Paper describing Bitcoin Simulation will appear at CSET 2015
Our paper entitled “Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications” has been accepted to the 8th Workshop on Cybersecurity Experimenation and Test (CSET) 2015! It describes how we were able to run our own private Bit...
I am co-chairing WPES 2015
I am co-chairing the 2015 Workshop on Privacy in the Electronic Society. The call for papers is currently available on the workshop website, and papers can be submitted through the submission site. Please consider submitting and join a discussion with the t...
The Sniper Attack Won the NRL Berman Award
Our paper entitled “The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network” won the
47th Annual Alan Berman Research Publication Award! This award was given by the U.S. Naval Research Laboratory on 2015-04-17 for best paper in the Inform...
23rd ACM Conference on Computer and Communication Security (CCS 2016)
Avoiding The Man on the Wire: Improving Tor’s Security with Trust-Aware Path Selection
arXiv:1511.05453v1 [cs.CR] (2015)
WPES 2015: The 14th Workshop on Privacy in the Electronic Society
14th Workshop on Privacy in the Electronic Society (CCS 2015)
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2016)
Seminar technical session, October 21, 2016
Department of Computer and Information Science, University of Oregon (2016)
Invited talk, October 4, 2016
see all posts
see all publications
see all talks
Shadow: Scalable Simulation for Systems Security Research
David R. Cheriton School of Computer Science, University of Waterloo (2016)
Invited talk, January 20, 2016