Publications

Journals
PeerFlow: Secure Load Balancing in Tor [pdf]
Proceedings on Privacy Enhancing Technologies (PoPETs 2017)
Volume 2017, Issue 2.

Conferences
Avoiding The Man on the Wire: Improving Tor’s Security with Trust-Aware Path Selection [pdf] [tech report]
24th Symposium on Network and Distributed System Security (NDSS 2017)

Safely Measuring Tor [pdf] [code]
23rd ACM Conference on Computer and Communication Security (CCS 2016)

Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport [pdf] [appendices]
23rd USENIX Security Symposium (Sec 2014)
Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network [pdf]
21st Symposium on Network and Distributed System Security (NDSS 2014)
47th Annual Alan Berman Research Publication Award, 2015-04-17 

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries [pdf]
20th Conference on Computer and Communications Security (CCS 2013)
Mentions:
  • - Building a new Tor that can resist next-generation state surveillance  [ars technica]
  • - Snoops can identify Tor users given enough time, experts say  [ars technica]
  • - Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance  [mit tech review]
  • - Boffins follow TOR breadcrumbs to identify users  [the register]
  • - Tor is Not as Safe as You May Think  [infosec magazine]
  • - Tor Is Less Anonymous Than You Think  [vice]
  • - Persistent adversaries can identify Tor users  [help net security]
  • - Anonymity-based Tor platform has security issues according to report  [irish times]
  • - Tor users easy to unmask  [heise]
  • - The anonymity of the Tor network shaken by US researchers  [developpez]
  • - Tor anonymity not guaranteed  [punto informatico]
  • - Identity Tor users yet to figure out  [computeridee]

LIRA: Lightweight Incentivized Routing for Anonymity [pdf]
20th Symposium on Network and Distributed System Security (NDSS 2013)

Throttling Tor Bandwidth Parasites [pdf] [tech report]
21st USENIX Security Symposium (Sec 2012)

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation [pdf] [tech report] [website] [code]
19th Symposium on Network and Distributed System Security (NDSS 2012)
2013 PET Award Runner Up  [announcement]

Recruiting New Tor Relays with BRAIDS [pdf]
17th Conference on Computer and Communications Security (CCS 2010)

Membership-Concealing Overlay Networks [pdf]
16th Conference on Computer and Communications Security (CCS 2009)

Workshops
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications [pdf] [code]
8th Workshop on Cyber Security Experimentation and Test (CSET 2015)

IMUX: Managing Tor Connections from Two to Infinity, and Beyond [pdf]
13th Workshop on Privacy in the Electronic Society (WPES 2014)
John Geddes, Rob Jansen, and Nick Hopper

From Onions to Shallots: Rewarding Tor Relays with TEARS [pdf]
7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014)

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays [pdf]
7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014)
Mainak Ghosh, Miles Richardson, Bryan Ford, and Rob Jansen
Mentions:
  • - How Bitcoin Tech Could Make Infamous Anonymous Tor Network More Powerful  [CoinDesk]
  • - Torcoin: New Altcoin Hopes To Incentivize People Into Running Tor Relays  [Deep.Dot.Web]
  • - TorCoin: Making Anonymity Pay  [Crypto Coins News]

How Low Can You Go: Balancing Performance with Anonymity in Tor [pdf]
13th Privacy Enhancing Technologies Symposium (PETS 2013)
John Geddes, Rob Jansen, and Nick Hopper
Andreas Pfitzmann Best Student Paper Award 

Methodically Modeling the Tor Network [pdf] [Shadow files] [ExperimenTor files]
5th Workshop on Cyber Security Experimentation and Test (CSET 2012)

Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme [pdf] [tech report]
29th Military Communications Conference (MILCOM 2010)

Posters and Abstracts
WPES 2015: The 14th Workshop on Privacy in the Electronic Society [pdf]
14th Workshop on Privacy in the Electronic Society (CCS 2015)
Workshop Summary

Onions for Sale: Putting Privacy on the Market [pdf]
17th Conference on Financial Cryptography and Data Security (FC 2013)
Poster Abstract

Throttling Tor Bandwidth Parasites [pdf] [tech report]
19th Symposium on Network and Distributed System Security (NDSS 2012)
Chair’s Invited Session

Other Technical Reports
Privacy Preserving Performance Enhancements for Anonymous Communication Systems [pdf]
University of Minnesota Ph.D. Dissertation (2012)

On PAR for Attack [pdf]
Class Project (2009)
Chris Arnold, Rob Jansen, Zi Lin, and James Parker

A Priori Trust Vulnerabilities in EigenTrust [pdf]
Class Project (2008)
Rob Jansen, Ted Kaminski, Fedor Korsakov, Alexander Saint Croix, and Daniel Selifonov