user_image

Rob G. Jansen, PhD

Computer Scientist, Researcher, and Principal Investigator
U.S. Naval Research Laboratory, Washington, DC, USA

Publications and Scholarly Articles

2024

  1. Anna Harbluk Lorimer,  Rob Jansen, and Nick Feamster:
    Extended abstract: Traffic Splitting for Pluggable Transports. Workshop on Free and Open Communication on the Internet, 2024.
  2. Ryan Wails, George Arnold Sullivan, Micah Sherr, and Rob Jansen:
    On Precisely Detecting Censorship Circumvention in Real-World Networks. Network and Distributed System Security Symposium, 2024.

2023

  1. Ryan WailsRob JansenAaron Johnson, and Micah Sherr:
    Proteus: Programmable Protocols for Censorship Circumvention. Workshop on Free and Open Communication on the Internet, 2023.
  2. Rob Jansen, and Ryan Wails:
    Data-Explainable Website Fingerprinting with Network Simulation. Proceedings on Privacy Enhancing Technologies, vol. 2023, no. 4, 2023.

2022

  1. Giovanni CherubinRob Jansen, and Carmela Troncoso:
    Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. USENIX Security Symposium, 2022.
  2. Rob JansenJim Newsome, and Ryan Wails:
    Co-opting Linux Processes for High-Performance Network Simulation. USENIX Annual Technical Conference, 2022.
  3. Ryan Wails, Andrew Stange, Eliana Troper, Aylin CaliskanRoger DingledineRob Jansen, and Micah Sherr:
    Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs. Proceedings on Privacy Enhancing Technologies, vol. 2022, no. 3, 2022.

2021

  1. Rob Jansen, Justin Tracey, and Ian Goldberg:
    Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. USENIX Security Symposium, 2021.
  2. Matthew TraudtRob Jansen, and Aaron Johnson:
  3. Rob Jansen, and Aaron Johnson:
    On the Accuracy of Tor Bandwidth Estimation. Passive and Active Measurement Conference, 2021.

2020

  1. David Goulet, and Rob Jansen:
    Reducing Kernel Queuing Delays with TCP Window Space Events. Technical Conference on Linux Networking, 2020.

2019

  1. Peter A. H. Peterson, and Rob Jansen:
    Editorship: 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET’19). USENIX ;login: Winter 2019, Vol. 44, No. 4, 2019.
  2. Rob Jansen, Tavish Vaidya, and Micah Sherr:
    Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. USENIX Security Symposium, 2019.

2018

  1. Rob JansenMatthew Traudt, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson:
    KIST: Kernel-Informed Socket Transport for Tor. Transactions on Privacy and Security, vol. 22, no. 1, 2018. See associated conference paper and case study report.
  2. Akshaya Mani, T Wilson-Brown,  Rob JansenAaron Johnson, and Micah Sherr:
    Understanding Tor Usage with Privacy-Preserving Measurement. Internet Measurement Conference, 2018.
  3. Rob JansenMatthew Traudt, and Nicholas Hopper:
    Privacy-Preserving Dynamic Learning of Tor Network Traffic. Conference on Computer and Communication Security, 2018.
  4. Justin Tracey,  Rob Jansen, and Ian Goldberg:
    High Performance Tor Experimentation from the Magic of Dynamic ELFs. Workshop on Cyber Security Experimentation and Test, 2018.
  5. Rob JansenMarc Juarez, Rafael Galvez, Tariq Elahi, and Claudia Diaz:
    Inside Job: Applying Traffic Analysis to Measure Tor from Within. Network and Distributed System Security Symposium, 2018.

2017

  1. Rob Jansen, and Matthew Traudt:
    Informal: Tor’s Been KIST: A Case Study of Transitioning Tor Research to Practice. Technical Report, 2017. See associated journal and conference papers.
  2. Roger Dingledine, David Goulet, Prateek MittalNick FeamsterRob Jansen, and Matthew Wright:
    Presentation abstract: A Wide-Area Testbed for Tor. Workshop on Hot Topics in Privacy Enhancing Technologies, 2017.
  3. Marc JuarezRob Jansen, Rafael Galvez, Tariq ElahiClaudia Diaz, and Matthew Wright:
    Poster abstract: Fingerprinting Hidden Service Circuits from a Tor Middle Relay. Symposium on Security and Privacy, 2017. See associated conference paper.
  4. Aaron JohnsonRob Jansen, Aaron D. Jaggard, Joan Feigenbaum, and Paul Syverson:
    Avoiding The Man on the Wire: Improving Tor’s Security with Trust-Aware Path Selection. Network and Distributed System Security Symposium, 2017.

