Rob Jansen

According to our database1, Rob Jansen authored at least 32 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Data-Explainable Website Fingerprinting with Network Simulation.
Proc. Priv. Enhancing Technol., October, 2023

2022
Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs.
Proc. Priv. Enhancing Technol., 2022

Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World.
Proceedings of the 31st USENIX Security Symposium, 2022

Co-opting Linux Processes for High-Performance Network Simulation.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

2021
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation.
Proceedings of the 30th USENIX Security Symposium, 2021

On the Accuracy of Tor Bandwidth Estimation.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

FlashFlow: A Secure Speed Test for Tor.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

2019
12th USENIX Workshop on Cyber Security Experimentation and Test (CSET '19).
login Usenix Mag., 2019

KIST: Kernel-Informed Socket Transport for Tor.
ACM Trans. Priv. Secur., 2019

Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
High Performance Tor Experimentation from the Magic of Dynamic ELFs.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

Inside Job: Applying Traffic Analysis to Measure Tor from Within.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Understanding Tor Usage with Privacy-Preserving Measurement.
Proceedings of the Internet Measurement Conference 2018, 2018

Privacy-Preserving Dynamic Learning of Tor Network Traffic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
PeerFlow: Secure Load Balancing in Tor.
Proc. Priv. Enhancing Technol., 2017

Tor's Been KIST: A Case Study of Transitioning Tor Research to Practice.
CoRR, 2017

Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Safely Measuring Tor.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications.
IACR Cryptol. ePrint Arch., 2015

WPES 2015: The 14th Workshop on Privacy in the Electronic Society.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
IMUX: Managing Tor Connections from Two to Infinity, and Beyond.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
How Low Can You Go: Balancing Performance with Anonymity in Tor.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

LIRA: Lightweight Incentivized Routing for Anonymity.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Onions for Sale: Putting Privacy on the Market.
Proceedings of the Financial Cryptography and Data Security, 2013

Users get routed: traffic correlation on tor by realistic adversaries.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Throttling Tor Bandwidth Parasites.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Methodically Modeling the Tor Network.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2010
Recruiting new tor relays with BRAIDS.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Membership-concealing overlay networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009


  Loading...