• Publications
  • Influence
A Practical Congestion Attack on Tor Using Long Paths
In 2005, Murdoch and Danezis demonstrated the first practical congestion attack against a deployed anonymity network. They could identify which relays were on a target Tor user's path by buildingExpand
  • 175
  • 9
  • PDF
Autonomous NAT Traversal
Traditional NAT traversal methods require the help of a third party for signalling. This paper investigates a new autonomous method for establishing connections to peers behind NAT. The proposedExpand
  • 31
  • 4
  • PDF
R5N: Randomized recursive routing for restricted-route networks
This paper describes a new secure DHT routing algorithm for open, decentralized P2P networks operating in a restricted-route environment with malicious participants. We have implemented our routingExpand
  • 30
  • 3
  • PDF
All your Root Checks are Belong to Us: The Sad State of Root Detection
In our research, most of our analysis was based on statically reverse engineering the applications. However we wanted to combine this with dynamic analysis to make sure our findings were correct andExpand
  • 9
  • 2
Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols
This paper presents details on the design and implementation of a scalable framework for evaluating peer-to-peer protocols. Unlike systems based on simulation, emulation-based systems enable theExpand
  • 12
  • 2
  • PDF
Cloud resiliency and security via diversified replica execution and monitoring
The Information Technology industry heavily relies on the cloud computing paradigm for large-scale infrastructures, and more military and critical infrastructure systems are moving towards cloudExpand
  • 16
  • 2
Efficient and Secure Decentralized Network Size Estimation
The size of a Peer-to-Peer (P2P) network is an important parameter for performance tuning of P2P routing algorithms. This paper introduces and evaluates a new efficient method for participants in anExpand
  • 15
  • 1
  • PDF
NICE: endpoint-based topology discovery
We present a novel method of layer 2 network topology discovery for Ethernet LANs through the coordinated operation of endpoints/hosts, part of a research project called NICE (Network IntrospectionExpand
  • 2
  • 1
MINESTRONE: Testing the SOUP
Software development using type-unsafe languages (e.g., C and C++) is a challenging task for several reasons, security being one of the most important. Ensuring that a piece of code is bug orExpand
  • 7
  • 1
  • PDF
Distributed Stream Processing with DUP
This paper introduces the DUP System, a simple framework for parallel stream processing. The DUP System enables developers to compose applications from stages written in almost any programmingExpand
  • 5
  • 1
  • PDF