Found 189 results
2013
Johnson, A., C. Wacek, R. Jansen, M. Sherr, and P. Syverson, "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries", 20th ACM Conference on Computer and Communications Security, 11/2013. PDF icon 13-1231-2077.pdf (2.99 MB)
2012
Jansen, R., K. Bauer, N. Hopper, and R. Dingledine, "Methodically Modeling the Tor Network", Workshop on Cyber Security Experimentation and Test (CSET), 2012. PDF icon 12-1231-2496.pdf (598.31 KB)
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model", ACM Transactions on Information and System Security (TISSEC), vol. 15, issue 3, 2012. PDF icon Feigenbaum etal2012.pdf (363.26 KB)
Wolinsky, D. Isaac, H. Corrigan-Gibbs, B. Ford, and A. Johnson, "Scalable Anonymous Group Communication in the Anytrust Model", Fifth European Workshop on System Security (EuroSec 2012), 2012. PDF icon Wolinsky etal2012b.pdf (280.01 KB)
Jansen, R., and N. Hopper, "Shadow: Running Tor in a Box for Accurate and Efficient Experimentation", Symposium on Network and Distributed System Security (NDSS), 2012. PDF icon 11-1226-3413.pdf (1.13 MB)
Wolinsky, D. Isaac, H. Corrigan-Gibbs, B. Ford, and A. Johnson, "Strong, Scalable Anonymity in Dissent", Tenth USENIX Symposium on Operating Systems Design and Implementation (OSDI '12), 2012. PDF icon Wolinsky etal2012.pdf (898.57 KB)
Jansen, R., P. Syverson, and N. Hopper, "Throttling Tor Bandwidth Parasites", USENIX Security Symposium, 2012. PDF icon 12-1231-2049.pdf (1.13 MB)
2011
Syverson, P., "Sleeping dogs lie on a bed of onions but wake when mixed", 4th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2011) , 2011. PDF icon 11-1226-2030.pdf (193.09 KB)
Johnson, A., P. Syverson, R. Dingledine, and N. Mathewson, "Trust-based Anonymous Communication: Adversary Models and Routing Algorithms", Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), 2011. PDF icon Johnson etal2011.pdf (320.76 KB)
2009
Jeffords, R., C. L. Heitmeyer, M. Archer, and E. Leonard, "A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition", Formal Methods, Second World Congress (FM 2009), Eindhoven, The Netherlands, pp. 173-189, 2009. PDF icon Jeffords etal2009.pdf (144.97 KB)
Johnson, A., and P. Syverson, "More Anonymous Onion Routing Through Trust", 22nd IEEE Computer Security Foundations Symposium (CSF 2009), 2009. PDF icon Johnson etal2009.pdf (197.77 KB)
Heitmeyer, C. L., "On the Role of Formal Methods in Software Certification: An Experience Report", Electronic Notes in Theoretical Computer Science , vol. 238, issue 4, pp. 3-9, 2009. PDF icon Heitmeyer2009.pdf (189.1 KB)
2008
Merrell, R., and R. A. Cooper, "Analysis and Reduction of Embedding Error for a Semi-Reversible Image Authentication Watermark", IASTED Telehealth/AT 2008, Baltimore, Maryland, ACTA Press, 2008.
"Applying Formal Methods to a Certifiably Secure Software System", IEEE Transactions on Software Engineering, vol. 34, issue 1, pp. 82-98, 2008.
"Applying Infinite State Model Checking and Other Analysis Techniques to Tabular Requirements Specifications of Safety-Critical Systems", Design Automation for Embedded Systems, vol. 12, issue 1-2, pp. 97-137, 2008.
2007
Heitmeyer, C. L., and R. Jeffords, "Applying a Formal Requirements Method to Three NASA Systems: Lessons Learned", 2007 IEEE Aerospace Conference, Big Sky, Montana, 2007. PDF icon HeitmeyerJeffords2007.pdf (616.1 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Deploying Low-Latency Anonymity: Design Challenges and Social Factors", IEEE Security & Privacy, vol. 5, issue 5, pp. 83-87, 2007. PDF icon Dingledine etal2007.pdf (71.26 KB)
Heitmeyer, C. L., "Formal Methods for Specifying, Validating, and Verifying Requirements", Journal of Computer Science, vol. 13, issue 5, pp. 607-618, 2007. PDF icon Heitmeyer2007.pdf (466.65 KB)
Overlier, L., and P. Syverson, "Improving Efficiency and Simplicity of Tor circuit establishment and hidden services", 2007 Privacy Enhancing Technologies Symposium, vol. LNCS 4776, 2007. PDF icon OverlierSyverson2007.pdf (619.35 KB)
Feigenbaum, J., A. Johnson, and P. Syverson, "A Model of Onion Routing with Provable Anonymity", Financial Cryptography and Data Security, 11th International Conference, FC 2007, 2007. PDF icon Feigenbaum etal2007b.pdf (224.34 KB)
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model [Extended Abstract]", WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society: ACM Press, pp. 1-10, 2007. PDF icon Feigenbaum etal2007.pdf (228.68 KB)
Heitmeyer, C. L., R. Jeffords, R. Bharadwaj, and M. Archer, "RE Theory Meets Software Practice: Lessons from the Software Development Trenches", 15th IEEE International Requirements Engineering Conference, New Delhi, India, pp. 265-268, 2007. PDF icon Heitmeyer etal2007.pdf (521.34 KB)
Kirby, Jr, J., A Unified Specification of Behavior for Requirements and Design, , no. NRL/MR/5540--007-9094, Washington, D.C., Naval Research Laboratory, 2007. PDF icon Kirby2007.pdf (1018.32 KB)
2006
Bultan, T., and C. L. Heitmeyer, "Analyzing Tabular Requirements Specifications Using Infinite State Model Checking", Fourth ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'06), Napa, California, 2006. PDF icon BultanHeitmeyer2006.pdf (163.42 KB)

Pages