Publications

Filter by type:

Innovation with Scale

Details ACM DL

Characterization of Contact Offenders and Child Exploitation Material Trafficking on Five Peer-to-Peer Networks

Details PDF

Discovering Specification Violations in Networked Software Systems

Details PDF

Forensic Identification of Anonymous Sources in OneSwarm

Details PDF

Sybil-Resistant Mixing for Bitcoin

Details PDF Slides

Efficient Tagging of Remote Peers During Child Pornography Investigations

Details PDF

Location Privacy without Carrier Cooperation

Details PDF Slides

Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network

Details PDF

Turning Off GPS is Not Enough: Cellular location leaks over the Internet

Details PDF

Measurement and Analysis of Child Pornography Trafficking on P2P Networks (Runner-Up, Best Paper Award)

Details PDF Slides Tech Report

Effectiveness and Detection of Denial-of-Service Attacks in Tor

Details PDF

Forensic Investigation of the OneSwarm Anonymous Filesharing System

Details PDF Slides

Effective Digital Forensics Research is Investigator-Centric

Details PDF Slides Video Audio

Empirical Tests of Anonymous Voice Over IP

Details PDF

Strengthening Forensic Investigations of Child Pornography on P2P Networks

Details PDF Slides

Forensic Investigation of Peer-to-Peer File Sharing Networks

Details PDF

DEX: Digital Evidence Provenance Supporting Reproducibility and Comparison

Details PDF Code

Detecting Denial of Service Attacks in Tor

Details PDF

Cheat-Proof Playout for Centralized and Peer-to-Peer Gaming

Details PDF

Maximizing Transfer Opportunities in Bluetooth DTNs

Details PDF Slides

Inferring the Source of Encrypted HTTP Connections

Details PDF Slides Dataset

Privacy Vulnerabilities in Encrypted HTTP Streams

Details PDF Dataset