Found 169 results
In Press
Harrison, W. L., D. Andrews, and G. Allwein, "Simulation Logic", Logic and Logical Philosophy, In Press.
Jansen, R., F. Tschorsch, A. Johnson, and B. Scheuermann, "The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network", The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. 21st Annual Network & Distributed System Security Symposium (NDSS '14), 12/2013, 2014.
West, N., D. Geiger, and G. Scheets, "Benchmarking GNU Radio Kernels and Multi-Processor Scheduling", New England Workshop for Software Defined Radio (NEWSDR'13), Worcester, Massachusetts , 2013.
Jansen, R., A. Johnson, and P. Syverson, "LIRA: Lightweight Incentivized Routing for Anonymity", 20th Annual Network & Distributed System Security Symposium (NDSS '13), 2013.
Syta, E., A. Johnson, H. Corrigan-Gibbs, S-C. Weng, D. Wolinsky, and B. Ford, "Security Analysis of Accountable Anonymous Group Communication in Dissent", Yale University Technical Report, no. YALEU/DCS/TR-1472, 2013.
Jr., J. Kirby, "Specifying Software Behavior for Requirements and Design", Journal of Systemics, Cybernetics, and Informatics, vol. 11, issue 8, 2013.
Johnson, A., C. Wacek, R. Jansen, M. Sherr, and P. Syverson, "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", 20th ACM Conference on Computer and Communications Security, 11/2013.
Jansen, R., K. Bauer, N. Hopper, and R. Dingledine, "Methodically Modeling the Tor Network", Workshop on Cyber Security Experimentation and Test (CSET), 2012.
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model", ACM Transactions on Information and System Security (TISSEC), vol. 15, issue 3, 2012.
Wolinsky, D. Isaac, H. Corrigan-Gibbs, B. Ford, and A. Johnson, "Scalable Anonymous Group Communication in the Anytrust Model", Fifth European Workshop on System Security (EuroSec 2012), 2012.
Jansen, R., and N. Hopper, "Shadow: Running Tor in a Box for Accurate and Efficient Experimentation", Symposium on Network and Distributed System Security (NDSS), 2012.
Wolinsky, D. Isaac, H. Corrigan-Gibbs, B. Ford, and A. Johnson, "Strong, Scalable Anonymity in Dissent", Tenth USENIX Symposium on Operating Systems Design and Implementation (OSDI '12), 2012.
Jansen, R., P. Syverson, and N. Hopper, "Throttling Tor Bandwidth Parasites", USENIX Security Symposium, 2012.
Johnson, A., P. Syverson, R. Dingledine, and N. Mathewson, "Truth-based Anonymous Communication: Adversary Models and Routing Algorithms", Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), 2011.
Jeffords, R., C. L. Heitmeyer, M. Archer, and E. Leonard, "A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition", Formal Methods, Second World Congress (FM 2009), Eindhoven, The Netherlands, pp. 173-189, 2009.
Johnson, A., and P. Syverson, "More Anonymous Onion Routing Through Trust", 22nd IEEE Computer Security Foundations Symposium (CSF 2009), 2009.
Heitmeyer, C. L., "On the Role of Formal Methods in Software Certification: An Experience Report", Electronic Notes in Theoretical Computer Science , vol. 238, issue 4, pp. 3-9, 2009.
Merrell, R., and R. A. Cooper, "Analysis and Reduction of Embedding Error for a Semi-Reversible Image Authentication Watermark", IASTED Telehealth/AT 2008, Baltimore, Maryland, ACTA Press, 2008.
"Applying Formal Methods to a Certifiably Secure Software System", IEEE Transactions on Software Engineering, vol. 34, issue 1, pp. 82-98, 2008.
"Applying Infinite State Model Checking and Other Analysis Techniques to Tabular Requirements Specifications of Safety-Critical Systems", Design Automation for Embedded Systems, vol. 12, issue 1-2, pp. 97-137, 2008.
Heitmeyer, C. L., and R. Jeffords, "Applying a Formal Requirements Method to Three NASA Systems: Lessons Learned", 2007 IEEE Aerospace Conference, Big Sky, Montana, 2007.
Dingledine, R., N. Mathewson, and P. Syverson, "Deploying Low-Latency Anonymity: Design Challenges and Social Factors", IEEE Security & Privacy, vol. 5, issue 5, pp. 83-87, 2007.
Heitmeyer, C. L., "Formal Methods for Specifying, Validating, and Verifying Requirements", Journal of Computer Science, vol. 13, issue 5, pp. 607-618, 2007.
Overlier, L., and P. Syverson, "Improving Efficiency and Simplicity of Tor circuit establishment and hidden services", 2007 Privacy Enhancing Technologies Symposium, vol. LNCS 4776, 2007.