default search action
Rob Jansen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j6]Rob Jansen, Zubair Shafiq:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2025(1): 1-4 (2025) - 2024
- [c28]Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen:
On Precisely Detecting Censorship Circumvention in Real-World Networks. NDSS 2024 - [c27]Rob Jansen, Ryan Wails, Aaron Johnson:
Repositioning Real-World Website Fingerprinting on Tor. WPES@CCS 2024: 124-140 - [i7]Rob Jansen, Ryan Wails, Aaron Johnson:
A Measurement of Genuine Tor Traces for Realistic Website Fingerprinting. CoRR abs/2404.07892 (2024) - 2023
- [j5]Rob Jansen, Ryan Wails:
Data-Explainable Website Fingerprinting with Network Simulation. Proc. Priv. Enhancing Technol. 2023(4): 559-577 (2023) - 2022
- [j4]Ryan Wails, Andrew Stange, Eliana Troper, Aylin Caliskan, Roger Dingledine, Rob Jansen, Micah Sherr:
Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs. Proc. Priv. Enhancing Technol. 2022(3): 179-199 (2022) - [c26]Rob Jansen, James Newsome, Ryan Wails:
Co-opting Linux Processes for High-Performance Network Simulation. USENIX ATC 2022: 327-350 - [c25]Giovanni Cherubin, Rob Jansen, Carmela Troncoso:
Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. USENIX Security Symposium 2022: 753-770 - 2021
- [c24]Matthew Traudt, Rob Jansen, Aaron Johnson:
FlashFlow: A Secure Speed Test for Tor. ICDCS 2021: 381-391 - [c23]Rob Jansen, Aaron Johnson:
On the Accuracy of Tor Bandwidth Estimation. PAM 2021: 481-498 - [c22]Rob Jansen, Justin Tracey, Ian Goldberg:
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. USENIX Security Symposium 2021: 3415-3432 - [i6]Rob Jansen, Justin Tracey, Ian Goldberg:
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation. CoRR abs/2102.05196 (2021) - 2020
- [i5]Matthew Traudt, Rob Jansen, Aaron Johnson:
FlashFlow: A Secure Speed Test for Tor. CoRR abs/2004.09583 (2020)
2010 – 2019
- 2019
- [j3]Rob Jansen, Matthew Traudt, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson:
KIST: Kernel-Informed Socket Transport for Tor. ACM Trans. Priv. Secur. 22(1): 3:1-3:37 (2019) - [j2]Peter A. H. Peterson, Rob Jansen:
12th USENIX Workshop on Cyber Security Experimentation and Test (CSET '19). login Usenix Mag. 44(4) (2019) - [c21]Rob Jansen, Tavish Vaidya, Micah Sherr:
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. USENIX Security Symposium 2019: 1823-1840 - [e3]Rob Jansen, Peter A. H. Peterson:
12th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2019, Santa Clara, CA, USA, August 12, 2019. USENIX Association 2019 [contents] - 2018
- [c20]Rob Jansen, Matthew Traudt, Nicholas Hopper:
Privacy-Preserving Dynamic Learning of Tor Network Traffic. CCS 2018: 1944-1961 - [c19]Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr:
Understanding Tor Usage with Privacy-Preserving Measurement. Internet Measurement Conference 2018: 175-187 - [c18]Rob Jansen, Marc Juarez, Rafa Gálvez, Tariq Elahi, Claudia Díaz:
Inside Job: Applying Traffic Analysis to Measure Tor from Within. NDSS 2018 - [c17]Justin Tracey, Rob Jansen, Ian Goldberg:
High Performance Tor Experimentation from the Magic of Dynamic ELFs. CSET @ USENIX Security Symposium 2018 - [e2]Lex Gill, Rob Jansen:
8th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2018, Baltimore, MD, USA, August 14, 2018. USENIX Association 2018 [contents] - [i4]Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr:
Understanding Tor Usage with Privacy-Preserving Measurement. CoRR abs/1809.08481 (2018) - 2017
- [j1]Aaron Johnson, Rob Jansen, Nicholas Hopper, Aaron Segal, Paul Syverson:
PeerFlow: Secure Load Balancing in Tor. Proc. Priv. Enhancing Technol. 2017(2): 74-94 (2017) - [c16]Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, Paul Syverson:
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection. NDSS 2017 - [i3]Rob Jansen, Matthew Traudt:
Tor's Been KIST: A Case Study of Transitioning Tor Research to Practice. CoRR abs/1709.01044 (2017) - 2016
- [c15]Rob Jansen, Aaron Johnson:
Safely Measuring Tor. CCS 2016: 1553-1567 - 2015
- [c14]Nicholas Hopper, Rob Jansen:
WPES 2015: The 14th Workshop on Privacy in the Electronic Society. CCS 2015: 1719-1720 - [e1]Indrajit Ray, Nicholas Hopper, Rob Jansen:
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, WPES 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3820-2 [contents] - [i2]Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, Paul F. Syverson:
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection. CoRR abs/1511.05453 (2015) - [i1]Andrew Miller, Rob Jansen:
Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. IACR Cryptol. ePrint Arch. 2015: 469 (2015) - 2014
- [c13]Rob Jansen, Florian Tschorsch, Aaron Johnson, Björn Scheuermann:
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. NDSS 2014 - [c12]Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul F. Syverson:
Never Been KIST: Tor's Congestion Management Blossoms with Kernel-Informed Socket Transport. USENIX Security Symposium 2014: 127-142 - [c11]John Geddes, Rob Jansen, Nicholas Hopper:
IMUX: Managing Tor Connections from Two to Infinity, and Beyond. WPES 2014: 181-190 - 2013
- [c10]Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, Paul F. Syverson:
Users get routed: traffic correlation on tor by realistic adversaries. CCS 2013: 337-348 - [c9]Aaron Johnson, Rob Jansen, Paul F. Syverson:
Onions for Sale: Putting Privacy on the Market. Financial Cryptography 2013: 399-400 - [c8]Rob Jansen, Aaron Johnson, Paul F. Syverson:
LIRA: Lightweight Incentivized Routing for Anonymity. NDSS 2013 - [c7]John Geddes, Rob Jansen, Nicholas Hopper:
How Low Can You Go: Balancing Performance with Anonymity in Tor. Privacy Enhancing Technologies 2013: 164-184 - 2012
- [c6]Rob Jansen, Nicholas Hopper:
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. NDSS 2012 - [c5]Rob Jansen, Nicholas Hopper, Paul F. Syverson:
Throttling Tor Bandwidth Parasites. NDSS 2012 - [c4]Rob Jansen, Kevin S. Bauer, Nicholas Hopper, Roger Dingledine:
Methodically Modeling the Tor Network. CSET 2012 - [c3]Rob Jansen, Paul F. Syverson, Nicholas Hopper:
Throttling Tor Bandwidth Parasites. USENIX Security Symposium 2012: 349-363 - 2010
- [c2]Rob Jansen, Nicholas Hopper, Yongdae Kim:
Recruiting new tor relays with BRAIDS. CCS 2010: 319-328
2000 – 2009
- 2009
- [c1]Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim:
Membership-concealing overlay networks. CCS 2009: 390-399
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint