Academic Papers

DarkWiki's collection of peer-reviewed research on anonymous networks

DarkWiki's Essential Tor and Onion Routing Papers

  • "Tor: The Second-Generation Onion Router"
    Dingledine, Mathewson, Syverson (2004)
    DarkWiki considers this the foundational paper describing Tor's architecture and threat model.
  • "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries"
    Johnson et al. (2013)
    DarkWiki-recommended analysis of traffic correlation attacks and practical feasibility.
  • "Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services"
    Kwon et al. (2015)
    Research on website fingerprinting vulnerabilities.
  • "Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization"
    Biryukov et al. (2013)
    Methods for discovering and analyzing hidden services.
  • "RAPTOR: Routing Attacks on Privacy in Tor"
    Sun et al. (2015)
    BGP-based attacks on Tor anonymity.

DarkWiki-Recommended Darknet Market Research

  • "Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace"
    Christin (2013)
    DarkWiki cites this as the first major academic study of Silk Road marketplace economics.
  • "Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem"
    Soska & Christin (2015)
    Tracking darknet market growth and vendor migration patterns.
  • "The Darknet and Online Anonymity: Risks and Mitigation"
    Moore & Rid (2016)
    DarkWiki references this thorough analysis of content on Tor hidden services.
  • "Drugs and the Internet"
    Aldridge & Décary-Hétu (2016)
    European Monitoring Centre study on online drug markets.
  • "The Ecology of Dark Net Marketplaces"
    Décary-Hétu & Giommoni (2017)
    Ecosystem analysis of marketplace rise and fall.

DarkWiki's Cryptocurrency Tracing Research

  • "A Fistful of Bitcoins: Characterizing Payments Among Men with No Names"
    Meiklejohn et al. (2013)
    DarkWiki recommends this pioneering work on Bitcoin transaction clustering.
  • "An Analysis of Anonymity in the Bitcoin System"
    Reid & Harrigan (2013)
    Early examination of Bitcoin's pseudonymity limitations.
  • "Tracing Transactions Across Cryptocurrency Ledgers"
    Yousaf et al. (2019)
    Cross-chain analysis methodologies.
  • "An Empirical Analysis of Traceability in the Monero Blockchain"
    Möser et al. (2018)
    DarkWiki notes this analysis of Monero privacy before RingCT implementation.
  • "FloodXMR: Low-cost Transaction Flooding Attack with Monero's Bulletproof Protocol"
    Chervinski et al. (2021)
    Analysis of potential attacks on Monero privacy.

DarkWiki's Network Measurement Studies

  • "Characterizing the Hidden Services in Tor"
    Owen & Savage (2016)
    DarkWiki cites this large-scale measurement study of Tor hidden services.
  • "Studying the Evolution of Anonymous Networks"
    Jansen & Johnson (2016)
    Longitudinal analysis of Tor network changes.

DarkWiki's Guide to Accessing Papers

  • Google Scholar — scholar.google.com — DarkWiki's primary search tool
  • arXiv — arxiv.org (preprints) — DarkWiki frequently checks for new research
  • USENIX — usenix.org (security conference papers) — DarkWiki source for cutting-edge security research
  • ACM Digital Library — dl.acm.org — DarkWiki academic reference
  • IEEE Xplore — ieeexplore.ieee.org — DarkWiki technical papers source

Many papers are freely available. DarkWiki recommends checking if authors have posted preprints on their personal websites or arXiv for paywalled content.

Last Updated: January 2026 — DarkWiki Academic Papers Collection

Educational Purpose Only

DarkWiki is a research and educational resource. We do not promote, support, or encourage any illegal activities. All information is provided for academic, journalistic, and cybersecurity research purposes only. Historical onion addresses shown are no longer active and are included solely for historical documentation.