user_image

Rob G. Jansen, PhD

Computer Scientist, Researcher, and Principal Investigator
U.S. Naval Research Laboratory, Washington, DC, USA

Presentations and Scholarly Talks

  1. A Measurement of Genuine Tor Traces for Realistic Website Fingerprinting. Conference talk, Passive and Active Measurement Conference, 2026-03-25.
  2. CellShift: RTT-Aware Trace Transduction for Real-World Website Fingerprinting. Conference talk, Network and Distributed System Security Symposium, 2026-02-25.
  3. Repositioning Real-World Website Fingerprinting on Tor with a Measurement of Genuine Tor Traces. Invited talk, Cyber Security Seminar, School of Informatics, University of Edinburgh, 2025-03-10.
  4. Repositioning Real-World Website Fingerprinting on Tor. Workshop talk, Workshop on Privacy in the Electronic Society, 2024-10-14.
  5. Data-Explainable Website Fingerprinting with Network Simulation. Conference talk, Privacy Enhancing Technologies Symposium, 2023-07-11.
  6. Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. Conference talk, USENIX Security Symposium, 2022-08-10.
  7. Co-opting Linux Processes for High-Performance Network Simulation. Conference talk, USENIX Annual Technical Conference, 2022-07-11.
  8. Toward Safer Tor Research. Keynote talk, Workshop on Ethics in Computer Security, 2022-06-10.
  9. Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. Conference talk, USENIX Security Symposium, 2021-08-13.
  10. On the Accuracy of Tor Bandwidth Estimation. Conference talk, Passive and Active Measurement Conference, 2021-03-31.
  11. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. Conference talk, USENIX Security Symposium, 2019-08-16.
  12. Privacy-Preserving Dynamic Learning of Tor Network Traffic. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2018-11-28.
  13. Privacy-Preserving Dynamic Learning of Tor Network Traffic. Conference talk, Conference on Computer and Communication Security, 2018-10-18.
  14. Shadow: Scalable and Deterministic Network Experimentation. Invited talk, Cybersecurity Experimentation of the Future Community Engagement Event, 2018-05-15.
  15. Inside Job: Applying Traffic Analysis to Measure Tor from Within. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2018-02-26.
  16. Inside Job: Applying Traffic Analysis to Measure Tor From Within. Conference talk, Network and Distributed System Security Symposium, 2018-02-21.
  17. Shadow: Real Applications, Simulated Networks. Invited talk, the Cyber Modeling and Simulation Technical Working Group, 2017-10-25.
  18. Safely Measuring Tor. Invited talk, the Department of Electrical Engineering (ESAT), KU Leuven, 2016-11-03.
  19. Safely Measuring Tor. Conference talk, Conference on Computer and Communication Security, 2016-10-27.
  20. Safely Measuring Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2016-10-21.
  21. PrivCount: A Distributed System for Safely Measuring Tor. Invited talk, Department of Computer and Information Science, University of Oregon, 2016-10-04.
  22. Shadow: Scalable Simulation for Systems Security Research. Invited talk, David R. Cheriton School of Computer Science, University of Waterloo, 2016-01-20.
  23. Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. Workshop talk, Workshop on Cyber Security Experimentation and Test, 2015-08-10.
  24. Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport. Conference talk, USENIX Security Symposium, 2014-08-20.
  25. On Traffic Analysis in Tor. Guest lecture, Department of Electrical Engineering, Princeton University, 2014-04-03.
  26. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. Conference talk, Network and Distributed System Security Symposium, 2014-02-25.
  27. Toward Understanding Congestion in Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2014-01-24.
  28. Memory-based DoS and Deanonymization Attacks on Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2013-10-11.
  29. Shadow: Simple HPC for Systems Security Research. Invited talk, Department of Computer and Information Sciences, Kansas State University, 2013-09-25.
  30. How Low Can You Go: Balancing Performance with Anonymity in Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2013-05-10.
  31. Performance Enhancements for Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2012-10-26.
  32. Throttling Tor Bandwidth Parasites. Conference talk, USENIX Security Symposium, 2012-08-09.
  33. Methodically Modeling the Tor Network. Workshop talk, Workshop on Cyber Security Experimentation and Test, 2012-08-06.
  34. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. Conference talk, Network and Distributed System Security Symposium, 2012-02-07.
  35. Throttling Tor Bandwidth Parasites. Invited talk, Network and Distributed System Security Symposium, 2012-02-06.
  36. Recruiting New Tor Relays with BRAIDS. Conference talk, Conference on Computer and Communications Security, 2010-10-06.