Found 183 results
In Press
Harrison, W. L., D. Andrews, and G. Allwein, "Simulation Logic", Logic and Logical Philosophy, In Press. PDF icon 12-1231-2384.pdf (281.37 KB)
2016
Syverson, P., and G. Boyce, "Bake in .onion for Tear-Free and Stronger Website Authentication", IEEE Security & Privacy Magazine, 2016. PDF icon 15-1231-4218.pdf (1.99 MB)
Jansen, R., and A. Johnson, "Safely Measuring Tor", 23rd ACM Conference on Computer and Communications Security, 10/2016. PDF icon 16-1231-2651.pdf (498.4 KB)
2015
Jaggard, A. D., A. Johnson, S. Cortes, P. Syverson, and J. Feigenbaum, "20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables Proceedings on Privacy Enhancing Technologies", Proceedings on Privacy Enhancing Technologies, vol. 1, issue 1, pp. 4-24, 04/2015. PDF icon 15-1231-0586.pdf (1.36 MB)
Juen, J., A. Johnson, A. Das, N. Borisov, and M. Caesar, "Defending Tor from Network Adversaries: A Case Study of Network Path Prediction", Proceedings on Privacy Enhancing Technologies, vol. 1, 05/2015. PDF icon 15-1231-1429.pdf (2.06 MB)
Syverson, P., and G. Boyce, "Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication", IEEE Workshop on Web 2.0 Security & Privacy, 05/2015. PDF icon 15-1231-0478.pdf (77.83 KB)
Goulet, D., A. Johnson, G. Kadianakis, and K. Loesing, "Hidden-service statistics reported by relays", NRL Technical Reports, no. 2015-04-001, 06/2015. PDF icon 15-1231-1605.pdf (131.38 KB)
Miller, A., and R. Jansen, "Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications", 8th Workshop on Cyber Security Experimentation and Test (CSET), 08/2015. PDF icon 15-1231-1593.pdf (3.24 MB)
2014
West, N., D. Geiger, and G. Scheets, "Accelerating Software Radio on ARM: Adding NEON Support to VOLK", IEEE Radio and Wireless Symposium, 11/2014. PDF icon 14-1231-2162.pdf (1.1 MB)
Allwein, G., and W. L. Harrison, "Distributed Logics", NRL Memorandum Report, no. 9565, 2014. PDF icon 14-1231-3181.pdf (583.12 KB)
Jansen, R., A. Miller, P. Syverson, and B. Ford, "From Onions to Shallots: Rewarding Tor Relays with TEARS", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. PDF icon 14-1231-1482.pdf (425.98 KB)
Geddes, J., R. Jansen, and N. Hopper, "IMUX: Managing Tor Connections from Two to Infinity, and Beyond", Workshop on Privacy in Electronic Society (WPES), 11/2014. PDF icon 14-1231-3002.pdf (1.54 MB)
Jansen, R., J. Geddes, C. Wacek, M. Sherr, and P. Syverson, "Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport", 23rd Usenix Security Symposium, 08/2014. PDF icon 14-1231-2094.pdf (1.26 MB)
Jaggard, A. D., A. Johnson, P. Syverson, and J. Feigenbaum, "Representing Network Trust and Using it to Improve Anonymous Communication", Privacy Enhancing Technologies Symposium, 07/2014. PDF icon 14-1231-1483.pdf (1.15 MB)
Jansen, R., F. Tschorsch, A. Johnson, and B. Scheuermann, "The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network", 21st Annual Network & Distributed System Security Symposium (NDSS '14), 12/2013, 2014. PDF icon 13-1231-3743.pdf (552.48 KB)
Ghosh, M., M. Richardson, B. Ford, and R. Jansen, "A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. PDF icon 14-1231-1559.pdf (837.86 KB)
2013
West, N., D. Geiger, and G. Scheets, "Benchmarking GNU Radio Kernels and Multi-Processor Scheduling", New England Workshop for Software Defined Radio (NEWSDR'13), Worcester, Massachusetts , 2013. PDF icon 13-1231-0717.pdf (693.04 KB)
Jansen, R., A. Johnson, and P. Syverson, "LIRA: Lightweight Incentivized Routing for Anonymity", 20th Annual Network & Distributed System Security Symposium (NDSS '13), 2013. PDF icon Jansen etal2013.pdf (1.14 MB)
Syta, E., A. Johnson, H. Corrigan-Gibbs, S-C. Weng, D. Wolinsky, and B. Ford, "Security Analysis of Accountable Anonymous Group Communication in Dissent", Yale University Technical Report, no. YALEU/DCS/TR-1472, 2013. PDF icon 13-1231-0835.pdf (436.64 KB)
Jr., J. Kirby, "Specifying Software Behavior for Requirements and Design", Journal of Systemics, Cybernetics, and Informatics, vol. 11, issue 8, 2013. PDF icon 13-1231-2853.pdf (108.65 KB)
Johnson, A., C. Wacek, R. Jansen, M. Sherr, and P. Syverson, "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", 20th ACM Conference on Computer and Communications Security, 11/2013. PDF icon 13-1231-2077.pdf (2.99 MB)
2012
Jansen, R., K. Bauer, N. Hopper, and R. Dingledine, "Methodically Modeling the Tor Network", Workshop on Cyber Security Experimentation and Test (CSET), 2012. PDF icon 12-1231-2496.pdf (598.31 KB)
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model", ACM Transactions on Information and System Security (TISSEC), vol. 15, issue 3, 2012. PDF icon Feigenbaum etal2012.pdf (363.26 KB)
Wolinsky, D. Isaac, H. Corrigan-Gibbs, B. Ford, and A. Johnson, "Scalable Anonymous Group Communication in the Anytrust Model", Fifth European Workshop on System Security (EuroSec 2012), 2012. PDF icon Wolinsky etal2012b.pdf (280.01 KB)
Jansen, R., and N. Hopper, "Shadow: Running Tor in a Box for Accurate and Efficient Experimentation", Symposium on Network and Distributed System Security (NDSS), 2012. PDF icon 11-1226-3413.pdf (1.13 MB)

Pages