Tobias Pulls

Orcid: 0000-0001-6459-8409

According to our database1, Tobias Pulls authored at least 43 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The eBPF Runtime in the Linux Kernel.
CoRR, 2024

2023
Maybenot: A Framework for Traffic Analysis Defenses.
CoRR, 2023

Maybenot: A Framework for Traffic Analysis Defenses.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache.
Proceedings of the 32nd USENIX Security Symposium, 2023

Comparing Security in eBPF and WebAssembly.
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 2023

A Second Look at DNS QNAME Minimization.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

2022
Splitting Hairs and Network Traces: Improved Attacks Against Traffic Splitting as a Website Fingerprinting Defense.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

2021
Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor.
Proc. Priv. Enhancing Technol., 2021

2020
Website Fingerprinting with Website Oracles.
Proc. Priv. Enhancing Technol., 2020

Towards Effective and Efficient Padding Machines for Tor.
CoRR, 2020

2019
Engineering privacy by design: lessons from the design and implementation of an identity wallet platform.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
Steady: A Simple End-to-End Secure Logging System.
IACR Cryptol. ePrint Arch., 2018

Aggregation-Based Gossip for Certificate Transparency.
CoRR, 2018

Verifiable Light-Weight Monitoring for Certificate Transparency Logs.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

A MOOC on Privacy by Design and the GDPR.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

2017
How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

The Effect of DNS on Tor's Anonymity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs.
IACR Cryptol. ePrint Arch., 2016

Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This?
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

Transparency, Privacy and Trust - Technology for Tracking and Controlling My Data Disclosures: Does This Work?
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Insynd: Improved Privacy-Preserving Transparency Logging.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Preserving Privacy in Transparency Logging.
PhD thesis, 2015

On the Feasibility of (Practical) Commercial Anonymous Cloud Storage.
Trans. Data Priv., 2015

Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons.
IACR Cryptol. ePrint Arch., 2015

Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure.
IACR Cryptol. ePrint Arch., 2015

A4Cloud Workshop: Accountability in the Cloud.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Security and Privacy Preservation of Evidence in Cloud Accountability Audits.
Proceedings of the Cloud Computing and Services Science - 5th International Conference, 2015

Secure Evidence Collection and Storage for Cloud Accountability Audits.
Proceedings of the CLOSER 2015, 2015

Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015

2014
Tools for Cloud Accountability: A4Cloud Tutorial.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

2013
ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship
CoRR, 2013

ScrambleSuit: a polymorphic network protocol to circumvent censorship.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Distributed privacy-preserving transparency logging.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used?
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

Enhancing Transparency with Distributed Privacy-Preserving Logging.
Proceedings of the ISSE 2013, 2013

2012
Towards Usable Privacy Policy Display & Management for PrimeLife.
Inf. Manag. Comput. Secur., 2012

Privacy-Friendly Cloud Storage for the Data Track - An Educational Transparency Tool.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

Hardware Strengthening a Distributed Logging Scheme.
Proceedings of the 15th Euromicro Conference on Digital System Design, 2012

2011
(More) Side Channels in Cloud Storage - Linking Data to Users.
Proceedings of the Privacy and Identity Management for Life, 2011

Towards Usable Privacy Policy Display & Management - The PrimeLife Approach.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

Transparency Tools.
Proceedings of the Privacy and Identity Management for Life, 2011

HCI for Policy Display and Administration.
Proceedings of the Privacy and Identity Management for Life, 2011

2009
Adding Secure Transparency Logging to the PRIME Core.
Proceedings of the Privacy and Identity Management for Life, 2009


  Loading...