Aaron Johnson

Orcid: 0000-0002-2057-1690

Affiliations:
  • U.S. Naval Research Laboratory, Washington, D.C., USA


According to our database1, Aaron Johnson authored at least 37 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bytes to Schlep? Use a FEP: Hiding Protocol Metadata with Fully Encrypted Protocols.
CoRR, 2024

A Measurement of Genuine Tor Traces for Realistic Website Fingerprinting.
CoRR, 2024

2023
Throwing Your Weight Around: Fixing Tor's Positional Weighting.
Proc. Priv. Enhancing Technol., October, 2023

Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks.
IACR Cryptol. ePrint Arch., 2023

2022
Accountable Private Set Cardinality for Distributed Measurement.
ACM Trans. Priv. Secur., 2022

Fast Fully Oblivious Compaction and Shuffling.
IACR Cryptol. ePrint Arch., 2022

2021
Editors' Introduction.
Proc. Priv. Enhancing Technol., 2021

On the Accuracy of Tor Bandwidth Estimation.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

FlashFlow: A Secure Speed Test for Tor.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

2020
CLAPS: Client-Location-Aware Path Selection in Tor.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Guard Placement Attacks on Path Selection Algorithms for Tor.
Proc. Priv. Enhancing Technol., 2019

Stormy: Statistics in Tor by Measuring Securely.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Tempest: Temporal Dynamics in Anonymity Systems.
Proc. Priv. Enhancing Technol., 2018

Understanding Tor Usage with Privacy-Preserving Measurement.
Proceedings of the Internet Measurement Conference 2018, 2018

17th Workshop on Privacy in the Electronic Society (WPES 2018).
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
PeerFlow: Secure Load Balancing in Tor.
Proc. Priv. Enhancing Technol., 2017

Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Distributed Measurement with Private Set-Union Cardinality.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Safely Measuring Tor.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.
Proc. Priv. Enhancing Technol., 2015

20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables.
Proc. Priv. Enhancing Technol., 2015

2014
Security Analysis of Accountable Anonymity in Dissent.
ACM Trans. Inf. Syst. Secur., 2014

Representing Network Trust and Using It to Improve Anonymous Communication.
CoRR, 2014

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
LIRA: Lightweight Incentivized Routing for Anonymity.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Privacy-preserving data exploration in genome-wide association studies.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Onions for Sale: Putting Privacy on the Market.
Proceedings of the Financial Cryptography and Data Security, 2013

Users get routed: traffic correlation on tor by realistic adversaries.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Probabilistic analysis of onion routing in a black-box model.
ACM Trans. Inf. Syst. Secur., 2012

Dissent in Numbers: Making Strong Anonymity Scale.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

2011
Trust-based anonymous communication: adversary models and routing algorithms.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Preventing Active Timing Attacks in Low-Latency Anonymous Communication.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
More Anonymous Onion Routing Through Trust.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2007
Private web search.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

A Model of Onion Routing with Provable Anonymity.
Proceedings of the Financial Cryptography and Data Security, 2007

2004
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004


  Loading...