@inproceedings{feps-ccs2024,
author={Ellis Fenske and Aaron Johnson},
title={Bytes to Schlep? Use a {FEP}: Hiding Protocol Metadata with Fully Encrypted Protocols},
year={2024},
journal={Proceedings of the 31st ACM Conference on Computer and Communications Security (CCS '24)},
year = {2024},
publisher = {ACM}
}
|
@inproceedings{retracer-wpes2024,
author={Rob Jansen and Ryan Wails and Aaron Johnson},
title={Repositioning Real-World Website Fingerprinting on Tor},
year={2024},
journal={Proceedings of the 23rd ACM Workshop on Privacy in the Electronic Society (WPES '24)},
year = {2024},
publisher = {ACM}
}
|
@misc{gtt23-arxiv,
title={A Measurement of Genuine Tor Traces for Realistic Website Fingerprinting},
author={Rob Jansen and Ryan Wails and Aaron Johnson},
year={2024},
eprint={2404.07892},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
|
@inproceedings{wakson-ccs2023,
author = {Sajin Sasy and Aaron Johnson and Ian Goldberg},
title = {Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks},
journal = {Proceedings of the 30th ACM Conference on Computer and Communications Security (CCS '23)},
year = {2023},
publisher = {ACM}
}
|
@article{torweights-pets2023,
author = {Aaron Johnson and Aaron D. Jaggard and Paul Syverson},
title = {Throwing Your Weight Around: Fixing Tor's Positional Weighting},
journal = {Proceedings on Privacy Enhancing Technologies},
year = {2023},
volume = {2023},
number = {4}
}
|
@inproceedings{proteus-foci2023,
author = {Ryan Wails and Rob Jansen and Aaron Johnson and Micah Sherr},
title = {Proteus: Programmable Protocols for Censorship Circumvention},
journal = {Free and Open Communications on the Internet (FOCI 2023)},
year = {2023}
}
|
@inproceedings{feps-foci2023,
author = {Ellis Fenske and Aaron Johnson},
title = {Security Notions for Fully Encrypted Protocols},
journal = {Free and Open Communications on the Internet (FOCI 2023)},
year = {2023}
}
|
@inproceedings{oblivshuffle-ccs2022,
author = {Sajin Sasy and Aaron Johnson and Ian Goldberg},
title = {Fast Fully Oblivious Compaction and Shuffling},
journal = {Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS '22)},
year = {2022},
publisher = {ACM}
}
|
@inproceedings{dpmic-icml2022,
title = {Differentially Private Maximal Information Coefficients},
author = {John Lazarsfeld and Aaron Johnson and Emmanuel Adeniran},
booktitle = {Proceedings of the 39th International Conference on Machine Learning (ICML 2022)},
year = {2022},
volume = {162},
series = {Proceedings of Machine Learning Research},
publisher = {PMLR}
}
|
@article{psc-tops2022,
title={Accountable Private Set Cardinality for Distributed Measurement},
author={Ellis Fenske and Akshaya Mani and Aaron Johnson and Micah Sherr},
journal = {ACM Transactions on Privacy and Security (TOPS)},
volume = {25},
number = {4},
month = {May},
year = {2022},
articleno = {25}
}
|
@misc{miccons-arxiv2021,
title={Consistency of the Maximal Information Coefficient Estimator},
author={John Lazarsfeld and Aaron Johnson},
year={2021},
eprint={2107.03836},
archivePrefix={arXiv},
primaryClass={stat.ME}
}
|
@inproceedings{flashflow-icdcs2021,
author = {Matthew Traudt and Rob Jansen and Aaron Johnson},
title = {FlashFlow: A Secure Speed Test for Tor},
journal = {Proceedings of the 41st IEEE International Conference on Distributed Computing Systems (ICDCS 2021)},
year = {2021},
publisher = {IEEE}
}
|
@inproceedings{torbwest-pam2021,
author = {Rob Jansen and Aaron Johnson},
title = {On the Accuracy of Tor Bandwidth Estimation},
journal = {Proceedings of the 22nd Passive and Active Measurement Conference (PAM 2021)},
year = {2021},
publisher = {Springer}
}
|
@inproceedings{claps-ccs2020,
author = {Florentin Rochet and Ryan Wails and Aaron Johnson and Prateek Mittal and Olivier Pereira},
title = {CLAPS: Client-Location-Aware Path Selection in Tor},
journal = {Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS '20)},
year = {2020},
publisher = {ACM}
}
|
@inproceedings{stormy-ccs2019,
author = {Ryan Wails and Aaron Johnson and Daniel Starin and Arkady Yerukhimovich and S. Dov Gordon},
title = {Stormy: Statistics in Tor by Measuring Securely},
journal = {Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS '19)},
year = {2019},
publisher = {ACM}
}
|
@article{guard-placement-popets2019,
