study in IEEE 802.11 s mesh networks
A Lyakhov, I Pustogarov
Multiple Access Communications: Third International Workshop, MACOM 2010 …, 2010
42010
Using inputs and context to verify user intentions in internet services
H Shuang, W Huang, P Bettadpur, L Zhao, I Pustogarov, D Lie
Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, 76-83, 2019
32019
TorScan: Deanonymizing connections using topology leaks
A Biryukov, I Pustogarov, RP Weinmann
ERCIM News, 2012
12012
FLexible Architecture for Virtualizable wireless future Internet Access
T Task, I Tinnirello, P Gallo, P Loreti, D Garlisi, C Pisa, Y Weizman, ...
The system can't perform the operation now. Try again later.
Articles 1–18