Nicholas Hopper

Orcid: 0000-0003-2536-9587

Affiliations:
  • University of Minnesota, USA


According to our database1, Nicholas Hopper authored at least 90 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DeTorrent: An Adversarial Padding-only Traffic Analysis Defense.
Proc. Priv. Enhancing Technol., January, 2024

Laserbeak: Evolving Website Fingerprinting Attacks With Attention and Multi-Channel Feature Representation.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Committee Moderation on Encrypted Messaging Platforms.
CoRR, 2023

Poster: No safety in numbers: traffic analysis of sealed-sender groups in Signal.
CoRR, 2023

SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
RegulaTor: A Straightforward Website Fingerprinting Defense.
Proc. Priv. Enhancing Technol., 2022

Padding-only Defenses Add Delay in Tor.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
GANDaLF: GAN for Data-Limited Fingerprinting.
Proc. Priv. Enhancing Technol., 2021

Grades of Trust in Multiparty Computation.
IACR Cryptol. ePrint Arch., 2021

2020
RegulaTOR: A Powerful Website Fingerprinting Defense.
CoRR, 2020

2019
p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning.
Proc. Priv. Enhancing Technol., 2019

2018
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR.
Proc. Priv. Enhancing Technol., 2018

End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability.
IACR Cryptol. ePrint Arch., 2018

MP3: A More Efficient Private Presence Protocol.
Proceedings of the Financial Cryptography and Data Security, 2018

End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Measuring Information Leakage in Website Fingerprinting Attacks and Defenses.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Privacy-Preserving Dynamic Learning of Tor Network Traffic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Fingerprinting Keywords in Search Queries over Tor.
Proc. Priv. Enhancing Technol., 2017

PeerFlow: Secure Load Balancing in Tor.
Proc. Priv. Enhancing Technol., 2017

Traffic Analysis with Deep Learning.
CoRR, 2017

Measuring Information Leakage in Website Fingerprinting Attacks.
CoRR, 2017

Is Bob Sending Mixed Signals?
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2016
Mailet: Instant Social Networking under Censorship.
Proc. Priv. Enhancing Technol., 2016

E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes With Economic Incentives.
CoRR, 2016

Anarchy in Tor: Performance Cost of Decentralization.
CoRR, 2016

ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

The Cost of the Path Not Taken.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Hijacking the Vuze BitTorrent network: all your hop are belong to us.
IET Inf. Secur., 2015

WPES 2015: The 14th Workshop on Privacy in the Electronic Society.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
IMUX: Managing Tor Connections from Two to Infinity, and Beyond.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Challenges in Protecting Tor Hidden Services from Botnet Abuse.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
IEEE Trans. Mob. Comput., 2013

Attacking the kad network - real world evaluation and high fidelity simulation using DVN.
Secur. Commun. Networks, 2013

Improved group off-the-record messaging.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

How Low Can You Go: Balancing Performance with Anonymity in Tor.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Peer Pressure: Exerting Malicious Influence on Routers at a Distance.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Cover your ACKs: pitfalls of covert channel censorship circumvention.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
One-Way Indexing for Plausible Deniability in Censorship Resistant Storage.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

New Attacks on Timing-based Network Flow Watermarks.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Throttling Tor Bandwidth Parasites.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Methodically Modeling the Tor Network.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Location leaks over the GSM air interface.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Efficient Private Proximity Testing with GSM Location Sketches.
Proceedings of the Financial Cryptography and Data Security, 2012

Routing around decoys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

On the mixing time of directed social graphs and security implications.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

KoNKS: konsensus-style network koordinate system.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems.
ACM Trans. Inf. Syst. Secur., 2011

FAUST: efficient, TTP-free abuse prevention by anonymous whitelisting.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Accurate and Provably Secure Latency Estimation with Treeple.
Proceedings of the Network and Distributed System Security Symposium, 2011

Keep your friends close: Incorporating trust into social network-based Sybil defenses.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Understanding Social Networks Properties for Trustworthy Computing.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011

2010
How much anonymity does network latency leak?
ACM Trans. Inf. Syst. Secur., 2010

Balancing the shadows.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Jack: scalable accumulator-based nymble system.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Losing control of the internet: using the data plane to attack the control plane.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Designs to account for trust in social network-based sybil defenses.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Recruiting new tor relays with BRAIDS.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Secure latency estimation with treeple.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Provably Secure Steganography.
IEEE Trans. Computers, 2009

Silent Knock : practical, provably undetectable authentication.
Int. J. Inf. Sec., 2009

Hashing it out in public: common failure modes of DHT-based anonymity schemes.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009

Why Kad Lookup Fails.
Proceedings of the Proceedings P2P 2009, 2009

Membership-concealing overlay networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Scalable onion routing with torsk.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Towards complete node enumeration in a peer-to-peer botnet.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Provably Secure Timed-Release Public Key Encryption.
ACM Trans. Inf. Syst. Secur., 2008

Attacking the Kad network.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Breaking and Provably Fixing Minx.
Proceedings of the Privacy Enhancing Technologies, 2008

Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
Combating Double-Spending Using Cooperative P2P Systems.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

SilentKnock: Practical, Provably Undetectable Authentication.
Proceedings of the Computer Security, 2007

2006
From Weak to Strong Watermarking.
IACR Cryptol. ePrint Arch., 2006

On the effectiveness of <i>k</i>;-anonymity against traffic analysis and surveillance.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Selectively Traceable Anonymity.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Robust Accounting in Decentralized P2P Storage Systems.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

2005
Covert two-party computation.
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005

On Steganographic Chosen Covertext Security.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

2004
Timed-Release and Key-Insulated Public Key Encryption.
IACR Cryptol. ePrint Arch., 2004

2003
Public Key Steganography.
IACR Cryptol. ePrint Arch., 2003

CAPTCHA: Using Hard AI Problems for Security.
Proceedings of the Advances in Cryptology, 2003

k-anonymous message transmission.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2001
Secure Human Identification Protocols.
Proceedings of the Advances in Cryptology, 2001

1999
AppGP: an alternative structural representation for GP.
Proceedings of the 1999 Congress on Evolutionary Computation, 1999


  Loading...