author = {Gerry Wan and Aaron Johnson and Ryan Wails and Sameer Wagh and Prateek Mittal},
title = {Guard Placement Attacks on Path Selection Algorithms for Tor},
journal = {Proceedings on Privacy Enhancing Technologies},
year = {2019},
volume = {2019},
number = {4}
}
|
@inproceedings{tor-usage-imc18,
author = {Akshaya Mani and T Wilson-Brown and Rob Jansen and Aaron Johnson and Micah Sherr},
title = {Understanding Tor Usage with Privacy-Preserving Measurement},
booktitle = {Proceedings of the Internet Measurement Conference 2018 (IMC '18)},
year = {2018},
publisher = {ACM}
}
|
@article{tempest-popets2018,
author = {Ryan Wails and Yixin Sun and Aaron Johnson and Mung Chiang and Prateek Mittal},
title = {Tempest: Temporal Dynamics in Anonymity Systems},
journal = {Proceedings on Privacy Enhancing Technologies},
year = {2018},
volume = {2018},
number = {3}
}
|
@inproceedings{psc-ccs2017,
author = {Ellis Fenske and Akshaya Mani and Aaron Johnson and Micah Sherr},
title = {Distributed Measurement with Private Set-Union Cardinality},
booktitle = {Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17)},
year = {2017},
publisher = {ACM}
}
|
@article{peerflow-popets2017,
author = {Aaron Johnson and Rob Jansen and Nicholas Hopper and Aaron Segal and Paul Syverson},
title = {PeerFlow: Secure Load Balancing in Tor},
journal = {Proceedings on Privacy Enhancing Technologies},
year = {2017},
volume = {2017},
number = {2}
}
|
@inproceedings{taps-ndss2017,
author = {Aaron Johnson and Rob Jansen and Aaron D. Jaggard and Joan Feigenbaum and Paul Syverson},
title = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection},
booktitle = {Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017)},
year = {2017},
publisher = {Internet Society}
}
|
@article{taps-arxiv,
author = {Aaron Johnson and Rob Jansen and Aaron D. Jaggard and Joan Feigenbaum and Paul Syverson},
title = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection},
url = {http://arxiv.org/abs/1511.05453},
}
|
@inproceedings{privcount-ccs2016,
author = {Rob Jansen and Aaron Johnson},
title = {Safely Measuring Tor},
booktitle = {Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16)},
year = {2016},
publisher = {ACM}
}
|
@article{tortraceroutes-pets15,
author = {Joshua Juen and Aaron Johnson and Anupam Das and Nikita Borisov and Matthew Caesar},
title = {Defending Tor from Network Adversaries: A Case Study of Network Path Prediction},
journal = {Proceedings on Privacy Enhancing Technologies},
year = {2015},
month = {June},
volume = {2015},
number = {2},
pages = {171--187},
doi = {10.1515/popets-2015-0021}
}
|
@techreport{hidden-service-stats-techreport,
author = {David Goulet and Aaron Johnson and George Kadianakis and Karsten Loesing},
title = {Hidden-service statistics reported by relays},
institution = {The Tor Project, Inc.},
year = {2015},
month = {April},
number = {2015-04-001}
}
|
@article{trustrep-popets15,
author = {Aaron D. Jaggard and Aaron Johnson and Sarah Cortes and Paul Syverson and Joan Feigenbaum},
title = {20,000 In League Under the Sea: Anonymous Communication, Trust, {MLAT}s, and Undersea Cables},
journal = {Proceedings on Privacy Enhancing Technologies},
year = {2015},
month = {April},
volume = {2015},
number = {1},
pages = {4--24},
doi = {10.1515/popets-2015-0002}
}
|
@article{dissent-analysis-tissec14,
author = {Ewa Syta and Aaron Johnson and Henry Corrigan-Gibbs and Shu-Chun Weng and David Wolinsky and Bryan Ford},
title = {Security Analysis of Accountable Anonymity in Dissent},
journal = {ACM Transactions on Information and System Security (TISSEC)},
volume = {17},
number = {1},
month = {August},
year = {2014},
articleno = {4}
}
|
@techreport{dissent-analysis-techreport,
author = {Ewa Syta and Aaron Johnson and Henry Corrigan-Gibbs and Shu-Chun Weng and David Wolinsky and and Bryan Ford},
title = {Security Analysis of Accountable Anonymous Group Communication in Dissent},
institution = {Yale University},
year = {2013}
}
|
@inproceedings{sniper-ndss2014,
author = {Rob Jansen and Florian Tschorsch and Aaron Johnson and Bj{\"o}rn Scheuermann},
title = {The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network},
booktitle = {Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS 2014)},
year = {2014},
publisher = {Internet Society}
}
|
@inproceedings{usersrouted-ccs13,
