19992019

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2019

    End-to-end secure mobile group messaging with conversation integrity and deniability

    Schliep, M. & Hopper, N., Nov 11 2019, WPES 2019 - Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. Association for Computing Machinery, p. 55-73 19 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • 2018

    Measuring information leakage in website fingerprinting attacks and defenses

    Li, S., Guo, H. & Hopper, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1977-1992 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • MP3: A More Efficient Private Presence Protocol

    Parhi, R., Schliep, M. & Hopper, N., 2018, Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers. Meiklejohn, S. & Sako, K. (eds.). Springer Verlag, p. 38-57 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10957 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy-preserving dynamic learning of tor network traffic

    Jansen, R., Traudt, M. & Hopper, N., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1944-1961 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2017

    Is bob sending mixed signals?

    Schliep, M., Kariniemi, I. & Hopper, N., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 31-40 10 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2016

    ABRA CADABRA: Magically increasing network utilization in tor by avoiding bottlenecks

    Geddes, J., Schliep, M. & Hopper, N., Oct 24 2016, WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 165-176 12 p. (WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    4 Scopus citations
  • The cost of the path not taken

    Schuchard, M., Geddes, J., Schliep, M. & Hopper, N., 2016, 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7842316. (2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    WPES 2015: The 14th Workshop on Privacy in the Electronic Society

    Hopper, N. & Jansen, R., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1719-1720 2 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Challenges in protecting tor hidden services from botnet abuse

    Hopper, N., 2014, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers. Safavi-Naini, R. & Christin, N. (eds.). Springer Verlag, p. 316-325 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8437).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Facet: Streaming over videoconferencing for censorship circumvention

    Li, S., Schliep, M. & Hopper, N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 163-172 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • IMUX: Managing tor connections from two to infinity, and beyond

    Geddes, J., Jansen, R. & Hopper, N., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 181-190 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • 2013

    Cover your ACKs: Pitfalls of covert channel censorship circumvention

    Geddes, J., Schuchard, M. & Hopper, N., Dec 9 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 361-372 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • How low can you go: Balancing performance with anonymity in Tor

    Geddes, J., Jansen, R. & Hopper, N., 2013, Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Proceedings. p. 164-184 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7981 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Improved group off-the-record messaging

    Liu, H., Vasserman, E. Y. & Hopper, N., Dec 9 2013, WPES 2013 - Proceedings of the 2013 ACM Workshop on Privacy in the Electronic Society, Co-located with CCS 2013. p. 249-254 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Peer pressure: Exerting malicious influence on routers at a distance

    Schuchard, M., Thompson, C., Hopper, N. & Kim, Y., Dec 1 2013, Proceedings - 2013 IEEE 33rd International Conference on Distributed Computing Systems, ICDCS 2013. p. 571-580 10 p. 6681626. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2012

    BNymble: More anonymous blacklisting at almost no cost (a short paper)

    Lofgren, P. & Hopper, N., 2012, Financial Cryptography and Data Security - 15th International Conference, FC 2011, Revised Selected Papers. p. 268-275 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7035 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Efficient private proximity testing with GSM location sketches

    Lin, Z., Foo Kune, D. & Hopper, N., 2012, Financial Cryptography and Data Security - 16th International Conference, FC 2012, Revised Selected Papers. p. 73-88 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7397 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • On the mixing time of directed social graphs and security implications

    Mohaisen, A., Tran, H., Hopper, N. & Kim, Y., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 36-37 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Routing around decoys

    Schuchard, M., Geddes, J., Thompson, C. & Hopper, N., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 85-96 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • 2011

    FAUST: Efficient, TTP-free abuse prevention by anonymous whitelisting

    Lofgren, P. & Hopper, N., Nov 16 2011, WPES'11 - Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society. p. 125-130 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Keep your friends close: Incorporating trust into social network-based Sybil defenses

    Mohaisen, A., Hopper, N. & Kim, Y., 2011, 2011 Proceedings IEEE INFOCOM. p. 1943-1951 9 p. 5934998. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    78 Scopus citations
  • Understanding social networks properties for trustworthy computing

    Mohaisen, A., Tran, H., Hopper, N. & Kim, Y., 2011, Proceedings - 31st International Conference on Distributed Computing Systems Workshops, ICDCSW 2011. p. 154-159 6 p. 5961381. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2010

    Balancing the shadows

    Schuchard, M., Dean, A. W., Heorhiadi, V., Hopper, N. & Kim, Y., 2010, Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10. p. 1-10 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Designs to account for trust in social network-based Sybil defenses

    Mohaisen, A., Hopper, N. & Kim, Y., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 714-716 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Jack: Scalable accumulator-based nymble system

    Lin, Z. & Hopper, N., Dec 21 2010, Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10. p. 53-62 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Losing control of the Internet: Using the data plane to attack the control plane

    Schuchard, M., Mohaisen, A., Foo Kune, D., Hopper, N., Kim, Y. & Vasserman, E. Y., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 726-728 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Scopus citations
  • Recruiting new tor relays with BRAIDS

    Jansen, R., Hopper, N. & Kim, Y., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 319-328 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • Secure latency estimation with Treeple

    Chan-Tin, E. & Hopper, N., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 660-662 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2009

    Hashing it out in public: Common failure modes of DHT-based anonymity schemes

    Tran, A., Hopper, N. & Kim, Y., 2009, Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 71-80 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Membership-concealing overlay networks

    Vasserman, E., Jansen, R., Tyra, J., Hopper, N. & Kim, Y., Dec 1 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 390-399 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design

    McLachlan, J. & Hopper, N., Dec 1 2009, Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 31-40 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Scalable onion routing with Torsk

    McLachlan, J., Tran, A., Hopper, N. & Kim, Y., 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 590-599 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    56 Scopus citations
  • The Frog-Boiling attack: Limitations of anomaly detection for secure network coordinate systems

    Chan-Tin, E., Feldman, D., Hopper, N. & Kim, Y., 2009, Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers. p. 448-458 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 19 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Towards complete node enumeration in a peer-to-peer botnet

    Kang, B. B., Chan-Tin, E., Lee, C. P., Tyra, J., Kang, H. J., Nunnery, C., Wadler, Z., Sinclair, G., Hopper, N., Dagon, D. & Kim, Y., 2009, Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09. p. 23-34 12 p. (Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • Why kad lookup fails

    Kang, H. J., Chan-Tin, E., Hopper, N. & Kim, Y., 2009, IEEE P2P'09 - 9th International Conference on Peer-to-Peer Computing. p. 121-130 10 p. 5284547. (IEEE P2P'09 - 9th International Conference on Peer-to-Peer Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • 2008

    Attacking the Kad network

    Wang, P., Tyra, J., Eric, C. T., Malchow, T., Kune, D. F., Hopper, N. & Kim, Y., 2008, Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08. 23. (Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • Breaking and provably fixing minx

    Shimshock, E., Staats, M. & Hopper, N., Sep 1 2008, Privacy Enhancing Technologies - 8th International Symposium, PETS 2008, Proceedings. p. 99-114 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5134 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Don't clog the queue! Circuit clogging and mitigation in P2P anonymity schemes

    McLachlan, J. & Hopper, N., Oct 27 2008, Financial Cryptography and Data Security - 12th International Conference, FC 2008, Revised Selected Papers. p. 31-46 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5143 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • 2007

    Combating double-spending using cooperative P2P systems

    Osipkov, I., Vasserman, E. Y., Hopper, N. & Yongdae, K., 2007, 27th International Conference on Distributed Computing Systems, ICDCS'07. 4268195. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • From weak to strong watermarking

    Hopper, N., Molnar, D. & Wagner, D., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Springer Verlag, p. 362-382 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    20 Scopus citations
  • How much anonymity does network latency leak?

    Hopper, N., Vasserman, E. Y. & Chan-Tin, E., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 82-91 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    64 Scopus citations
  • SilenTknock: Practical, provably undetectable authentication

    Vasserman, E. Y., Hopper, N., Laxson, J. & Tyra, J., 2007, Computer Security - ESORICS 2007 - 12th European Symposium on Research in Computer Security, Proceedings. Springer Verlag, p. 122-138 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4734 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2006

    On the effectiveness of k-anonymity against traffic analysis and surveillance

    Hopper, N. & Vasserman, E. Y., Dec 1 2006, Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, WPES 2006, Co-located with the 13th ACM Conference on Computer and Communications Security, CCS 2006. p. 9-18 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Robust accounting in decentralized P2P storage systems

    Osipkov, I., Wang, P., Hopper, N. & Kim, Y., 2006, 26th IEEE Internationa26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006. Institute of Electrical and Electronics Engineers Inc., p. 14-23 10 p. 1648801. (Proceedings - International Conference on Distributed Computing Systems; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Selectively traceable anonymity

    Von Ahn, L., Bortz, A., Hopper, N. & O'Neill, K., Dec 1 2006, Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Revised Selected Papers. p. 208-222 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4258 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Timed-release and key-insulated public key encryption

    Cheon, J. H., Hopper, N., Kim, Y. & Osipkov, I., 2006, Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers. Springer Verlag, p. 191-205 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • 2002

    Provably secure steganography: (Extended abstract)

    Hopper, N. J., Langford, J. & Von Ahn, L., 2002, Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings. Yung, M. (ed.). Springer Verlag, p. 77-92 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    84 Scopus citations
  • 2001

    Secure human identification protocols

    Hopper, N. J. & Blum, M., 2001, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Boyd, C. (ed.). Springer Verlag, p. 52-66 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    374 Scopus citations