user_image

Rob G. Jansen, PhD

Computer Scientist, Researcher, and Principal Investigator
U.S. Naval Research Laboratory, Washington, DC, USA

Publications and Scholarly Articles

2026

  1. Rob Jansen:
    CellShift: RTT-Aware Trace Transduction for Real-World Website Fingerprinting. Network and Distributed System Security Symposium, 2026.

2025

  1. Ryan WailsRob JansenAaron Johnson, and Micah Sherr:
    Censorship Evasion with Unidentified Protocol Generation. USENIX Security Symposium, 2025.
  2. Paul Syverson, Rasmus Dahlberg, Tobias Pulls, and Rob Jansen:
    Onion-Location Measurements and Fingerprinting. Proceedings on Privacy Enhancing Technologies, vol. 2025, no. 2, 2025.
  3. Rob Jansen, and Zubair Shafiq:
  4. Rob Jansen, and Zubair Shafiq:
  5. Rob Jansen, and Zubair Shafiq:
  6. Rob Jansen, and Zubair Shafiq:

2024

  1. Rob JansenRyan Wails, and Aaron Johnson:
    Repositioning Real-World Website Fingerprinting on Tor. Workshop on Privacy in the Electronic Society, 2024.
  2. Anna Harbluk Lorimer,  Rob Jansen, and Nick Feamster:
    Extended abstract: Traffic Splitting for Pluggable Transports. Workshop on Free and Open Communication on the Internet, 2024.
  3. Rob JansenRyan Wails, and Aaron Johnson:
    Informal: A Measurement of Genuine Tor Traces for Realistic Website Fingerprinting. Technical Report, 2024.
  4. Ryan Wails, George Arnold Sullivan, Micah Sherr, and Rob Jansen:
    On Precisely Detecting Censorship Circumvention in Real-World Networks. Network and Distributed System Security Symposium, 2024.

2023

  1. Ryan WailsRob JansenAaron Johnson, and Micah Sherr:
    Proteus: Programmable Protocols for Censorship Circumvention. Workshop on Free and Open Communication on the Internet, 2023.
  2. Rob Jansen, and Ryan Wails:
    Data-Explainable Website Fingerprinting with Network Simulation. Proceedings on Privacy Enhancing Technologies, vol. 2023, no. 4, 2023.

2022

  1. Giovanni CherubinRob Jansen, and Carmela Troncoso:
    Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. USENIX Security Symposium, 2022.
  2. Rob JansenJim Newsome, and Ryan Wails:
    Co-opting Linux Processes for High-Performance Network Simulation. USENIX Annual Technical Conference, 2022.
  3. Ryan Wails, Andrew Stange, Eliana Troper, Aylin CaliskanRoger DingledineRob Jansen, and Micah Sherr:
    Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs. Proceedings on Privacy Enhancing Technologies, vol. 2022, no. 3, 2022.

2021

  1. Rob Jansen, Justin Tracey, and Ian Goldberg:
    Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. USENIX Security Symposium, 2021.
  2. Matthew TraudtRob Jansen, and Aaron Johnson:
  3. Rob Jansen, and Aaron Johnson:
    On the Accuracy of Tor Bandwidth Estimation. Passive and Active Measurement Conference, 2021.

2020

  1. David Goulet, and Rob Jansen:
    Reducing Kernel Queuing Delays with TCP Window Space Events. Technical Conference on Linux Networking, 2020.

2019

  1. Peter A. H. Peterson, and Rob Jansen:
    Editorship: 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET’19). USENIX ;login: Winter 2019, Vol. 44, No. 4, 2019.
  2. Rob Jansen, Tavish Vaidya, and Micah Sherr:
    Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. USENIX Security Symposium, 2019.

2018

  1. Rob JansenMatthew Traudt, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson:
    KIST: Kernel-Informed Socket Transport for Tor. Transactions on Privacy and Security, vol. 22, no. 1, 2018. See associated conference paper and case study report.
  2. Akshaya Mani, T Wilson-Brown,  Rob JansenAaron Johnson, and Micah Sherr:
    Understanding Tor Usage with Privacy-Preserving Measurement. Internet Measurement Conference, 2018.
  3. Rob JansenMatthew Traudt, and Nicholas Hopper:
    Privacy-Preserving Dynamic Learning of Tor Network Traffic. Conference on Computer and Communication Security, 2018.
  4. Justin Tracey,  Rob Jansen, and Ian Goldberg:
    High Performance Tor Experimentation from the Magic of Dynamic ELFs. Workshop on Cyber Security Experimentation and Test, 2018.
  5. Rob JansenMarc Juarez, Rafael Galvez, Tariq Elahi, and Claudia Diaz:
    Inside Job: Applying Traffic Analysis to Measure Tor from Within. Network and Distributed System Security Symposium, 2018.