2016

  1. Rob Jansen, and Aaron Johnson:

2015

  1. Nicholas Hopper, and Rob Jansen:
    Editorship: WPES 2015: The 14th Workshop on Privacy in the Electronic Society. Workshop on Privacy in the Electronic Society, 2015.
  2. Andrew Miller, and Rob Jansen:
    Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. Workshop on Cyber Security Experimentation and Test, 2015.

2014

  1. John Geddes,  Rob Jansen, and Nicholas Hopper:
    IMUX: Managing Tor Connections from Two to Infinity, and Beyond. Workshop on Privacy in the Electronic Society, 2014.
  2. Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson:
    Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport. USENIX Security Symposium, 2014. See associated journal paper and case study report.
  3. Mainak Ghosh, Miles Richardson, Bryan Ford, and Rob Jansen:
    A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays. Workshop on Hot Topics in Privacy Enhancing Technologies, 2014.
  4. Rob JansenAndrew MillerPaul Syverson, and Bryan Ford:
    From Onions to Shallots: Rewarding Tor Relays with TEARS. Workshop on Hot Topics in Privacy Enhancing Technologies, 2014.
  5. Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson:
    Informal: Appendices to Accompany "Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport". University of Minnesota Technical Report, no. 14-012, 2014. See associated journal and conference papers.
  6. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. Network and Distributed System Security Symposium, 2014.

2013

  1. Aaron Johnson, Chris Wacek,  Rob JansenMicah Sherr, and Paul Syverson:
    Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. Conference on Computer and Communications Security, 2013.
  2. John Geddes,  Rob Jansen, and Nicholas Hopper:
    How Low Can You Go: Balancing Performance with Anonymity in Tor. Privacy Enhancing Technologies Symposium, 2013.
  3. Aaron JohnsonRob Jansen, and Paul Syverson:
    Poster abstract: Onions for Sale: Putting Privacy on the Market. Conference on Financial Cryptography and Data Security, 2013.
  4. Rob JansenAaron Johnson, and Paul Syverson:
    LIRA: Lightweight Incentivized Routing for Anonymity. Network and Distributed System Security Symposium, 2013.

2012

  1. Rob Jansen:
    Privacy preserving performance enhancements for anonymous communication networks. PhD thesis, University of Minnesota, 2012.
  2. Rob JansenPaul Syverson, and Nicholas Hopper:
    Throttling Tor Bandwidth Parasites. USENIX Security Symposium, 2012.
  3. Methodically Modeling the Tor Network. Workshop on Cyber Security Experimentation and Test, 2012.
  4. Rob JansenPaul Syverson, and Nicholas Hopper:
    Invited abstract: Throttling Tor Bandwidth Parasites. Symposium on Network and Distributed System Security, 2012. See associated conference paper.
  5. Rob Jansen, and Nicholas Hopper:
    Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. Network and Distributed System Security Symposium, 2012.

2011

  1. Rob Jansen, and Nicholas J. Hopper:
    Informal: Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. University of Minnesota Technical Report, no. 11-020, 2011. See associated conference paper.
  2. Rob JansenPaul Syverson, and Nicholas Hopper:
    Informal: Throttling Tor Bandwidth Parasites. University of Minnesota Technical Report, no. 11-019, 2011. See associated conference paper.

2010

  1. Rob Jansen, and Robert Beverly:
    Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme. Military Communications Conference, 2010.
  2. Rob JansenNicholas Hopper, and Yongdae Kim:
    Recruiting New Tor Relays with BRAIDS. Conference on Computer and Communications Security, 2010.

2009

  1. Eugene VassermanRob Jansen, James Tyra, Nicholas Hopper, and Yongdae Kim:
    Membership-Concealing Overlay Networks. Conference on Computer and Communications Security, 2009.
  2. Rob Jansen, and Robert Beverly:
    Informal: Toward Delay Tolerant Network Anonymity: Threshold Pivot Scheme. BBN Technologies Technical Report, no. 8513, 2009. See associated conference paper.
  3. Chris Arnold,  Rob Jansen, Zi Lin, and James Parker:
    Informal: On PAR for Attack. Unpublished report, 2009.

2008

  1. Rob Jansen, Ted Kaminski, Fedor Korsakov, Alexander Saint Croix, and Daniel Selifonov:
    Informal: A Priori Trust Vulnerabilities in EigenTrust. Unpublished report, 2008.