Ian Goldberg
Research Interests
Privacy-enhancing technologies, computer security,
and cryptography, focusing on useful systems for protecting
the privacy and security of Internet-based transactions.
Education
- Ph.D. (Computer Science),
University of California, Berkeley, 2000.
- M.Sc. (Computer Science),
University of California, Berkeley, 1998.
- B.Math. (Pure Mathematics and Computer Science),
University of Waterloo, 1995.
- Graduated with distinction — Dean's honour list
Professional Experience
- July 2016 – present
- Professor, David R. Cheriton School of Computer Science, University of Waterloo
- March 2015 – June 2015
- Visiting Professor, ESAT/COSIC, KU Leuven
- Sabbatical position
- August 2014 – February 2015
- Visiting Fellow, Clare Hall, University of Cambdridge
- Sabbatical position
- July 2011 – June 2016
- Associate Professor, David R. Cheriton School of Computer Science, University of Waterloo
- August 2006 – June 2011
- Assistant Professor, David R. Cheriton School of Computer Science, University of Waterloo
- June 1999 – July 2006
- Chief Scientist, Radialpoint (formerly called Zero-Knowledge Systems, Inc.)
- Responsible for research, design, and prototype implementation of privacy-enhancing technologies in a commercial setting.
Peer-reviewed Journal Publications
- Sajin Sasy, Adithya Vadapalli, Ian Goldberg. "PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures". Proceedings on Privacy Enhancing Technologies. Vol. 2024, No. 3. 22 pages. July 2024. (Winner of the PETS 2024 Artifact Award)
- Sajin Sasy, Ian Goldberg. "SoK: Metadata-Protecting Communication Systems". Proceedings on Privacy Enhancing Technologies. Vol. 2024, No. 1. 17 pages. January 2024.
- Lindsey Tulloch, Ian Goldberg. "Lox: Protecting the Social Graph in Bridge Distribution". Proceedings on Privacy Enhancing Technologies. Vol. 2023, No. 1. pp. 494–509. January 2023. (Winner of the Andreas Pfitzmann Best Student Paper Award)
- Stan Gurtler, Ian Goldberg. "SoK: Privacy-Preserving Reputation Systems". Proceedings on Privacy Enhancing Technologies. Vol. 2021, No. 1. pp. 107--127. January 2021.
- Miti Mazmudar, Ian Goldberg. "Mitigator: Privacy policy compliance using trusted hardware". Proceedings on Privacy Enhancing Technologies. Vol. 2020, No. 3. pp. 204–221. July 2020.
- Bailey Kacsmar, Chelsea H. Komlo, Florian Kerschbaum, Ian Goldberg. "Mind the Gap: Ceremonies for Applied Secret Sharing". Proceedings on Privacy Enhancing Technologies. Vol. 2020, No. 2. pp. 397–415. April 2020.
- Sajin Sasy, Ian Goldberg. "ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments". Proceedings on Privacy Enhancing Technologies. Vol. 2019, No. 3. pp. 331–349. July 2019.
- Cecylia Bocovich, Ian Goldberg. "Secure asymmetry and deployability for decoy routing systems". Proceedings on Privacy Enhancing Technologies. Vol. 2018, No. 3. pp. 43–62. July 2018.
- Alex Davidson, Ian Goldberg, Nick Sullivan, George Tankersley, Filippo Valsorda. "Privacy Pass: Bypassing Internet Challenges Anonymously". Proceedings on Privacy Enhancing Technologies. Vol. 2018, No. 3. pp. 164–180. July 2018. (Winner of the Andreas Pfitzmann Best Student Paper Award)
- Navid Nasr Esfahani, Ian Goldberg, Douglas Stinson. "Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets". IEEE Transactions on Information Theory. Vol. 64, No. 4. pp. 3136–3143. April 2018.
- Nik Unger, Ian Goldberg. "Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging". Proceedings on Privacy Enhancing Technologies. Vol. 2018, No. 1. pp. 17–62. January 2018. (Runner-up for the 2018 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies.)
- Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg. "A Framework for the Game-theoretic Analysis of Censorship Resistance". Proceedings on Privacy Enhancing Technologies. Vol. 2016, No. 4. pp. 83–101. October 2016.
- Tao Wang, Ian Goldberg. "On Realistically Attacking Tor with Website Fingerprinting". Proceedings on Privacy Enhancing Technologies. Vol. 2016, No. 4. pp. 21–36. October 2016.
- Raphael Toledo, George Danezis, Ian Goldberg. "Lower-Cost epsilon-Private Information Retrieval". Proceedings on Privacy Enhancing Technologies. Vol. 2016, No. 4. pp. 184–201. October 2016. (Winner of the 2018 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies.)
- Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg. "SoK: Making Sense of Censorship Resistance Systems". Proceedings on Privacy Enhancing Technologies. Vol. 2016, No. 4. pp. 37–61. October 2016.
- Mashael AlSabah, Ian Goldberg. "Performance and Security Improvements for Tor: A Survey". ACM Computing Surveys. Vol. 49, No. 2. pp. 32:1–32:36. September 2016.
Extended version available as ePrint Technical Report 2015/235.
- Nikita Borisov, George Danezis, Ian Goldberg. "DP5: A Private Presence Service". Proceedings on Privacy Enhancing Technologies. Vol. 2015, No. 2. pp. 4–24. June 2015.
- Ian Goldberg, Douglas Stebila, Berkant Ustaoglu. "Anonymity and one-way authentication in key exchange protocols". Designs, Codes and Cryptography. Vol. 67, No. 2. pp. 245–269. May 2013.
Extended version available as CACR Tech Report 2011-11.
- Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten. "Towards Practical Communication in Byzantine-Resistant DHTs". IEEE/ACM Transactions on Networking. Vol. 21, No. 1. pp. 190–203. February 2013.
- Aniket Kate, Ian Goldberg. "Generalizing Cryptosystems Based on the Subset Sum Problem". International Journal of Information Security. Vol. 10, No. 3. pp. 189–199. June 2011.
- Ian Goldberg, Atefeh Mashatan, Douglas Stinson. "On Message Recognition Protocols: Recoverability and Explicit Confirmation". International Journal of Applied Cryptography. Vol. 2, No. 2. pp. 100–120. December 2010.
- Aniket Kate, Gregory Zaverucha, Ian Goldberg. "Pairing-Based Onion Routing with Improved Forward Secrecy". ACM Transactions on Information and System Security. Vol. 13, No. 4. pp. 29:1–29:32. December 2010.
- Ian Goldberg, David Wagner. "TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web". First Monday electronic journal. Vol. 3, No. 4. 20 pages. April 1998.
Peer-reviewed Conference and Workshop Publications
- Sajin Sasy, Aaron Johnson, Ian Goldberg. "Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks". 30th ACM Conference on Computer and Communications Security. 15 pages. November 2023.
Extended version available as ePrint Technical Report 2023/1236.
- Justin Tracey, Ian Goldberg. "Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities". 8th IEEE Secure Development Conference. 11 pages. October 2023.
- Adithya Vadapalli, Ryan Henry, Ian Goldberg. "Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation". 32nd USENIX Security Symposium. 18 pages. August 2023.
Extended version available as ePrint Technical Report 2022/1747.
- Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum. "Investigating Membership Inference Attacks under Data Dependencies". 35th IEEE Computer Security Foundations Symposium. 16 pages. July 2023.
- Stan Gurtler, Ian Goldberg. "PRSONA: Private Reputation Supporting Ongoing Network Avatars". 21st ACM Workshop on Privacy in the Electronic Society. 14 pages. November 2022.
- Sajin Sasy, Aaron Johnson, Ian Goldberg. "Fast Fully Oblivious Compaction and Shuffling". 29th ACM Conference on Computer and Communications Security. 18 pages. November 2022.
Extended version available as ePrint Technical Report 2022/1333.
- Yuhao Dong, Ian Goldberg, Sergey Gorbunov, Raouf Boutaba. "Astrape: Anonymous Payment Channels with Boring Cryptography". 20th International Conference on Applied Cryptography and Network Security. 20 pages. June 2022.
Extended version available as ePrint Technical Report 2022/450.
- Edward Eaton, Sajin Sasy, Ian Goldberg. "Improving the Privacy of Tor Onion Services". 20th International Conference on Applied Cryptography and Network Security. 20 pages. June 2022.
Extended version available as ePrint Technical Report 2022/407.
- Miti Mazmudar, Stan Gurtler, Ian Goldberg. "Do You Feel a Chill? Using PIR Against Chilling Effects for Censorship-resistant Publishing". 20th ACM Workshop on Privacy in the Electronic Society. 5 pages. November 2021. (Acceptance rate: 34%, 20/58)
Extended version available as ePrint Technical Report 2021/1195.
- Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg. "OUStralopithecus: Overt User Simulation for Censorship Circumvention". 20th ACM Workshop on Privacy in the Electronic Society. 14 pages. November 2021. (Acceptance rate: 21%, 12/58)
- Akshaya Mani, Ian Goldberg. "ZXAD: High-volume Attack Mitigation for Tor". 20th ACM Workshop on Privacy in the Electronic Society. 16 pages. November 2021. (Acceptance rate: 21%, 12/58)
Extended version available as ePrint Technical Report 2021/374.
- Steven Engler, Ian Goldberg. "Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput". 16th International Conference on Availability, Reliability, and Security. 11 pages. August 2021. (Runner-up for the ARES 2021 Best Paper Award)
- Rob Jansen, Justin Tracey, Ian Goldberg. "Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation". 30th USENIX Security Symposium. 18 pages. August 2021. (Winner of the NRL 54th Annual Alan Berman Research Publication Award)
Extended version available as ArXiv Technical Report 2102.05196.
- Matthew Lakier, Dimcho Karakashev, Yixin Wang, Ian Goldberg. "Augmented Unlocking Techniques for Smartphones Using Pre-Touch Information". ACM Symposium on Spatial User Interaction 2020. 5 pages. October 2020.
Extended version available as ArXiv Technical Report 1908.09165.
- Chelsea Komlo, Ian Goldberg. "FROST: Flexible Round-Optimized Schnorr Threshold Signatures". 27th Conference on Selected Areas in Cryptography. 30 pages. October 2020.
Extended version available as ePrint Technical Report 2020/852.
- Chelsea H. Komlo, Nick Mathewson, Ian Goldberg. "Walking Onions: Scaling Anonymity Networks while Protecting Users". 29th USENIX Security Symposium. 18 pages. August 2020. (Acceptance rate: 16%, 157/977)
- Christopher McKnight, Ian Goldberg. "Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry". 17th ACM Workshop on Privacy in the Electronic Society. 5 pages. October 2018. (Acceptance rate: 37%, 19/52)
Extended version available as CACR Technical Report 2018-08.
- Justin Tracey, Rob Jansen, Ian Goldberg. "High Performance Tor Experimentation from the Magic of Dynamic ELFs". 11th USENIX Workshop on Cyber Security Experimentation and Test. 8 pages. August 2018. (Acceptance rate: 37%, 10/27)
- Erinn Atwater, Ian Goldberg. "Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices". 26th International Workshop on Security Protocols. 6 pages. March 2018.
- Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg. "Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions". 25th Network and Distributed System Security Symposium. 15 pages. February 2018. (Acceptance rate: 21%, 71/331)
- Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ian Goldberg. "Netsim: Network simulation and hacking for high schoolers". 2017 USENIX Workshop on Advances in Security Education. 6 pages. August 2017. (Acceptance rate: 46%, 12/26)
- Tao Wang, Ian Goldberg. "Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks". 26th USENIX Security Symposium. pp. 1375–1390. August 2017. (Acceptance rate: 16%, 85/522)
- Cecylia Bocovich, John A. Doucette, Ian Goldberg. "Lavinia: Censorship-Resistant Publishing with Incentives". 21st International Conference on Financial Cryptography and Data Security. pp. 601–620. April 2017. (Acceptance rate: 24%, 30/125)
Extended version available as CACR Technical Report 2015-06.
