Talks
Conference, Workshop, Seminar, and Invited Talks
Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World
31st USENIX Security Symposium (Sec 2022)
Conference technical session, August 10, 2022
[pptx]
[pdf]
[audio/video]
Co-opting Linux Processes for High-Performance Network Simulation
USENIX Annual Technical Conference (ATC 2022)
Conference technical session, July 11, 2022
[pptx]
[pdf]
[audio/video]
Toward Safer Tor Research
1st International Workshop on Ethics in Computer Security (EthiCS 2022)
Workshop keynote talk, June 10, 2022
[pptx]
[pdf]
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation
30th USENIX Security Symposium (Sec 2021)
Conference technical session, August 13, 2021
[pptx]
[pdf]
[audio/video]
On the Accuracy of Tor Bandwidth Estimation
Passive and Active Measurement Conference 2021 (PAM 2021)
Conference technical session, March 31, 2021
[pptx]
[pdf]
[audio/video]
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
28th USENIX Security Symposium (Sec 2019)
Conference technical session, August 16, 2019
[pptx]
[pdf]
[audio/video]
Privacy-Preserving Dynamic Learning of Tor Network Traffic
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2018)
Seminar technical session, November 28, 2018
[pptx]
[pdf]
[program]
Privacy-Preserving Dynamic Learning of Tor Network Traffic
25th ACM Conference on Computer and Communication Security (CCS 2018)
Conference technical session, October 18, 2018
[pptx]
[pdf]
[program]
[video]
Shadow: Scalable and Deterministic Network Experimentation
Cybersecurity Experimentation of the Future Community Engagement Event (CEF 2018)
Invited talk, May 15, 2018
[pptx]
[pdf]
[program]
Inside Job: Applying Traffic Analysis to Measure Tor from Within
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2018)
Seminar technical session, February 26, 2018
[pptx]
[pdf]
[program]
Inside Job: Applying Traffic Analysis to Measure Tor From Within
25th Symposium on Network and Distributed System Security (NDSS 2018)
Conference technical session, February 21, 2018
[pptx]
[pdf]
Shadow: Real Applications, Simulated Networks
Cyber Modeling and Simulation Technical Working Group (2017)
Invited talk, October 25, 2017
[pptx]
[pdf]
Safely Measuring Tor
Department of Electrical Engineering (ESAT), KU Leuven (2016)
Invited talk, November 3, 2016
[pptx]
[pdf]
[announcement]
Safely Measuring Tor
23rd ACM Conference on Computer and Communication Security (CCS 2016)
Conference technical session, October 27, 2016
[pptx]
[pdf]
[video]
[program]
Safely Measuring Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2016)
Seminar technical session, October 21, 2016
[pptx]
[pdf]
[program]
PrivCount: A Distributed System for Safely Measuring Tor
Department of Computer and Information Science, University of Oregon (2016)
Invited talk, October 4, 2016
[pptx]
[pdf]
[announcement]
Shadow: Scalable Simulation for Systems Security Research
David R. Cheriton School of Computer Science, University of Waterloo (2016)
Invited talk, January 20, 2016
[pptx]
[pdf]
[video]
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
8th Workshop on Cyber Security Experimentation and Test (CSET 2015)
Conference technical session, August 10, 2015
[pptx]
[pdf]
[git-viz]
[audio/video]
Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
23rd USENIX Security Symposium (Sec 2014)
Conference technical session, August 20, 2014
[pptx]
[pdf]
[teaser]
[audio/video]
On Traffic Analysis in Tor
Department of Electrical Engineering, Princeton University (2014)
Guest lecture, April 3, 2014
[pptx]
[pdf]
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
21st Symposium on Network and Distributed System Security (NDSS 2014)
Conference technical session, February 25, 2014
[pptx]
[pdf]
Toward Understanding Congestion in Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2014)
Seminar technical session, January 24, 2014
[pptx]
[pdf]
Memory-based DoS and Deanonymization Attacks on Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2013)
Seminar technical session, October 11, 2013
[pptx]
[pdf]
Shadow: Simple HPC for Systems Security Research
Department of Computer and Information Sciences, Kansas State University (2013)
Invited talk, September 25, 2013
[pptx]
[pdf]
How Low Can You Go: Balancing Performance with Anonymity in Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2013)
Seminar technical session, May 10, 2013
[pptx]
[pdf]
Performance Enhancements for Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2012)
Seminar technical session, October 26, 2012
[odp]
Throttling Tor Bandwidth Parasites
21st USENIX Security Symposium (Sec 2012)
Conference technical session, August 9, 2012
[odp]
[audio/video]
Methodically Modeling the Tor Network
5th Workshop on Cyber Security Experimentation and Test (CSET 2012)
Workshop technical session, August 6, 2012
[odp]
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
19th Symposium on Network and Distributed System Security (NDSS 2012)
Conference technical session, February 7, 2012
[odp]
[screencast]
Throttling Tor Bandwidth Parasites
19th Symposium on Network and Distributed System Security (NDSS 2012)
Chair’s invited session, February 6, 2012
[odp]
[screencast]
Recruiting New Tor Relays with BRAIDS
17th Conference on Computer and Communications Security (CCS 2010)
Conference technical session, October 6, 2010
[odp]