author = {Aaron Johnson and Chris Wacek and Rob Jansen and Micah Sherr and Paul Syverson},
title = {Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries},
booktitle = {Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13)},
year = {2013},
publisher = {ACM}
}
|
@techreport{dissent-analysis-techreport,
author = {Ewa Syta and Aaron Johnson and Henry Corrigan-Gibbs and Shu-Chun Weng and David Wolinsky and and Bryan Ford},
title = {Security Analysis of Accountable Anonymous Group Communication in Dissent},
institution = {Yale University},
year = {2013}
}
|
@inproceedings{lira-ndss13,
author = {Rob Jansen and Aaron Johnson and Paul Syverson},
title = {{LIRA}: Lightweight Incentivized Routing for Anonymity},
booktitle = {Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS 2013)},
year = {2013},
publisher = {Internet Society}
}
|
@inproceedings{dissent-osdi12,
author = {David Isaac Wolinsky and Henry Corrigan-Gibbs and Bryan Ford and Aaron Johnson},
title = {Dissent in Numbers: Making Strong Anonymity Scale},
booktitle = {Proceedings of the Tenth USENIX Symposium on Operating Systems Design and Implementation (OSDI '12)},
year = {2012},
publisher = {USENIX Association}
}
|
@article{or-blackbox-tissec,
title = {Probabilistic Analysis of Onion Routing in a Black-box Model},
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
journal = {ACM Transactions on Information and System Security (TISSEC)},
year = {2012},
volume = {15},
number = {3},
month = {November}
}
|
@inproceedings{d3-eurosec12,
author = {David Isaac Wolinsky and Henry Corrigan-Gibbs and Bryan Ford and Aaron Johnson},
title = {Scalable Anonymous Group Communication in the Anytrust Model},
booktitle = {Proceedings of the Fifth European Workshop on System Security (EuroSec 2012)},
year = {2012},
publisher = {ACM Digital Library}
}
|
@inproceedings{trust-ccs11,
author = {Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson},
title = {Trust-based Anonymous Communication: Adversary Models and Routing Algorithms},
booktitle = {Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011)},
pages = {175--186},
year = {2011},
publisher = {ACM}
}
|
@inproceedings{active-pets10,
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
title = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication (Extended Abstract)},
booktitle = {Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010)},
pages = {166--183},
year = {2010},
publisher = {Springer}
}
|
@techreport{active-techreport,
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
title = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication},
institution = {The University of Texas at Austin},
year = {2010}
}
|
@inproceedings{trust-csf09,
author = {Aaron Johnson and Paul Syverson},
title = {More Anonymous Onion Routing Through Trust},
booktitle = {Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF 2009)},
pages = {3--12},
year = {2009},
publisher = {IEEE Computer Society}
}
|
@inproceedings{limit-wine08,
author = {Kevin L. Chang and Aaron Johnson},
title = {Online and Offline Selling in Limit Order Markets},
booktitle = {Proceedings of the 4th International Workshop on Internet and Network Economics (WINE 2008)},
pages = {41--52},
year = {2008},
publisher = {Springer}
}
|
@inproceedings{orblackbox-wpes07,
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
title = {Probabilistic Analysis of Onion Routing in a Black-box Model (Extended abstract)},
booktitle = {Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007)},
pages = {1--10},
year = {2007},
publisher = {ACM}
}
|
@inproceedings{pws-wpes07,
author = {Felipe Saint-Jean and Aaron Johnson and Dan Boneh and Joan Feigenbaum},
title = {Private Web Search},
booktitle = {Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007)},
pages = {84--90},
year = {2007},
publisher = {ACM}
}
|
@inproceedings{ormodel-fc07,
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
title = {A Model of Onion Routing with Provable Anonymity},
booktitle = {Proceedings of Financial Cryptography and Data Security '07 (FC 2007)},
pages = {57--71},
year = {2007},
publisher = {Springer}
}
|
@phdthesis{ajohnson-phdthesis,
author = {Aaron Johnson},
title = {Design and Analysis of Efficient Anonymous-Communication Protocols},
school = {Yale University},
year = {2009}
}
|