2017

  1. Rob Jansen, and Matthew Traudt:
    Informal: Tor’s Been KIST: A Case Study of Transitioning Tor Research to Practice. Technical Report, 2017. See associated journal and conference papers.
  2. Roger Dingledine, David Goulet, Prateek MittalNick FeamsterRob Jansen, and Matthew Wright:
    Presentation abstract: A Wide-Area Testbed for Tor. Workshop on Hot Topics in Privacy Enhancing Technologies, 2017.
  3. Marc JuarezRob Jansen, Rafael Galvez, Tariq ElahiClaudia Diaz, and Matthew Wright:
    Poster abstract: Fingerprinting Hidden Service Circuits from a Tor Middle Relay. Symposium on Security and Privacy, 2017. See associated conference paper.
  4. Aaron JohnsonRob Jansen, Aaron D. Jaggard, Joan Feigenbaum, and Paul Syverson:
    Avoiding The Man on the Wire: Improving Tor’s Security with Trust-Aware Path Selection. Network and Distributed System Security Symposium, 2017.

2016

  1. Rob Jansen, and Aaron Johnson:

2015

  1. Nicholas Hopper, and Rob Jansen:
    Editorship: WPES 2015: The 14th Workshop on Privacy in the Electronic Society. Workshop on Privacy in the Electronic Society, 2015.
  2. Andrew Miller, and Rob Jansen:
    Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. Workshop on Cyber Security Experimentation and Test, 2015.

2014

  1. John Geddes,  Rob Jansen, and Nicholas Hopper:
    IMUX: Managing Tor Connections from Two to Infinity, and Beyond. Workshop on Privacy in the Electronic Society, 2014.
  2. Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson:
    Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport. USENIX Security Symposium, 2014. See associated journal paper and case study report.
  3. Mainak Ghosh, Miles Richardson, Bryan Ford, and Rob Jansen:
    A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays. Workshop on Hot Topics in Privacy Enhancing Technologies, 2014.
  4. Rob JansenAndrew MillerPaul Syverson, and Bryan Ford:
    From Onions to Shallots: Rewarding Tor Relays with TEARS. Workshop on Hot Topics in Privacy Enhancing Technologies, 2014.
  5. Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson:
    Informal: Appendices to Accompany "Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport". University of Minnesota Technical Report, no. 14-012, 2014. See associated journal and conference papers.
  6. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. Network and Distributed System Security Symposium, 2014.

2013

  1. Aaron Johnson, Chris Wacek,  Rob JansenMicah Sherr, and Paul Syverson:
    Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. Conference on Computer and Communications Security, 2013.
  2. John Geddes,  Rob Jansen, and Nicholas Hopper:
    How Low Can You Go: Balancing Performance with Anonymity in Tor. Privacy Enhancing Technologies Symposium, 2013.
  3. Aaron JohnsonRob Jansen, and Paul Syverson:
    Poster abstract: Onions for Sale: Putting Privacy on the Market. Conference on Financial Cryptography and Data Security, 2013.
  4. Rob JansenAaron Johnson, and Paul Syverson:
    LIRA: Lightweight Incentivized Routing for Anonymity. Network and Distributed System Security Symposium, 2013.

2012

  1. Rob Jansen:
    Privacy preserving performance enhancements for anonymous communication networks. PhD thesis, University of Minnesota, 2012.
  2. Rob JansenPaul Syverson, and Nicholas Hopper:
    Throttling Tor Bandwidth Parasites. USENIX Security Symposium, 2012.
  3. Methodically Modeling the Tor Network. Workshop on Cyber Security Experimentation and Test, 2012.
  4. Rob JansenPaul Syverson, and Nicholas Hopper:
    Invited abstract: Throttling Tor Bandwidth Parasites. Symposium on Network and Distributed System Security, 2012. See associated conference paper.
  5. Rob Jansen, and Nicholas Hopper:
    Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. Network and Distributed System Security Symposium, 2012.

2011

  1. Rob Jansen, and Nicholas J. Hopper:
    Informal: Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. University of Minnesota Technical Report, no. 11-020, 2011. See associated conference paper.
  2. Rob JansenPaul Syverson, and Nicholas Hopper:
    Informal: Throttling Tor Bandwidth Parasites. University of Minnesota Technical Report, no. 11-019, 2011. See associated conference paper.

2010

  1. Rob Jansen, and Robert Beverly:
    Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme. Military Communications Conference, 2010.
  2. Rob JansenNicholas Hopper, and Yongdae Kim:
    Recruiting New Tor Relays with BRAIDS. Conference on Computer and Communications Security, 2010.

2009

  1. Eugene VassermanRob Jansen, James Tyra, Nicholas Hopper, and Yongdae Kim:
    Membership-Concealing Overlay Networks. Conference on Computer and Communications Security, 2009.
  2. Rob Jansen, and Robert Beverly:
    Informal: Toward Delay Tolerant Network Anonymity: Threshold Pivot Scheme. BBN Technologies Technical Report, no. 8513, 2009. See associated conference paper.
  3. Chris Arnold,  Rob Jansen, Zi Lin, and James Parker:
    Informal: On PAR for Attack. Unpublished report, 2009.

2008

  1. Rob Jansen, Ted Kaminski, Fedor Korsakov, Alexander Saint Croix, and Daniel Selifonov:
    Informal: A Priori Trust Vulnerabilities in EigenTrust. Unpublished report, 2008.