• Publications
  • Influence
How much anonymity does network latency leak?
TLDR
We present two attacks on low-latency anonymity schemes using this information. Expand
  • 120
  • 15
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
TLDR
We propose a novel attack called a fork after withholding (FAW) attack. Expand
  • 110
  • 13
  • PDF
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
TLDR
This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes' battery power. Expand
  • 136
  • 12
  • PDF
Losing control of the internet: using the data plane to attack the control plane
TLDR
We introduce the Coordinated Cross Plane Session Termination, or CXPST, attack, a distributed denial of service attack that attacks the control plane of the Internet. Expand
  • 83
  • 8
  • PDF
Membership-concealing overlay networks
TLDR
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. Expand
  • 66
  • 7
  • PDF
SilentKnock: practical, provably undetectable authentication
TLDR
We introduce a formal security model for port knocking, show how previous schemes fail to meet our definition, and give a provably secure scheme that integrates seamlessly with existing applications. Expand
  • 32
  • 5
  • PDF
How much anonymity does network latency leak?
TLDR
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by "local" adversaries who control only a few machines, and have low enough delay to support anonymous use of network services like web browsing and remote login. Expand
  • 125
  • 4
  • PDF
Rationale and Architecture Principles for Medical Application Platforms
TLDR
We present the clinical safety/effectiveness and economic motivations for MAPs, and describe key characteristics of MAPs that are guiding the search for appropriate technology, regulatory, and ecosystem solutions. Expand
  • 89
  • 3
  • PDF
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
TLDR
Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. Expand
  • 26
  • 2
  • PDF
Toward a safe integrated clinical environment: a communication security perspective
TLDR
We enumerate security requirements for the communication stack of a medical composition framework and find significant gaps between required properties and those that can be fulfilled even by combinations of currently standardized protocols. Expand
  • 17
  • 2
  • PDF