Found 190 results
In Press
Harrison, W. L., D. Andrews, and G. Allwein, "Simulation Logic", Logic and Logical Philosophy, In Press. PDF icon 12-1231-2384.pdf (281.37 KB)
Johnson, A., R. Jansen, A. D. Jaggard, J. Feigenbaum, and P. Syverson, "Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection", Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017), 2017. PDF icon 16-1231-4380.pdf (1.19 MB)
Kirby, Jr, J., J. McDermott, and G.. Campbell, Commonality and Variability Analysis for Xenon Family of Separation Virtual Machine Monitors (CVAX), , 2017. PDF icon 17-1231-2039.pdf (524.15 KB)
Fenske, E., A. Mani, A. Johnson, and M. Sherr, "Distributed Measurement with Private Set-Union Cardinality", The 24th ACM Conference on Computer and Communications Security (CCS 2017), 10/2017. PDF icon 17-1231-3131.pdf (1.16 MB)
Syverson, P., "The Once and Future Onion", Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017) , 07/2017. PDF icon 17-1231-2218.pdf (144.21 KB)
Chen, O., C. A. Meadows, and G. Trivedi, "Stealthy Protocols: Metrics and Open Problems", Proceedings of Concurrency, Security, and Puzzles, pp. 1-17, 01/2017. PDF icon 16-1231-4198.pdf (241.78 KB)
Syverson, P., and G. Boyce, "Bake in .onion for Tear-Free and Stronger Website Authentication", IEEE Security & Privacy Magazine, 2016. PDF icon 15-1231-4218.pdf (1.99 MB)
Johnson, A., R. Jansen, N. Hopper, A. Segal, and P. Syverson, "PeerFlow: Secure Load Balancing in Tor", Proceedings on Privacy Enhancing Technologies, vol. 2017, issue 2, 12/2016. PDF icon 16-1231-4353.pdf (1.1 MB)
Jansen, R., and A. Johnson, "Safely Measuring Tor", 23rd ACM Conference on Computer and Communications Security, 10/2016. PDF icon 16-1231-2651.pdf (498.4 KB)
Jaggard, A. D., A. Johnson, S. Cortes, P. Syverson, and J. Feigenbaum, "20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables Proceedings on Privacy Enhancing Technologies", Proceedings on Privacy Enhancing Technologies, vol. 1, issue 1, pp. 4-24, 04/2015. PDF icon 15-1231-0586.pdf (1.36 MB)
Juen, J., A. Johnson, A. Das, N. Borisov, and M. Caesar, "Defending Tor from Network Adversaries: A Case Study of Network Path Prediction", Proceedings on Privacy Enhancing Technologies, vol. 1, 05/2015. PDF icon 15-1231-1429.pdf (2.06 MB)
Syverson, P., and G. Boyce, "Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication", IEEE Workshop on Web 2.0 Security & Privacy, 05/2015. PDF icon 15-1231-0478.pdf (77.83 KB)
Goulet, D., A. Johnson, G. Kadianakis, and K. Loesing, "Hidden-service statistics reported by relays", NRL Technical Reports, no. 2015-04-001, 06/2015. PDF icon 15-1231-1605.pdf (131.38 KB)
Miller, A., and R. Jansen, "Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications", 8th Workshop on Cyber Security Experimentation and Test (CSET), 08/2015. PDF icon 15-1231-1593.pdf (3.24 MB)
West, N., D. Geiger, and G. Scheets, "Accelerating Software Radio on ARM: Adding NEON Support to VOLK", IEEE Radio and Wireless Symposium, 11/2014. PDF icon 14-1231-2162.pdf (1.1 MB)
Allwein, G., and W. L. Harrison, "Distributed Logics", NRL Memorandum Report, no. 9565, 2014. PDF icon 14-1231-3181.pdf (583.12 KB)
Jansen, R., A. Miller, P. Syverson, and B. Ford, "From Onions to Shallots: Rewarding Tor Relays with TEARS", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. PDF icon 14-1231-1482.pdf (425.98 KB)
Geddes, J., R. Jansen, and N. Hopper, "IMUX: Managing Tor Connections from Two to Infinity, and Beyond", Workshop on Privacy in Electronic Society (WPES), 11/2014. PDF icon 14-1231-3002.pdf (1.54 MB)
Jansen, R., J. Geddes, C. Wacek, M. Sherr, and P. Syverson, "Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport", 23rd Usenix Security Symposium, 08/2014. PDF icon 14-1231-2094.pdf (1.26 MB)
Jaggard, A. D., A. Johnson, P. Syverson, and J. Feigenbaum, "Representing Network Trust and Using it to Improve Anonymous Communication", Privacy Enhancing Technologies Symposium, 07/2014. PDF icon 14-1231-1483.pdf (1.15 MB)
Jansen, R., F. Tschorsch, A. Johnson, and B. Scheuermann, "The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network", 21st Annual Network & Distributed System Security Symposium (NDSS '14), 12/2013, 2014. PDF icon 13-1231-3743.pdf (552.48 KB)
Ghosh, M., M. Richardson, B. Ford, and R. Jansen, "A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014. PDF icon 14-1231-1559.pdf (837.86 KB)
West, N., D. Geiger, and G. Scheets, "Benchmarking GNU Radio Kernels and Multi-Processor Scheduling", New England Workshop for Software Defined Radio (NEWSDR'13), Worcester, Massachusetts , 2013. PDF icon 13-1231-0717.pdf (693.04 KB)
Jansen, R., A. Johnson, and P. Syverson, "LIRA: Lightweight Incentivized Routing for Anonymity", 20th Annual Network & Distributed System Security Symposium (NDSS '13), 2013. PDF icon Jansen etal2013.pdf (1.14 MB)
Syta, E., A. Johnson, H. Corrigan-Gibbs, S-C. Weng, D. Wolinsky, and B. Ford, "Security Analysis of Accountable Anonymous Group Communication in Dissent", Yale University Technical Report, no. YALEU/DCS/TR-1472, 2013. PDF icon 13-1231-0835.pdf (436.64 KB)