Publications

Peer-Reviewed Journals and Conferences
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
Rob Jansen, Tavish Vaidya, and Micah Sherr
[published article]
Our work influenced the deployment of authenticated SENDMEs  [Tor v0.4.1, 2019-08-20]
  • Degrading Tor network performance only costs a few thousand dollars per month  [ZDNet]
  • Attacking Tor: What it Takes to Disrupt the Popular Onion Routing Network  [SecurityWeek]

KIST: Kernel-Informed Socket Transport for Tor
Rob Jansen, Matthew Traudt, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson
Volume 22, Issue 1, Article 3 (January 2018).
[published article]
Our work influenced deployed changes to the queuing system in Tor  [Tor ticket 12541]
Our KIST implementation has been deployed in Tor  [Tor v0.3.2, 2018-01-09]

Understanding Tor Usage with Privacy-Preserving Measurement
Akshaya Mani, T Wilson-Brown, Rob Jansen, Aaron Johnson, and Micah Sherr
[published article] [extended appendices] [homepage - code, data, and models]
Privacy-Preserving Dynamic Learning of Tor Network Traffic
Rob Jansen, Matthew Traudt, and Nick Hopper
[published article] [homepage - code, data, and models]
Our work has transitioned to the open-source Shadow project since v1.13.0  [code repository]

Inside Job: Applying Traffic Analysis to Measure Tor from Within
Rob Jansen, Marc Juarez, Rafael Galvez, Tariq Elahi, and Claudia Diaz
[published article] [homepage] [code]
Safely Measuring Tor
[published article] [blog summary] [code]
Our work influenced a new privacy-preserving measurement system in Tor  [Tor proposal 288]

Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport
Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson
[published article] [extended appendices] [KIST prototype]
Our work has transitioned to the open-source Shadow project since v1.9.2  [code repository]
Our work influenced deployed changes to the queuing system in Tor  [Tor ticket 12541]

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
[published article] [blog summary]
47th Annual Alan Berman Research Publication Award, 2015-04-17  [blog]
Our work influenced deployed guard selection changes in Tor  [Tor proposal 271]
Our circuit killer DoS defense was deployed in Tor  [Tor v0.2.4, 2013-12-12]
Our work influenced proposed authenticated SENDME DoS defense in Tor  [Tor proposal 289]

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
[published article] [Tor path simulator]
  • Building a new Tor that can resist next-generation state surveillance  [ars technica]
  • Snoops can identify Tor users given enough time, experts say  [ars technica]
  • Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance  [mit tech review]
  • Boffins follow TOR breadcrumbs to identify users  [the register]
  • Tor is Not as Safe as You May Think  [infosec magazine]
  • Tor Is Less Anonymous Than You Think  [vice]
  • Persistent adversaries can identify Tor users  [help net security]
  • Anonymity-based Tor platform has security issues according to report  [irish times]
  • Tor users easy to unmask  [heise]
  • The anonymity of the Tor network shaken by US researchers  [developpez]
  • Tor anonymity not guaranteed  [punto informatico]
  • Identity Tor users yet to figure out  [computeridee]

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
[published article] [technical report]
2013 PET Award Runner Up  [announcement]
Our work has transitioned to the open-source Shadow project  [Shadow homepage]

Peer-Reviewed Workshops
Reducing Kernel Queuing Delays with TCP Window Space Events
David Goulet and Rob Jansen
[published article]
High Performance Tor Experimentation from the Magic of Dynamic ELFs
Justin Tracey, Rob Jansen, and Ian Goldberg
[published article]
Our work has transitioned to the open-source Shadow project since v1.12.0  [code repository]

Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
[published article] [code]
Our work has transitioned to the open-source Shadow project since v1.11.0  [code repository]

IMUX: Managing Tor Connections from Two to Infinity, and Beyond
13th Workshop on Privacy in the Electronic Society (WPES 2014)
John Geddes, Rob Jansen, and Nick Hopper
[published article]
A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays
Mainak Ghosh, Miles Richardson, Bryan Ford, and Rob Jansen
[published article] [blog summary]
  • How Bitcoin Tech Could Make Infamous Anonymous Tor Network More Powerful  [CoinDesk]
  • Torcoin: New Altcoin Hopes To Incentivize People Into Running Tor Relays  [Deep.Dot.Web]
  • TorCoin: Making Anonymity Pay  [Crypto Coins News]

How Low Can You Go: Balancing Performance with Anonymity in Tor
John Geddes, Rob Jansen, and Nick Hopper
[published article]
Andreas Pfitzmann Best Student Paper Award  [announcement]

Toward Anonymity in Delay Tolerant Networks: Threshold Pivot Scheme
29th Military Communications Conference (MILCOM 2010)
[published article] [technical report] [prototype]
Peer-Reviewed Posters and Abstracts
Fingerprinting Hidden Service Circuits from a Tor Middle Relay
38th Symposium on Security and Privacy (S&P 2017)
Marc Juarez, Rob Jansen, Rafael Galvez, Tariq Elahi, Claudia Diaz, and Matthew Wright
Poster Abstract
[published abstract]
Onions for Sale: Putting Privacy on the Market
17th Conference on Financial Cryptography and Data Security (FC 2013)
Poster Abstract
[published abstract]
Other Technical Reports
Tor's Been KIST: A Case Study of Transitioning Tor Research to Practice
Technical Report arXiv:1709.01044 [cs.CR] (arXiv 2017)
Rob Jansen and Matthew Traudt
[technical article] [arXiv page]
WPES 2015: The 14th Workshop on Privacy in the Electronic Society
Workshop Summary
[technical article]
Privacy Preserving Performance Enhancements for Anonymous Communication Systems
University of Minnesota Ph.D. Dissertation (2012)
[technical article]
On PAR for Attack
Class Project (2009)
Chris Arnold, Rob Jansen, Zi Lin, and James Parker
[technical article]
A Priori Trust Vulnerabilities in EigenTrust
Class Project (2008)
Rob Jansen, Ted Kaminski, Fedor Korsakov, Alexander Saint Croix, and Daniel Selifonov
[technical article]