Found 193 results
In Press
Harrison, W. L., D. Andrews, and G. Allwein, "Simulation Logic", Logic and Logical Philosophy, In Press. PDF icon 12-1231-2384.pdf (281.37 KB)
2017
Harrison, A., A. Raglin, M. Livingston, D. Brock, Jr., J. Decker, D. Perzanowski, C. Van Dolson, J. Mathews, and A. Lulush, "The Analysis and Prediction of Eye Gaze When Viewing Statistical Graphs", International Conference on Augmented Cognition, Vancouver, Canada, Springer, pp. 148-165, 05/2017.
Johnson, A., R. Jansen, A. D. Jaggard, J. Feigenbaum, and P. Syverson, "Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection", Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017), 2017. PDF icon 16-1231-4380.pdf (1.19 MB)
Macklin, T., and J. Mathews, "Big Data, Little Security: Addressing Security Issues in your Platform", SPIE Proceedings, Next-Generation Analyst V, Anaheim, California, SPIE Defense + Security, pp. 1-10, 05/2017. PDF icon Macklin et al.pdf (4.14 MB)
Kirby, Jr, J., J. McDermott, and G.. Campbell, Commonality and Variability Analysis for Xenon Family of Separation Virtual Machine Monitors (CVAX), , 2017. PDF icon 17-1231-2039.pdf (524.15 KB)
Fenske, E., A. Mani, A. Johnson, and M. Sherr, "Distributed Measurement with Private Set-Union Cardinality", The 24th ACM Conference on Computer and Communications Security (CCS 2017), 10/2017. PDF icon 17-1231-3131.pdf (1.16 MB)
Wehner, G., J. Rowell, J. Langley, and J. Mathews, "Federated Cybersecurity Policy Arbitration", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience, Munich, Germany, International Journal of Security and Networks, pp. 83-85, 10/2017. PDF icon Wehner et al.pdf (525.18 KB)
Syverson, P., "The Once and Future Onion", Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017) , 07/2017. PDF icon 17-1231-2218.pdf (144.21 KB)
Chen, O., C. A. Meadows, and G. Trivedi, "Stealthy Protocols: Metrics and Open Problems", Proceedings of Concurrency, Security, and Puzzles, pp. 1-17, 01/2017. PDF icon 16-1231-4198.pdf (241.78 KB)
2016
Syverson, P., and G. Boyce, "Bake in .onion for Tear-Free and Stronger Website Authentication", IEEE Security & Privacy Magazine, 2016. PDF icon 15-1231-4218.pdf (1.99 MB)
Johnson, A., R. Jansen, N. Hopper, A. Segal, and P. Syverson, "PeerFlow: Secure Load Balancing in Tor", Proceedings on Privacy Enhancing Technologies, vol. 2017, issue 2, 12/2016. PDF icon 16-1231-4353.pdf (1.1 MB)
Jansen, R., and A. Johnson, "Safely Measuring Tor", 23rd ACM Conference on Computer and Communications Security, 10/2016. PDF icon 16-1231-2651.pdf (498.4 KB)
2015
Jaggard, A. D., A. Johnson, S. Cortes, P. Syverson, and J. Feigenbaum, "20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables Proceedings on Privacy Enhancing Technologies", Proceedings on Privacy Enhancing Technologies, vol. 1, issue 1, pp. 4-24, 04/2015. PDF icon 15-1231-0586.pdf (1.36 MB)
Juen, J., A. Johnson, A. Das, N. Borisov, and M. Caesar, "Defending Tor from Network Adversaries: A Case Study of Network Path Prediction", Proceedings on Privacy Enhancing Technologies, vol. 1, 05/2015. PDF icon 15-1231-1429.pdf (2.06 MB)
Syverson, P., and G. Boyce, "Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication", IEEE Workshop on Web 2.0 Security & Privacy, 05/2015. PDF icon 15-1231-0478.pdf (77.83 KB)
Goulet, D., A. Johnson, G. Kadianakis, and K. Loesing, "Hidden-service statistics reported by relays", NRL Technical Reports, no. 2015-04-001, 06/2015. PDF icon 15-1231-1605.pdf (131.38 KB)
Miller, A., and R. Jansen, "Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications", 8th Workshop on Cyber Security Experimentation and Test (CSET), 08/2015. PDF icon 15-1231-1593.pdf (3.24 MB)
2014
West, N., D. Geiger, and G. Scheets, "Accelerating Software Radio on ARM: Adding NEON Support to VOLK", IEEE Radio and Wireless Symposium, 11/2014. PDF icon 14-1231-2162.pdf (1.1 MB)
Allwein, G., and W. L. Harrison, "Distributed Logics", NRL Memorandum Report, no. 9565, 2014. PDF icon 14-1231-3181.pdf (583.12 KB)
Jansen, R., A. Miller, P. Syverson, and B. Ford, "From Onions to Shallots: Rewarding Tor Relays with TEARS", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. PDF icon 14-1231-1482.pdf (425.98 KB)
Geddes, J., R. Jansen, and N. Hopper, "IMUX: Managing Tor Connections from Two to Infinity, and Beyond", Workshop on Privacy in Electronic Society (WPES), 11/2014. PDF icon 14-1231-3002.pdf (1.54 MB)
Jansen, R., J. Geddes, C. Wacek, M. Sherr, and P. Syverson, "Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport", 23rd Usenix Security Symposium, 08/2014. PDF icon 14-1231-2094.pdf (1.26 MB)
Jaggard, A. D., A. Johnson, P. Syverson, and J. Feigenbaum, "Representing Network Trust and Using it to Improve Anonymous Communication", Privacy Enhancing Technologies Symposium, 07/2014. PDF icon 14-1231-1483.pdf (1.15 MB)
Jansen, R., F. Tschorsch, A. Johnson, and B. Scheuermann, "The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network", 21st Annual Network & Distributed System Security Symposium (NDSS '14), 12/2013, 2014. PDF icon 13-1231-3743.pdf (552.48 KB)
Ghosh, M., M. Richardson, B. Ford, and R. Jansen, "A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. PDF icon 14-1231-1559.pdf (837.86 KB)

Pages