Publications


Censorship Circumvention and Format-Transforming Encryption

  1. Marionette: A Programmable Network-Traffic Obfuscation System
    Kevin P. Dyer, Scott E. Coull and Thomas Shrimpton
    USENIX Security 2015
    [pdf] [bib] [code]
  2. LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
    Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart and Thomas Shrimpton
    USENIX Security 2014
    [pdf] [bib] [code]
  3. Protocol Misidentification Made Easy with Format-Transforming Encryption
    Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart and Thomas Shrimpton
    CCS 2013
    2014 PET award runner-up
    [pdf] [bib] [eprint] [code]

Traffic Analysis of Encrypted Communications

  1. Seeing through Network-Protocol Obfuscation
    Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart and Thomas Shrimpton
    CCS 2015
    [pdf] [bib] [code]
  2. Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
    Scott E. Coull and Kevin P. Dyer
    SIGCOMM CCR, October 2014
    [pdf] [bib]
  3. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
    Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart and Thomas Shrimpton
    IEEE Security and Privacy 2012
    [pdf] [bib] [code]