Talks

Conference, Workshop, Seminar, and Invited Talks
Safely Measuring Tor [pptx] [pdf] [announcement]
Department of Electrical Engineering (ESAT), KU Leuven (2016)
Invited talk, November 3, 2016

Safely Measuring Tor [pptx] [pdf] [video] [program]
23rd ACM Conference on Computer and Communication Security (CCS 2016)
Conference technical session, October 27, 2016

Safely Measuring Tor [pptx] [pdf] [program]
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2016)
Seminar technical session, October 21, 2016

PrivCount: A Distributed System for Safely Measuring Tor [pptx] [pdf] [announcement]
Department of Computer and Information Science, University of Oregon (2016)
Invited talk, October 4, 2016

Shadow: Scalable Simulation for Systems Security Research [pptx] [pdf] [video]
David R. Cheriton School of Computer Science, University of Waterloo (2016)
Invited talk, January 20, 2016

Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications [pptx] [pdf] [git-viz] [audio/video]
8th Workshop on Cyber Security Experimentation and Test (CSET 2015)
Conference technical session, August 10, 2015

Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport [pptx] [pdf] [teaser] [audio/video]
23rd USENIX Security Symposium (Sec 2014)
Conference technical session, August 20, 2014

On Traffic Analysis in Tor [pptx] [pdf]
Department of Electrical Engineering, Princeton University (2014)
Guest lecture, April 3, 2014

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network [pptx] [pdf]
21st Symposium on Network and Distributed System Security (NDSS 2014)
Conference technical session, February 25, 2014

Toward Understanding Congestion in Tor [pptx] [pdf]
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2014)
Seminar technical session, January 24, 2014

Memory-based DoS and Deanonymization Attacks on Tor [pptx] [pdf]
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2013)
Seminar technical session, October 11, 2013

Shadow: Simple HPC for Systems Security Research [pptx] [pdf]
Department of Computer and Information Sciences, Kansas State University (2013)
Invited talk, September 25, 2013

How Low Can You Go: Balancing Performance with Anonymity in Tor [pptx] [pdf]
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2013)
Seminar technical session, May 10, 2013

Performance Enhancements for Tor [odp]
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2012)
Seminar technical session, October 26, 2012

Throttling Tor Bandwidth Parasites [odp] [audio/video]
21st USENIX Security Symposium (Sec 2012)
Conference technical session, August 9, 2012

Methodically Modeling the Tor Network [odp]
5th Workshop on Cyber Security Experimentation and Test (CSET 2012)
Workshop technical session, August 6, 2012

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation [odp] [screencast]
19th Symposium on Network and Distributed System Security (NDSS 2012)
Conference technical session, February 7, 2012

Throttling Tor Bandwidth Parasites [odp] [screencast]
19th Symposium on Network and Distributed System Security (NDSS 2012)
Chair’s invited session, February 6, 2012

Recruiting New Tor Relays with BRAIDS [odp]
17th Conference on Computer and Communications Security (CCS 2010)
Conference technical session, October 6, 2010