@inproceedings{feps-ccs2024,
  author={Ellis Fenske and Aaron Johnson},
  title={Bytes to Schlep? Use a {FEP}: Hiding Protocol Metadata with Fully Encrypted Protocols},
  year={2024},
  journal={Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS '24)},
  year = {2024},
  publisher = {ACM}
}
@inproceedings{retracer-wpes2024,
  author={Rob Jansen and Ryan Wails and Aaron Johnson},
  title={Repositioning Real-World Website Fingerprinting on Tor},
  year={2024},
  journal={Proceedings of the 23rd ACM Workshop on Privacy in the Electronic Society (WPES '24)},
  year = {2024},
  publisher = {ACM}
}
@misc{gtt23-arxiv,
  title={A Measurement of Genuine Tor Traces for Realistic Website Fingerprinting},
  author={Rob Jansen and Ryan Wails and Aaron Johnson},
  year={2024},
  eprint={2404.07892},
  archivePrefix={arXiv},
  primaryClass={cs.CR}
}
@inproceedings{wakson-ccs2023,
  author = {Sajin Sasy and Aaron Johnson and Ian Goldberg},
  title = {Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks},
  journal = {Proceedings of the 30th ACM Conference on Computer and Communications Security (CCS '23)},
  year = {2023},
  publisher = {ACM}
}
@article{torweights-pets2023,
  author = {Aaron Johnson and Aaron D. Jaggard and Paul Syverson},
  title = {Throwing Your Weight Around: Fixing Tor's Positional Weighting},
  journal = {Proceedings on Privacy Enhancing Technologies},
  year = {2023},
  volume = {2023},
  number = {4}
}
@inproceedings{proteus-foci2023,
  author = {Ryan Wails and Rob Jansen and Aaron Johnson and Micah Sherr},
  title = {Proteus: Programmable Protocols for Censorship Circumvention},
  journal = {Free and Open Communications on the Internet (FOCI 2023)},
  year = {2023}
}
@inproceedings{feps-foci2023,
  author = {Ellis Fenske and Aaron Johnson},
  title = {Security Notions for Fully Encrypted Protocols},
  journal = {Free and Open Communications on the Internet (FOCI 2023)},
  year = {2023}
}
@inproceedings{oblivshuffle-ccs2022,
  author = {Sajin Sasy and Aaron Johnson and Ian Goldberg},
  title = {Fast Fully Oblivious Compaction and Shuffling},
  journal = {Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS '22)},
  year = {2022},
  publisher = {ACM}
}
@inproceedings{dpmic-icml2022,
  title = {Differentially Private Maximal Information Coefficients},
  author = {John Lazarsfeld and Aaron Johnson and Emmanuel Adeniran},
  booktitle = {Proceedings of the 39th International Conference on Machine Learning (ICML 2022)},
  year = {2022},
  volume = {162},
  series = {Proceedings of Machine Learning Research},
  publisher = {PMLR}
}
@article{psc-tops2022,
  title={Accountable Private Set Cardinality for Distributed Measurement},
  author={Ellis Fenske and Akshaya Mani and Aaron Johnson and Micah Sherr},
  journal = {ACM Transactions on Privacy and Security (TOPS)},
  volume = {25},
  number = {4},
  month = {May},
  year = {2022},
  articleno = {25}
}
@misc{miccons-arxiv2021,
  title={Consistency of the Maximal Information Coefficient Estimator},
  author={John Lazarsfeld and Aaron Johnson},
  year={2021},
  eprint={2107.03836},
  archivePrefix={arXiv},
  primaryClass={stat.ME}
}
@inproceedings{flashflow-icdcs2021,
  author = {Matthew Traudt and Rob Jansen and Aaron Johnson},
  title = {FlashFlow: A Secure Speed Test for Tor},
  journal = {Proceedings of the 41st IEEE International Conference on Distributed Computing Systems (ICDCS 2021)},
  year = {2021},
  publisher = {IEEE}
}
@inproceedings{torbwest-pam2021,
  author = {Rob Jansen and Aaron Johnson},
  title = {On the Accuracy of Tor Bandwidth Estimation},
  journal = {Proceedings of the 22nd Passive and Active Measurement Conference (PAM 2021)},
  year = {2021},
  publisher = {Springer}
}
@inproceedings{claps-ccs2020,
  author = {Florentin Rochet and Ryan Wails and Aaron Johnson and Prateek Mittal and Olivier Pereira},
  title = {CLAPS: Client-Location-Aware Path Selection in Tor},
  journal = {Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20)},
  year = {2020},
  publisher = {ACM}
}
@inproceedings{stormy-ccs2019,
  author = {Ryan Wails and Aaron Johnson and Daniel Starin and Arkady Yerukhimovich and S. Dov Gordon},
  title = {Stormy: Statistics in Tor by Measuring Securely},
  journal = {Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS '19)},
  year = {2019},
  publisher = {ACM}
}
@article{guard-placement-popets2019,
  author = {Gerry Wan and Aaron Johnson and Ryan Wails and Sameer Wagh and Prateek Mittal},
  title = {Guard Placement Attacks on Path Selection Algorithms for Tor},
  journal = {Proceedings on Privacy Enhancing Technologies},
  year = {2019},
  volume = {2019},
  number = {4}
}
@inproceedings{tor-usage-imc18,
  author = {Akshaya Mani and T Wilson-Brown and Rob Jansen and Aaron Johnson and Micah Sherr},
  title = {Understanding Tor Usage with Privacy-Preserving Measurement},
  booktitle = {Proceedings of the Internet Measurement Conference 2018 (IMC '18)},
  year = {2018},
  publisher = {ACM}
}
@article{tempest-popets2018,
  author = {Ryan Wails and Yixin Sun and Aaron Johnson and Mung Chiang and Prateek Mittal},
  title = {Tempest: Temporal Dynamics in Anonymity Systems},
  journal = {Proceedings on Privacy Enhancing Technologies},
  year = {2018},
  volume = {2018},
  number = {3}
}
@inproceedings{psc-ccs2017,
  author = {Ellis Fenske and Akshaya Mani and Aaron Johnson and Micah Sherr},
  title = {Distributed Measurement with Private Set-Union Cardinality},
  booktitle = {Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17)},
  year = {2017},
  publisher = {ACM}
}
@article{peerflow-popets2017,
  author = {Aaron Johnson and Rob Jansen and Nicholas Hopper and Aaron Segal and Paul Syverson},
  title = {PeerFlow: Secure Load Balancing in Tor},
  journal = {Proceedings on Privacy Enhancing Technologies},
  year = {2017},
  volume = {2017},
  number = {2}
}
@inproceedings{taps-ndss2017,
  author = {Aaron Johnson and Rob Jansen and Aaron D. Jaggard and Joan Feigenbaum and Paul Syverson},
  title = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection},
  booktitle = {Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017)},
  year = {2017},
  publisher = {Internet Society}
}
@article{taps-arxiv,
  author = {Aaron Johnson and Rob Jansen and Aaron D. Jaggard and Joan Feigenbaum and Paul Syverson},
  title = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection},
  url = {http://arxiv.org/abs/1511.05453},
}
@inproceedings{privcount-ccs2016,
  author = {Rob Jansen and Aaron Johnson},
  title = {Safely Measuring Tor},
  booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)},
  year = {2016},
  publisher = {ACM}
}
@article{tortraceroutes-pets15,
  author = {Joshua Juen and Aaron Johnson and Anupam Das and Nikita Borisov and Matthew Caesar},
  title = {Defending Tor from Network Adversaries: A Case Study of Network Path Prediction},
  journal = {Proceedings on Privacy Enhancing Technologies},
  year = {2015},
  month = {June},
  volume = {2015},
  number = {2},
  pages = {171--187},
  doi = {10.1515/popets-2015-0021}
}
@techreport{hidden-service-stats-techreport,
  author = {David Goulet and Aaron Johnson and George Kadianakis and Karsten Loesing},
  title = {Hidden-service statistics reported by relays},
  institution = {The Tor Project, Inc.},
  year = {2015},
  month = {April},
  number = {2015-04-001}
}
@article{trustrep-popets15,
  author = {Aaron D. Jaggard and Aaron Johnson and Sarah Cortes and Paul Syverson and Joan Feigenbaum},
   title = {20,000 In League Under the Sea: Anonymous Communication, Trust, {MLAT}s, and Undersea Cables},
   journal = {Proceedings on Privacy Enhancing Technologies},
   year = {2015},
   month = {April},
   volume = {2015},
   number = {1},
   pages = {4--24},
   doi = {10.1515/popets-2015-0002}
}
@article{dissent-analysis-tissec14,
  author = {Ewa Syta and Aaron Johnson and Henry Corrigan-Gibbs and Shu-Chun Weng and David Wolinsky and Bryan Ford},
  title = {Security Analysis of Accountable Anonymity in Dissent},
  journal = {ACM Transactions on Information and System Security (TISSEC)},
  volume = {17},
  number = {1},
  month = {August},
  year = {2014},
  articleno = {4}
}
@techreport{dissent-analysis-techreport,
  author = {Ewa Syta and Aaron Johnson and Henry Corrigan-Gibbs and Shu-Chun Weng and David Wolinsky and and Bryan Ford},
  title = {Security Analysis of Accountable Anonymous Group Communication in Dissent},
  institution = {Yale University},
  year = {2013}
}
@inproceedings{sniper-ndss2014,
  author = {Rob Jansen and Florian Tschorsch and Aaron Johnson and Bj{\"o}rn Scheuermann},
  title = {The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network},
  booktitle = {Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS 2014)},
  year = {2014},
  publisher = {Internet Society}
}
@inproceedings{usersrouted-ccs13,
