Talks

Conference, Workshop, Seminar, and Invited Talks
Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World
31st USENIX Security Symposium (Sec 2022)
Conference technical session, August 10, 2022
[pptx] [pdf] [audio/video]

Co-opting Linux Processes for High-Performance Network Simulation
USENIX Annual Technical Conference (ATC 2022)
Conference technical session, July 11, 2022
[pptx] [pdf] [audio/video]

Toward Safer Tor Research
1st International Workshop on Ethics in Computer Security (EthiCS 2022)
Workshop keynote talk, June 10, 2022
[pptx] [pdf]

Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation
30th USENIX Security Symposium (Sec 2021)
Conference technical session, August 13, 2021
[pptx] [pdf] [audio/video]

On the Accuracy of Tor Bandwidth Estimation
Passive and Active Measurement Conference 2021 (PAM 2021)
Conference technical session, March 31, 2021
[pptx] [pdf] [audio/video]

Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
28th USENIX Security Symposium (Sec 2019)
Conference technical session, August 16, 2019
[pptx] [pdf] [audio/video]

Privacy-Preserving Dynamic Learning of Tor Network Traffic
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2018)
Seminar technical session, November 28, 2018
[pptx] [pdf] [program]

Privacy-Preserving Dynamic Learning of Tor Network Traffic
25th ACM Conference on Computer and Communication Security (CCS 2018)
Conference technical session, October 18, 2018
[pptx] [pdf] [program] [video]

Shadow: Scalable and Deterministic Network Experimentation
Cybersecurity Experimentation of the Future Community Engagement Event (CEF 2018)
Invited talk, May 15, 2018
[pptx] [pdf] [program]

Inside Job: Applying Traffic Analysis to Measure Tor from Within
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2018)
Seminar technical session, February 26, 2018
[pptx] [pdf] [program]

Inside Job: Applying Traffic Analysis to Measure Tor From Within
25th Symposium on Network and Distributed System Security (NDSS 2018)
Conference technical session, February 21, 2018
[pptx] [pdf]

Shadow: Real Applications, Simulated Networks
Cyber Modeling and Simulation Technical Working Group (2017)
Invited talk, October 25, 2017
[pptx] [pdf]

Safely Measuring Tor
Department of Electrical Engineering (ESAT), KU Leuven (2016)
Invited talk, November 3, 2016
[pptx] [pdf] [announcement]

Safely Measuring Tor
23rd ACM Conference on Computer and Communication Security (CCS 2016)
Conference technical session, October 27, 2016
[pptx] [pdf] [video] [program]

Safely Measuring Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2016)
Seminar technical session, October 21, 2016
[pptx] [pdf] [program]

PrivCount: A Distributed System for Safely Measuring Tor
Department of Computer and Information Science, University of Oregon (2016)
Invited talk, October 4, 2016
[pptx] [pdf] [announcement]

Shadow: Scalable Simulation for Systems Security Research
David R. Cheriton School of Computer Science, University of Waterloo (2016)
Invited talk, January 20, 2016
[pptx] [pdf] [video]

Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications
8th Workshop on Cyber Security Experimentation and Test (CSET 2015)
Conference technical session, August 10, 2015
[pptx] [pdf] [git-viz] [audio/video]

Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport
23rd USENIX Security Symposium (Sec 2014)
Conference technical session, August 20, 2014
[pptx] [pdf] [teaser] [audio/video]

On Traffic Analysis in Tor
Department of Electrical Engineering, Princeton University (2014)
Guest lecture, April 3, 2014
[pptx] [pdf]

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network
21st Symposium on Network and Distributed System Security (NDSS 2014)
Conference technical session, February 25, 2014
[pptx] [pdf]

Toward Understanding Congestion in Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2014)
Seminar technical session, January 24, 2014
[pptx] [pdf]

Memory-based DoS and Deanonymization Attacks on Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2013)
Seminar technical session, October 11, 2013
[pptx] [pdf]

Shadow: Simple HPC for Systems Security Research
Department of Computer and Information Sciences, Kansas State University (2013)
Invited talk, September 25, 2013
[pptx] [pdf]

How Low Can You Go: Balancing Performance with Anonymity in Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2013)
Seminar technical session, May 10, 2013
[pptx] [pdf]

Performance Enhancements for Tor
DC-area Anonymity, Privacy, and Security Seminar (DCAPS 2012)
Seminar technical session, October 26, 2012
[odp]

Throttling Tor Bandwidth Parasites
21st USENIX Security Symposium (Sec 2012)
Conference technical session, August 9, 2012
[odp] [audio/video]

Methodically Modeling the Tor Network
5th Workshop on Cyber Security Experimentation and Test (CSET 2012)
Workshop technical session, August 6, 2012
[odp]

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
19th Symposium on Network and Distributed System Security (NDSS 2012)
Conference technical session, February 7, 2012
[odp] [screencast]

Throttling Tor Bandwidth Parasites
19th Symposium on Network and Distributed System Security (NDSS 2012)
Chair’s invited session, February 6, 2012
[odp] [screencast]

Recruiting New Tor Relays with BRAIDS
17th Conference on Computer and Communications Security (CCS 2010)
Conference technical session, October 6, 2010
[odp]