Found 187 results
"Simulation Logic", Logic and Logical Philosophy, In Press.
"Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection", Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017), 2017.
Commonality and Variability Analysis for Xenon Family of Separation Virtual Machine Monitors (CVAX), , 2017.
"Stealthy Protocols: Metrics and Open Problems", Proceedings of Concurrency, Security, and Puzzles, pp. 1-17, 01/2017.
"Bake in .onion for Tear-Free and Stronger Website Authentication", IEEE Security & Privacy Magazine, 2016.
"PeerFlow: Secure Load Balancing in Tor", Proceedings on Privacy Enhancing Technologies, vol. 2017, issue 2, 12/2016.
"Safely Measuring Tor", 23rd ACM Conference on Computer and Communications Security, 10/2016.
"20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables Proceedings on Privacy Enhancing Technologies", Proceedings on Privacy Enhancing Technologies, vol. 1, issue 1, pp. 4-24, 04/2015.
"Defending Tor from Network Adversaries: A Case Study of Network Path Prediction", Proceedings on Privacy Enhancing Technologies, vol. 1, 05/2015.
"Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication", IEEE Workshop on Web 2.0 Security & Privacy, 05/2015.
"Hidden-service statistics reported by relays", NRL Technical Reports, no. 2015-04-001, 06/2015.
"Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications", 8th Workshop on Cyber Security Experimentation and Test (CSET), 08/2015.
"Accelerating Software Radio on ARM: Adding NEON Support to VOLK", IEEE Radio and Wireless Symposium, 11/2014.
"Distributed Logics", NRL Memorandum Report, no. 9565, 2014.
"From Onions to Shallots: Rewarding Tor Relays with TEARS", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
"IMUX: Managing Tor Connections from Two to Infinity, and Beyond", Workshop on Privacy in Electronic Society (WPES), 11/2014.
"Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport", 23rd Usenix Security Symposium, 08/2014.
"Representing Network Trust and Using it to Improve Anonymous Communication", Privacy Enhancing Technologies Symposium, 07/2014.
"The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network", 21st Annual Network & Distributed System Security Symposium (NDSS '14), 12/2013, 2014.
"A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
"Benchmarking GNU Radio Kernels and Multi-Processor Scheduling", New England Workshop for Software Defined Radio (NEWSDR'13), Worcester, Massachusetts , 2013.
"LIRA: Lightweight Incentivized Routing for Anonymity", 20th Annual Network & Distributed System Security Symposium (NDSS '13), 2013.
"Security Analysis of Accountable Anonymous Group Communication in Dissent", Yale University Technical Report, no. YALEU/DCS/TR-1472, 2013.
"Specifying Software Behavior for Requirements and Design", Journal of Systemics, Cybernetics, and Informatics, vol. 11, issue 8, 2013.
"Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", 20th ACM Conference on Computer and Communications Security, 11/2013.