user_image

Rob G. Jansen, PhD

Computer Scientist, Researcher, and Principal Investigator
U.S. Naval Research Laboratory, Washington, DC, USA

Presentations and Scholarly Talks

  1. Data-Explainable Website Fingerprinting with Network Simulation. Conference talk, Privacy Enhancing Technologies Symposium, 2023-07-11.
  2. Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. Conference talk, USENIX Security Symposium, 2022-08-10.
  3. Co-opting Linux Processes for High-Performance Network Simulation. Conference talk, USENIX Annual Technical Conference, 2022-07-11.
  4. Toward Safer Tor Research. Keynote talk, Workshop on Ethics in Computer Security, 2022-06-10.
  5. Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. Conference talk, USENIX Security Symposium, 2021-08-13.
  6. On the Accuracy of Tor Bandwidth Estimation. Conference talk, Passive and Active Measurement Conference, 2021-03-31.
  7. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. Conference talk, USENIX Security Symposium, 2019-08-16.
  8. Privacy-Preserving Dynamic Learning of Tor Network Traffic. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2018-11-28.
  9. Privacy-Preserving Dynamic Learning of Tor Network Traffic. Conference talk, Conference on Computer and Communication Security, 2018-10-18.
  10. Shadow: Scalable and Deterministic Network Experimentation. Invited talk, Cybersecurity Experimentation of the Future Community Engagement Event, 2018-05-15.
  11. Inside Job: Applying Traffic Analysis to Measure Tor from Within. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2018-02-26.
  12. Inside Job: Applying Traffic Analysis to Measure Tor From Within. Conference talk, Network and Distributed System Security Symposium, 2018-02-21.
  13. Shadow: Real Applications, Simulated Networks. Invited talk, the Cyber Modeling and Simulation Technical Working Group, 2017-10-25.
  14. Safely Measuring Tor. Invited talk, the Department of Electrical Engineering (ESAT), KU Leuven, 2016-11-03.
  15. Safely Measuring Tor. Conference talk, Conference on Computer and Communication Security, 2016-10-27.
  16. Safely Measuring Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2016-10-21.
  17. PrivCount: A Distributed System for Safely Measuring Tor. Invited talk, Department of Computer and Information Science, University of Oregon, 2016-10-04.
  18. Shadow: Scalable Simulation for Systems Security Research. Invited talk, David R. Cheriton School of Computer Science, University of Waterloo, 2016-01-20.
  19. Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. Workshop talk, Workshop on Cyber Security Experimentation and Test, 2015-08-10.
  20. Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport. Conference talk, USENIX Security Symposium, 2014-08-20.
  21. On Traffic Analysis in Tor. Guest lecture, Department of Electrical Engineering, Princeton University, 2014-04-03.
  22. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. Conference talk, Network and Distributed System Security Symposium, 2014-02-25.
  23. Toward Understanding Congestion in Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2014-01-24.
  24. Memory-based DoS and Deanonymization Attacks on Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2013-10-11.
  25. Shadow: Simple HPC for Systems Security Research. Invited talk, Department of Computer and Information Sciences, Kansas State University, 2013-09-25.
  26. How Low Can You Go: Balancing Performance with Anonymity in Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2013-05-10.
  27. Performance Enhancements for Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2012-10-26.
  28. Throttling Tor Bandwidth Parasites. Conference talk, USENIX Security Symposium, 2012-08-09.
  29. Methodically Modeling the Tor Network. Workshop talk, Workshop on Cyber Security Experimentation and Test, 2012-08-06.
  30. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. Conference talk, Network and Distributed System Security Symposium, 2012-02-07.
  31. Throttling Tor Bandwidth Parasites. Invited talk, Network and Distributed System Security Symposium, 2012-02-06.
  32. Recruiting New Tor Relays with BRAIDS. Conference talk, Conference on Computer and Communications Security, 2010-10-06.