user_image

Rob G. Jansen, PhD

Computer Scientist, Researcher, and Principal Investigator
U.S. Naval Research Laboratory, Washington, DC, USA

Presentations and Scholarly Talks

  1. Repositioning Real-World Website Fingerprinting on Tor with a Measurement of Genuine Tor Traces. Invited talk, Cyber Security Seminar, School of Informatics, University of Edinburgh, 2025-03-10.
  2. Repositioning Real-World Website Fingerprinting on Tor. Workshop talk, Workshop on Privacy in the Electronic Society, 2024-10-14.
  3. Data-Explainable Website Fingerprinting with Network Simulation. Conference talk, Privacy Enhancing Technologies Symposium, 2023-07-11.
  4. Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. Conference talk, USENIX Security Symposium, 2022-08-10.
  5. Co-opting Linux Processes for High-Performance Network Simulation. Conference talk, USENIX Annual Technical Conference, 2022-07-11.
  6. Toward Safer Tor Research. Keynote talk, Workshop on Ethics in Computer Security, 2022-06-10.
  7. Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. Conference talk, USENIX Security Symposium, 2021-08-13.
  8. On the Accuracy of Tor Bandwidth Estimation. Conference talk, Passive and Active Measurement Conference, 2021-03-31.
  9. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. Conference talk, USENIX Security Symposium, 2019-08-16.
  10. Privacy-Preserving Dynamic Learning of Tor Network Traffic. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2018-11-28.
  11. Privacy-Preserving Dynamic Learning of Tor Network Traffic. Conference talk, Conference on Computer and Communication Security, 2018-10-18.
  12. Shadow: Scalable and Deterministic Network Experimentation. Invited talk, Cybersecurity Experimentation of the Future Community Engagement Event, 2018-05-15.
  13. Inside Job: Applying Traffic Analysis to Measure Tor from Within. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2018-02-26.
  14. Inside Job: Applying Traffic Analysis to Measure Tor From Within. Conference talk, Network and Distributed System Security Symposium, 2018-02-21.
  15. Shadow: Real Applications, Simulated Networks. Invited talk, the Cyber Modeling and Simulation Technical Working Group, 2017-10-25.
  16. Safely Measuring Tor. Invited talk, the Department of Electrical Engineering (ESAT), KU Leuven, 2016-11-03.
  17. Safely Measuring Tor. Conference talk, Conference on Computer and Communication Security, 2016-10-27.
  18. Safely Measuring Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2016-10-21.
  19. PrivCount: A Distributed System for Safely Measuring Tor. Invited talk, Department of Computer and Information Science, University of Oregon, 2016-10-04.
  20. Shadow: Scalable Simulation for Systems Security Research. Invited talk, David R. Cheriton School of Computer Science, University of Waterloo, 2016-01-20.
  21. Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. Workshop talk, Workshop on Cyber Security Experimentation and Test, 2015-08-10.
  22. Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport. Conference talk, USENIX Security Symposium, 2014-08-20.
  23. On Traffic Analysis in Tor. Guest lecture, Department of Electrical Engineering, Princeton University, 2014-04-03.
  24. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. Conference talk, Network and Distributed System Security Symposium, 2014-02-25.
  25. Toward Understanding Congestion in Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2014-01-24.
  26. Memory-based DoS and Deanonymization Attacks on Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2013-10-11.
  27. Shadow: Simple HPC for Systems Security Research. Invited talk, Department of Computer and Information Sciences, Kansas State University, 2013-09-25.
  28. How Low Can You Go: Balancing Performance with Anonymity in Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2013-05-10.
  29. Performance Enhancements for Tor. Seminar talk, DC-area Anonymity, Privacy, and Security Seminar, 2012-10-26.
  30. Throttling Tor Bandwidth Parasites. Conference talk, USENIX Security Symposium, 2012-08-09.
  31. Methodically Modeling the Tor Network. Workshop talk, Workshop on Cyber Security Experimentation and Test, 2012-08-06.
  32. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. Conference talk, Network and Distributed System Security Symposium, 2012-02-07.
  33. Throttling Tor Bandwidth Parasites. Invited talk, Network and Distributed System Security Symposium, 2012-02-06.
  34. Recruiting New Tor Relays with BRAIDS. Conference talk, Conference on Computer and Communications Security, 2010-10-06.