Users get routed: Traffic correlation on Tor by realistic adversaries A Johnson, C Wacek, R Jansen, M Sherr, P Syverson Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 373 | 2013 |
Shadow: Running Tor in a box for accurate and efficient experimentation R Jansen, N Hopper Proceedings of the 19th Symposium on Network and Distributed System Security, 2012 | 219 | 2012 |
The sniper attack: Anonymously deanonymizing and disabling the Tor network R Jansen, F Tschorsch, A Johnson, B Scheuermann Proceedings of the 21st Symposium on Network and Distributed System Security, 2014 | 160 | 2014 |
Recruiting new Tor relays with BRAIDS R Jansen, N Hopper, Y Kim Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 109 | 2010 |
Inside Job: Applying Traffic Analysis to Measure Tor from Within R Jansen, M Juarez, R Gálvez, T Elahi, C Diaz 25th Symposium on Network and Distributed System Security, 2018 | 96 | 2018 |
A TorPath to TorCoin: proof-of-bandwidth altcoins for compensating relays M Ghosh, M Richardson, B Ford, R Jansen Workshop on Hot Topics in Privacy Enhancing Technologies, 2014 | 96 | 2014 |
Safely Measuring Tor R Jansen, A Johnson Proceedings of the 23rd ACM Conference on Computer and Communications …, 2016 | 95 | 2016 |
Methodically Modeling the Tor Network. R Jansen, KS Bauer, N Hopper, R Dingledine CSET, 2012 | 89 | 2012 |
Understanding tor usage with privacy-preserving measurement A Mani, T Wilson-Brown, R Jansen, A Johnson, M Sherr Proceedings of the Internet Measurement Conference 2018, 175-187, 2018 | 88 | 2018 |
Membership-concealing overlay networks E Vasserman, R Jansen, J Tyra, N Hopper, Y Kim Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 83 | 2009 |
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications A Miller, R Jansen 8th Workshop on Cyber Security Experimentation and Test, 2015 | 71 | 2015 |
Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport R Jansen, J Geddes, C Wacek, M Sherr, P Syverson USENIX Security, 2014 | 60 | 2014 |
Throttling Tor Bandwidth Parasites R Jansen, P Syverson, N Hopper 21st USENIX Security Symposium, 349-363, 2012 | 59 | 2012 |
LIRA: Lightweight Incentivized Routing for Anonymity R Jansen, A Johnson, P Syverson Proceedings of the 20th Network and Distributed System Security Symposium., 2013 | 57 | 2013 |
Online website fingerprinting: Evaluating website fingerprinting attacks on tor in the real world G Cherubin, R Jansen, C Troncoso 31st USENIX Security Symposium (USENIX Security 22), 753-770, 2022 | 52 | 2022 |
Point break: A study of bandwidth {Denial-of-Service} attacks against tor R Jansen, T Vaidya, M Sherr 28th USENIX security symposium (USENIX Security 19), 1823-1840, 2019 | 52 | 2019 |
PeerFlow: Secure load balancing in Tor A Johnson, R Jansen, N Hopper, A Segal, P Syverson Proceedings on Privacy Enhancing Technologies, 2017 | 50 | 2017 |
How low can you go: Balancing performance with anonymity in Tor J Geddes, R Jansen, N Hopper International Symposium on Privacy Enhancing Technologies Symposium, 164-184, 2013 | 46 | 2013 |
Toward anonymity in delay tolerant networks: Threshold pivot scheme R Jansen, R Beverly 2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 587-592, 2010 | 39 | 2010 |
IMUX: Managing tor connections from two to infinity, and beyond J Geddes, R Jansen, N Hopper Proceedings of the 13th Workshop on Privacy in the Electronic Society, 181-190, 2014 | 32 | 2014 |