Found 6 results
Filters: Author is Jansen, Rob  [Clear All Filters]
2014
Jansen, R., F. Tschorsch, A. Johnson, and B. Scheuermann, "The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network", The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. 21st Annual Network & Distributed System Security Symposium (NDSS '14), 12/2013, 2014.
2013
Jansen, R., A. Johnson, and P. Syverson, "LIRA: Lightweight Incentivized Routing for Anonymity", 20th Annual Network & Distributed System Security Symposium (NDSS '13), 2013.
Johnson, A., C. Wacek, R. Jansen, M. Sherr, and P. Syverson, "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", 20th ACM Conference on Computer and Communications Security, 11/2013.
2012
Jansen, R., K. Bauer, N. Hopper, and R. Dingledine, "Methodically Modeling the Tor Network", Workshop on Cyber Security Experimentation and Test (CSET), 2012.
Jansen, R., and N. Hopper, "Shadow: Running Tor in a Box for Accurate and Efficient Experimentation", Symposium on Network and Distributed System Security (NDSS), 2012.
Jansen, R., P. Syverson, and N. Hopper, "Throttling Tor Bandwidth Parasites", USENIX Security Symposium, 2012.