Publications
Censorship Circumvention and Format-Transforming Encryption
-
Marionette: A Programmable Network-Traffic Obfuscation System
Kevin P. Dyer, Scott E. Coull and Thomas Shrimpton
USENIX Security 2015
[pdf]
[bib]
[code]
-
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart and Thomas Shrimpton
USENIX Security 2014
[pdf]
[bib]
[code]
-
Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart and Thomas Shrimpton
CCS 2013
2014 PET award runner-up
[pdf]
[bib]
[eprint]
[code]
Traffic Analysis of Encrypted Communications
-
Seeing through Network-Protocol Obfuscation
Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart and Thomas Shrimpton
CCS 2015
[pdf]
[bib]
[code]
-
Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond
Scott E. Coull and Kevin P. Dyer
SIGCOMM CCR, October 2014
[pdf]
[bib]
-
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart and Thomas Shrimpton
IEEE Security and Privacy 2012
[pdf]
[bib]
[code]