  author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul Syverson},
  title = {Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries},
  booktitle = {Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13)},
  year = {2013},
  publisher = {ACM}
}
@techreport{dissent-analysis-techreport,
  author = {Ewa Syta and Aaron Johnson and Henry Corrigan-Gibbs and Shu-Chun Weng and David Wolinsky and and Bryan Ford},
  title = {Security Analysis of Accountable Anonymous Group Communication in Dissent},
  institution = {Yale University},
  year = {2013}
}
@inproceedings{lira-ndss13,
  author = {Rob Jansen and Aaron Johnson and Paul Syverson},
  title = {{LIRA}: Lightweight Incentivized Routing for Anonymity},
  booktitle = {Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS 2013)},
  year = {2013},
  publisher = {Internet Society}
}
@inproceedings{dissent-osdi12,
  author = {David Isaac Wolinsky and Henry Corrigan-Gibbs and Bryan Ford and Aaron Johnson},
  title = {Dissent in Numbers: Making Strong Anonymity Scale},
  booktitle = {Proceedings of the Tenth USENIX Symposium on Operating Systems Design and Implementation (OSDI '12)},
  year = {2012},
  publisher = {USENIX Association}
}
@article{or-blackbox-tissec,
  title = {Probabilistic Analysis of Onion Routing in a Black-box Model},
  author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
  journal = {ACM Transactions on Information and System Security (TISSEC)},
  year = {2012},
  volume = {15},
  number = {3},
  month = {November}
}
@inproceedings{d3-eurosec12,
  author = {David Isaac Wolinsky and Henry Corrigan-Gibbs and Bryan Ford and Aaron Johnson},
  title = {Scalable Anonymous Group Communication in the Anytrust Model},
  booktitle = {Proceedings of the Fifth European Workshop on System Security (EuroSec 2012)},
  year = {2012},
  publisher = {ACM Digital Library}
}
@inproceedings{trust-ccs11,
  author = {Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson},
  title = {Trust-based Anonymous Communication: Adversary Models and Routing Algorithms},
  booktitle = {Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011)},
  pages = {175--186},
  year = {2011},
  publisher = {ACM}
}
@inproceedings{active-pets10,
  author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
  title = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication (Extended Abstract)},
  booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)},
  pages = {166--183},
  year = {2010},
  publisher = {Springer}
}
@techreport{active-techreport,
  author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
  title = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication},
  institution = {The University of Texas at Austin},
  year = {2010}
}
@inproceedings{trust-csf09,
  author = {Aaron Johnson and Paul Syverson},
  title = {More Anonymous Onion Routing Through Trust},
  booktitle = {Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF 2009)},
  pages = {3--12},
  year = {2009},
  publisher = {IEEE Computer Society}
}
@inproceedings{limit-wine08,
  author = {Kevin L. Chang and Aaron Johnson},
  title = {Online and Offline Selling in Limit Order Markets},
  booktitle = {Proceedings of the 4th International Workshop on Internet and Network Economics (WINE 2008)},
  pages = {41--52},
  year = {2008},
  publisher = {Springer}
}
@inproceedings{orblackbox-wpes07,
  author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
  title = {Probabilistic Analysis of Onion Routing in a Black-box Model (Extended abstract)},
  booktitle = {Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007)},
  pages = {1--10},
  year = {2007},
  publisher = {ACM}
}
@inproceedings{pws-wpes07,
  author = {Felipe Saint-Jean and Aaron Johnson and Dan Boneh and Joan Feigenbaum},
  title = {Private Web Search},
  booktitle = {Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007)},
  pages = {84--90},
  year = {2007},
  publisher = {ACM}
}
@inproceedings{ormodel-fc07,
  author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
  title = {A Model of Onion Routing with Provable Anonymity},
  booktitle = {Proceedings of  Financial Cryptography and Data Security '07 (FC 2007)},
  pages = {57--71},
  year = {2007},
  publisher = {Springer}
}
@phdthesis{ajohnson-phdthesis,
  author = {Aaron Johnson},
  title = {Design and Analysis of Efficient Anonymous-Communication Protocols},
  school = {Yale University},
  year = {2009}
}