Articles with public access mandates - Rob JansenLearn more
Available somewhere: 17
The sniper attack: Anonymously deanonymizing and disabling the Tor network
R Jansen, F Tschorsch, A Johnson, B Scheuermann
Proceedings of the 21st Symposium on Network and Distributed System Security, 2014
Mandates: German Research Foundation
Safely Measuring Tor
R Jansen, A Johnson
Proceedings of the 23rd ACM Conference on Computer and Communications …, 2016
Mandates: US National Science Foundation
Understanding tor usage with privacy-preserving measurement
A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr
Proceedings of the Internet Measurement Conference 2018, 175-187, 2018
Mandates: US National Science Foundation, US Department of Defense
Inside Job: Applying Traffic Analysis to Measure Tor from Within
R Jansen, M Juarez, R Gálvez, T Elahi, C Diaz
25th Symposium on Network and Distributed System Security, 2018
Mandates: US National Science Foundation, US Department of Defense, Research …
Online website fingerprinting: Evaluating website fingerprinting attacks on tor in the real world
G Cherubin, R Jansen, C Troncoso
31st USENIX Security Symposium (USENIX Security 22), 753-770, 2022
Mandates: Swiss National Science Foundation, US Department of Defense
Point break: A study of bandwidth {Denial-of-Service} attacks against tor
R Jansen, T Vaidya, M Sherr
28th USENIX security symposium (USENIX Security 19), 1823-1840, 2019
Mandates: US National Science Foundation, US Department of Defense
PeerFlow: Secure load balancing in Tor
A Johnson, R Jansen, N Hopper, A Segal, P Syverson
Proceedings on Privacy Enhancing Technologies, 2017
Mandates: US Department of Defense
KISt: Kernel-informed socket transport for ToR
R Jansen, M Traudt, J Geddes, C Wacek, M Sherr, P Syverson
ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-37, 2018
Mandates: US National Science Foundation, US Department of Defense
Privacy-preserving dynamic learning of tor network traffic
R Jansen, M Traudt, N Hopper
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Mandates: US National Science Foundation, US Department of Defense
Once is never enough: Foundations for sound statistical inference in Tor network experimentation
R Jansen, J Tracey, I Goldberg
30th USENIX Security Symposium (USENIX Security 21), 3415-3432, 2021
Mandates: US National Science Foundation, US Department of Defense, Natural Sciences …
Flashflow: A secure speed test for tor
M Traudt, R Jansen, A Johnson
2021 IEEE 41st International Conference on Distributed Computing Systems …, 2021
Mandates: US Department of Defense
Co-opting linux processes for {High-Performance} network simulation
R Jansen, J Newsome, R Wails
2022 USENIX Annual Technical Conference (USENIX ATC 22), 327-350, 2022
Mandates: US National Science Foundation, US Department of Defense
On the Accuracy of Tor Bandwidth Estimation
R Jansen, A Johnson
Passive and Active Measurement, 481-498, 2021
Mandates: US National Science Foundation, US Department of Defense
Data-explainable website fingerprinting with network simulation
R Jansen, R Wails
Proceedings on Privacy Enhancing Technologies, 2023
Mandates: US National Science Foundation, US Department of Defense
Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs
R Wails, A Stange, E Troper, A Caliskan, R Dingledine, R Jansen, ...
Proceedings on Privacy Enhancing Technologies, 2022
Mandates: US Department of Defense
High Performance Tor Experimentation from the Magic of Dynamic {ELFs}
J Tracey, R Jansen, I Goldberg
11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18), 2018
Mandates: US National Science Foundation, US Department of Defense, Natural Sciences …
Proteus: Programmable protocols for censorship circumvention
R Wails, R Jansen, A Johnson, M Sherr
Free and Open Communications on the Internet, 2023
Mandates: US Department of Defense
Publication and funding information is determined automatically by a computer program