Rob G. Jansen, PhD

Computer Scientist, Researcher, and Principal Investigator
U.S. Naval Research Laboratory, Washington, DC, USA

Publication Details

  1. Citation

    Rob JansenMatthew Traudt, John Geddes, Chris Wacek, Micah Sherr, and Paul Syverson:
    KIST: Kernel-Informed Socket Transport for Tor. Transactions on Privacy and Security, vol. 22, no. 1, 2018. See associated conference paper and case study report.

    Author Links


    Our work influenced deployed changes to Tor’s queuing system
    Our KIST implementation has been deployed in Tor v0.3.2 on 2018-01-09

    Media Mentions

    Tor transition mentioned on the Tor Project blog.


    Tor’s growing popularity and user diversity has resulted in network performance problems that are not well understood, though performance is understood to be a significant factor in Tor’s security. A large body of work has attempted to solve performance problems without a complete understanding of where congestion occurs in Tor. In this article, we first study congestion in Tor at individual relays as well as along the entire end-to-end Tor path and find that congestion occurs almost exclusively in egress kernel socket buffers. We then analyze Tor’s socket interactions and discover two major contributors to Tor’s congestion: Tor writes sockets sequentially, and Tor writes as much as possible to each socket. To improve Tor’s performance, we design, implement, and test KIST: a new socket management algorithm that uses real-time kernel information to dynamically compute the amount to write to each socket while considering all circuits of all writable sockets when scheduling cells. We find that, in the medians, KIST reduces circuit congestion by more than 30%, reduces network latency by 18%, and increases network throughput by nearly 10%. We also find that client and relay performance with KIST improves as more relays deploy it and as network load and packet loss rates increase. We analyze the security of KIST and find an acceptable performance and security tradeoff, as it does not significantly affect the outcome of well-known latency, throughput, and traffic correlation attacks. KIST has been merged and configured as the default socket scheduling algorithm in Tor version (released September 18, 2017) and became stable in Tor version (released January 9, 2018). While our focus is Tor, our techniques and observations should help analyze and improve overlay and application performance, both for security applications and in general.


      title = {KIST: Kernel-Informed Socket Transport for Tor},
      author = {Jansen, Rob and Traudt, Matthew and Geddes, John and Wacek, Chris and Sherr, Micah and Syverson, Paul},
      journal = {Transactions on Privacy and Security},
      volume = {22},
      number = {1},
      article = {3},
      year = {2018},
      doi = {10.1145/3278121},