My academic interests include privacy-preserving technologies, e-voting security, eavesdropping and wiretap systems, operating system security, network and protocol security, and network intrusion detection.
Basically, I like breaking stuff and occasionally fixing things.
A more formal biography is also available.
- I am co-chairing the 6th Workshop on Cyber Security Experimentation and Test (CSET), co-located with USENIX Security 2013 in Washington, DC. We have fantastic papers this year and a panel discussion on using data sets of questionable or morally ambiguous provenance. Please consider attending!
- August 5, 2013: Validating Web Content with Senser (with Jordan Wilberding, Andrew Yates, and Wenchao Zhou) accepted to ACSAC 2013.
- July 19, 2013: Users Get Routed: Traffic Correlation on Tor By Realistic Adversaries (with Aaron Johnson, Chris Wacek, Rob Jansen, and Paul Syverson) accepted to CCS 2013.
- May 17, 2013: Today, 20 computer scientists and researchers (myself included) released a report organized by the CDT that outlines the risks of the FBI's proposal to make peer-to-peer (P2P) communication tools (i.e., systems such as Skype) more wiretap friendly.
- October 20, 2012: An Empirical Evaluation of Relay Selection in Tor (with Chris Wacek, Henry Tan, and Kevin Bauer) accepted to NDSS 2013.
- October 1, 2012: Distributed Time-aware Provenance (with Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary Ives, and Boon Thau Loo) accepted to VLDB 2013.
- August 29, 2012: Received NSF TWC grant with Lisa Singh (PI) and Grace Hui Yang for Assessing Online Information Exposure Using Web Footprints. NEW: Project page now online.