Talks

Conference, Workshop, Seminar, and Invited Talks
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
28th USENIX Security Symposium (Sec 2019)
Conference technical session, August 16, 2019
[pptx] [pdf] [audio/video]
Privacy-Preserving Dynamic Learning of Tor Network Traffic
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2018)
Seminar technical session, November 28, 2018
[pptx] [pdf] [program]
Privacy-Preserving Dynamic Learning of Tor Network Traffic
25th ACM Conference on Computer and Communication Security (CCS 2018)
Conference technical session, October 18, 2018
[pptx] [pdf] [program] [video]
Shadow: Scalable and Deterministic Network Experimentation
Cybersecurity Experimentation of the Future Community Engagement Event (CEF 2018)
Invited talk, May 15, 2018
[pptx] [pdf] [program]
Inside Job: Applying Traffic Analysis to Measure Tor from Within
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2018)
Seminar technical session, February 26, 2018
[pptx] [pdf] [program]
Inside Job: Applying Traffic Analysis to Measure Tor From Within
25th Symposium on Network and Distributed System Security (NDSS 2018)
Conference technical session, February 21, 2018
[pptx] [pdf]
Shadow: Real Applications, Simulated Networks
Cyber Modeling and Simulation Technical Working Group (2017)
Invited talk, October 25, 2017
[pptx] [pdf]
Safely Measuring Tor
Department of Electrical Engineering (ESAT), KU Leuven (2016)
Invited talk, November 3, 2016
[pptx] [pdf] [announcement]
Safely Measuring Tor
23rd ACM Conference on Computer and Communication Security (CCS 2016)
Conference technical session, October 27, 2016
[pptx] [pdf] [video] [program]
Safely Measuring Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2016)
Seminar technical session, October 21, 2016
[pptx] [pdf] [program]
PrivCount: A Distributed System for Safely Measuring Tor
Department of Computer and Information Science, University of Oregon (2016)
Invited talk, October 4, 2016
[pptx] [pdf] [announcement]
Shadow: Scalable Simulation for Systems Security Research
David R. Cheriton School of Computer Science, University of Waterloo (2016)
Invited talk, January 20, 2016
[pptx] [pdf] [video]
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
8th Workshop on Cyber Security Experimentation and Test (CSET 2015)
Conference technical session, August 10, 2015
[pptx] [pdf] [git-viz] [audio/video]
Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
23rd USENIX Security Symposium (Sec 2014)
Conference technical session, August 20, 2014
[pptx] [pdf] [teaser] [audio/video]
On Traffic Analysis in Tor
Department of Electrical Engineering, Princeton University (2014)
Guest lecture, April 3, 2014
[pptx] [pdf]
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
21st Symposium on Network and Distributed System Security (NDSS 2014)
Conference technical session, February 25, 2014
[pptx] [pdf]
Toward Understanding Congestion in Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2014)
Seminar technical session, January 24, 2014
[pptx] [pdf]
Memory-based DoS and Deanonymization Attacks on Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2013)
Seminar technical session, October 11, 2013
[pptx] [pdf]
Shadow: Simple HPC for Systems Security Research
Department of Computer and Information Sciences, Kansas State University (2013)
Invited talk, September 25, 2013
[pptx] [pdf]
How Low Can You Go: Balancing Performance with Anonymity in Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2013)
Seminar technical session, May 10, 2013
[pptx] [pdf]
Performance Enhancements for Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2012)
Seminar technical session, October 26, 2012
[odp]
Throttling Tor Bandwidth Parasites
21st USENIX Security Symposium (Sec 2012)
Conference technical session, August 9, 2012
[odp] [audio/video]
Methodically Modeling the Tor Network
5th Workshop on Cyber Security Experimentation and Test (CSET 2012)
Workshop technical session, August 6, 2012
[odp]
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
19th Symposium on Network and Distributed System Security (NDSS 2012)
Conference technical session, February 7, 2012
[odp] [screencast]
Throttling Tor Bandwidth Parasites
19th Symposium on Network and Distributed System Security (NDSS 2012)
Chair’s invited session, February 6, 2012
[odp] [screencast]
Recruiting New Tor Relays with BRAIDS
17th Conference on Computer and Communications Security (CCS 2010)
Conference technical session, October 6, 2010
[odp]