Recent Posts

Paper describing Bitcoin Simulation will appear at CSET 2015 [blog]

Our paper entitled “Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications” has been accepted to the 8th Workshop on Cybersecurity Experimenation and Test (CSET) 2015! It describes how we were able to run our own private Bit...

I am co-chairing WPES 2015 [blog]

I am co-chairing the 2015 Workshop on Privacy in the Electronic Society. The call for papers is currently available on the workshop website, and papers can be submitted through the submission site. Please consider submitting and join a discussion with the t...

The Sniper Attack Won the NRL Berman Award [blog]

Our paper entitled “The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network” won the 47th Annual Alan Berman Research Publication Award! This award was given by the U.S. Naval Research Laboratory on 2015-04-17 for best paper in the Inform...

Recent Publications

Safely Measuring Tor [pdf] [code]
23rd ACM Conference on Computer and Communication Security (CCS 2016)

Avoiding The Man on the Wire: Improving Tor’s Security with Trust-Aware Path Selection [arxiv]
arXiv:1511.05453v1 [cs.CR] (2015)

WPES 2015: The 14th Workshop on Privacy in the Electronic Society [pdf]
14th Workshop on Privacy in the Electronic Society (CCS 2015)
Workshop Summary

Recent Talks

Safely Measuring Tor [pptx] [pdf] [program]
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2016)
Seminar technical session, October 21, 2016

PrivCount: A Distributed System for Safely Measuring Tor [pptx] [pdf] [announcement]
Department of Computer and Information Science, University of Oregon (2016)
Invited talk, October 4, 2016

Shadow: Scalable Simulation for Systems Security Research [pptx] [pdf] [video]
David R. Cheriton School of Computer Science, University of Waterloo (2016)
Invited talk, January 20, 2016

see all posts see all publications see all talks