요약
Abstract
1. Introduction
2. Tor Basics
3. BitTorrent Protocol Overview
4. Deanonymization Schemes in BitTorrent Applications against Tor
4.1 Inspection of BitTorrent Control Message
4.2 Hijacking Tracker's Response
4.3 Exploiting the DHT
4.4 Identity Leak
5. Comparison of Existing Attacking Schemes
6. Conclusion
References