- Nik Unger, Sahithi Thandra, Ian Goldberg. "Elxa: Scalable Privacy-Preserving Plagiarism Detection". 15th ACM Workshop on Privacy in the Electronic Society. pp. 153–164. October 2016. (Acceptance rate: 19%, 14/72)
Extended version available as CACR Technical Report 2016-07.
- Cecylia Bocovich, Ian Goldberg. "Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement". 23rd ACM Conference on Computer and Communications Security. pp. 1702–1714. October 2016. (Acceptance rate: 16%, 137/831)
- Ian Goldberg, Graeme Jenkinson, Frank Stajano. "Low-cost Mitigation against Cold Boot Attacks for an Authentication Token". 14th International Conference on Applied Cryptography and Network Security. pp. 36–57. June 2016. (Acceptance rate: 19%, 35/183)
- Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano. "Red button and yellow button: usable security for lost security tokens". 24th International Workshop on Security Protocols. pp. 165–171. April 2016.
- Nik Unger, Ian Goldberg. "Deniable Key Exchanges for Secure Messaging". 22nd ACM Conference on Computer and Communications Security. pp. 1211–1223. October 2015. (Acceptance rate: 20%, 128/646)
- Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, Ian Goldberg. "Leading Johnny to Water: Designing for Usability and Trust". 11th Symposium On Usable Privacy and Security. pp. 69–88. July 2015. (Acceptance rate: 24%, 22/93)
- Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith. "SoK: Secure Messaging". 36th IEEE Symposium on Security and Privacy. pp. 232–249. May 2015. (Acceptance rate: 14%, 55/407)
Extended version available as CACR Tech Report 2015-02.
- Wouter Lueks, Ian Goldberg. "Sublinear Scaling for Multi-Client Private Information Retrieval". 19th International Conference on Financial Cryptography and Data Security. pp. 168–186. January 2015. (Acceptance rate: 25%, 23/92)
- Tariq Elahi, George Danezis, Ian Goldberg. "PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks". 21st ACM Conference on Computer and Communications Security. pp. 1068–1079. November 2014. (Acceptance rate: 19%, 114/585)
Extended version available as CACR Tech Report 2014-08.
- Xiang Cai, Rishab Nithyanand, Tao Wang, Robert Johnson, Ian Goldberg. "A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses". 21st ACM Conference on Computer and Communications Security. pp. 227–238. November 2014. (Acceptance rate: 19%, 114/585)
- Tao Wang, Xiang Cai, Rishab Nithyanand, Robert Johnson, Ian Goldberg. "Effective Attacks and Provable Defenses for Website Fingerprinting". 23rd USENIX Security Symposium. pp. 143–157. August 2014. (Acceptance rate: 19%, 67/350)
- Casey Devet, Ian Goldberg. "The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency". 14th Privacy Enhancing Technologies Symposium (PETS 2014). pp. 63–82. July 2014. (Acceptance rate: 19%, 16/86)
Extended version available as CACR Tech Report 2014-07.
- Mashael AlSabah, Ian Goldberg. "PCTCP: Per-Circuit TCP-over-IPSec Transport for Anonymous Communication Overlay Networks". 20th ACM Conference on Computer and Communications Security. pp. 349–360. November 2013. (Acceptance rate: 20%, 105/530)
- Tao Wang, Ian Goldberg. "Improved Website Fingerprinting on Tor". 12th ACM Workshop on Privacy in the Electronic Society. pp. 201–212. November 2013. (Acceptance rate: 19%, 20/103)
- Yizhou Huang, Ian Goldberg. "Outsourced Private Information Retrieval with Pricing and Access Control". 12th ACM Workshop on Privacy in the Electronic Society. pp. 119–130. November 2013. (Acceptance rate: 19%, 20/103)
Extended version available as CACR Tech Report 2013-11.
- Ryan Henry, Ian Goldberg. "Thinking Inside the BLAC Box: Smarter Protocols for Faster Anonymous Blacklisting". 12th ACM Workshop on Privacy in the Electronic Society. pp. 71–82. November 2013. (Acceptance rate: 19%, 20/103)
Extended version available as CACR Tech Report 2013-26.
- Mashael AlSabah, Kevin Bauer, Tariq Elahi, Ian Goldberg. "The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting". 13th Privacy Enhancing Technologies Symposium (PETS 2013). pp. 143–163. July 2013. (Winner of the Andreas Pfitzmann Best Student Paper Award) (Acceptance rate: 19%, 13/69)
Extended version available as CACR Tech Report 2013-16.
- Ryan Henry, Ian Goldberg. "Batch Proofs of Partial Knowledge". 11th International Conference on Applied Cryptography and Network Security. pp. 502–517. June 2013. (Acceptance rate: 22%, 33/150)
Extended version available as CACR Tech Report 2013-08.
- Ryan Henry, Yizhou Huang, Ian Goldberg. "One (Block) Size Fits All: PIR and SPIR Over Arbitrary-Length Records via Multi-block PIR Queries". 20th Network and Distributed System Security Symposium. 15 pages. February 2013. (Acceptance rate: 19%, 47/250)
- Tariq Elahi, Kevin Bauer, Mashael AlSabah, Roger Dingledine, Ian Goldberg. "Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor". 11th ACM Workshop on Privacy in the Electronic Society. pp. 43–53. October 2012. (Acceptance rate: 28%, 11/39)
- Mashael AlSabah, Kevin Bauer, Ian Goldberg. "Enhancing Tor's Performance using Real-time Traffic Classification". 19th ACM Conference on Computer and Communications Security. pp. 73–84. October 2012. (Acceptance rate: 19%, 81/423)
- Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg. "SkypeMorph: Protocol Obfuscation for Tor Bridges". 19th ACM Conference on Computer and Communications Security. pp. 97–108. October 2012. (Acceptance rate: 19%, 81/423)
- Casey Devet, Ian Goldberg, Nadia Heninger. "Optimally Robust Private Information Retrieval". 21st USENIX Security Symposium. 15 pages. August 2012. (Acceptance rate: 19%, 43/222)
Extended version available as ePrint Tech Report 2012/083.
- Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi. "Provably Secure and Practical Onion Routing". 25th IEEE Computer Security Foundations Symposium. pp. 369–385. June 2012. (Acceptance rate: 25%, 25/101)
Extended version available as ePrint Tech Report 2011/308.
- Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft. "Adding Query Privacy to Robust DHTs". 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012). 12 pages. May 2012. (Acceptance rate: 22%, 35/159)
Extended version available as arXiv Tech Report 1107.1072.
- Ryan Henry, Ian Goldberg. "Solving Discrete Logarithms in Smooth-Order Groups with CUDA". 5th Workshop on Special-Purpose Hardware for Attacking Cryptographic Systems (SHARCS 2012). pp. 101–118. March 2012.
- Tao Wang, Kevin Bauer, Clara Forero, Ian Goldberg. "Congestion-aware Path Selection for Tor". 16th International Conference on Financial Cryptography and Data Security. pp. 98–113. February 2012. (Acceptance rate: 26%, 23/88)
Extended version available as CACR Tech Report 2011-20.
- Sarah Pidcock, Rob Smits, Urs Hengartner, Ian Goldberg. "NotiSense: An Urban Sensing Notification System To Improve Bystander Privacy". PhoneSense 2011. 5 pages. November 2011. (Acceptance rate: 56%, 10/18)
- Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner. "BridgeSPA: Improving Tor Bridges with Single Packet Authorization". 10th ACM Workshop on Privacy in the Electronic Society. pp. 93–102. October 2011. (Acceptance rate: 16%, 12/73)
- Jeremy Day, Yizhou Huang, Edward Knapp, Ian Goldberg. "SPEcTRe: Spot-checked Private Ecash Tolling at Roadside". 10th ACM Workshop on Privacy in the Electronic Society. pp. 61–68. October 2011. (Acceptance rate: 16%, 12/73)
- Ryan Henry, Femi Olumofin, Ian Goldberg. "Practical PIR for Electronic Commerce". 18th ACM Conference on Computer and Communications Security. pp. 677–690. October 2011. (Acceptance rate: 14%, 60/429)
Extended version available as CACR Tech Report 2011-04.
- Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg. "PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval". 20th USENIX Security Symposium. pp. 475–490. August 2011. (Acceptance rate: 17%, 35/204)
Extended version available as CACR Tech Report 2011-05.
- Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman. "Telex: Anticensorship in the Network Infrastructure". 20th USENIX Security Symposium. pp. 459–474. August 2011. (Runner-up for the 2012 PET Award for Outstanding Research in Privacy Enhancing Technologies.) (Acceptance rate: 17%, 35/204)
- Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey Voelker. "DefenestraTor: Throwing out Windows in Tor". 11th Privacy Enhancing Technologies Symposium. pp. 134–154. July 2011. (Acceptance rate: 25%, 15/61)
- Ryan Henry, Ian Goldberg. "Formalizing Anonymous Blacklisting Systems". 32nd IEEE Symposium on Security and Privacy. pp. 81–95. May 2011. (Acceptance rate: 11%, 34/306)
Extended version available as CACR Tech Report 2010-24.
- Ryan Henry, Ian Goldberg. "Extending Nymble-like Systems". 32nd IEEE Symposium on Security and Privacy. pp. 523–537. May 2011. (Acceptance rate: 11%, 34/306)
- Femi Olumofin, Ian Goldberg. "Revisiting the Computational Practicality of Private Information Retrieval". 15th International Conference on Financial Cryptography and Data Security. pp. 158–172. February 2011. (Acceptance rate: 20%, 15/74)
Extended version available as CACR Tech Report 2010-17.
- Aniket Kate, Gregory Zaverucha, Ian Goldberg. "Constant-Size Commitments to Polynomials and Their Applications". 16th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2010). pp. 177–194. December 2010. (Acceptance rate: 16%, 35/216)
Extended version available as CACR Tech Report 2010-10.
- Can Tang, Ian Goldberg. "An Improved Algorithm for Tor Circuit Scheduling". 17th ACM Conference on Computer and Communications Security. pp. 329–339. October 2010. (Acceptance rate: 17%, 55/320)
- Aniket Kate, Ian Goldberg. "Distributed Private-Key Generators for Identity-Based Cryptography". 7th Conference on Security and Cryptography for Networks. pp. 436–453. September 2010. (Acceptance rate: 29%, 27/94)
Extended version available as ePrint Tech Report 2009/355.
- Ryan Henry, Kevin Henry, Ian Goldberg. "Making a Nymbler Nymble using VERBS". 10th Privacy Enhancing Technologies Symposium. pp. 111–129. July 2010. (Acceptance rate: 28%, 16/57)
Extended version available as CACR Tech Report 2010-05.
- Femi Olumofin, Ian Goldberg. "Privacy-preserving Queries over Relational Databases". 10th Privacy Enhancing Technologies Symposium. pp. 75–92. July 2010. (Acceptance rate: 28%, 16/57)
Extended version available as CACR Tech Report 2009-37.
- Femi Olumofin, Piotr K. Tysowski, Ian Goldberg, Urs Hengartner. "Achieving Efficient Query Privacy for Location Based Services". 10th Privacy Enhancing Technologies Symposium. pp. 93–110. July 2010. (Acceptance rate: 28%, 16/57)
Extended version available as CACR Tech Report 2009-22.
- Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten. "Practical Robust Communication in DHTs Tolerating a Byzantine Adversary". 30th International Conference on Distributed Computing Systems. pp. 263–272. June 2010. (Acceptance rate: 14%, 84/585)
Extended version available as CACR Tech Report 2009-31.
- Aniket Kate, Ian Goldberg. "Using Sphinx to Improve Onion Routing Circuit Construction". 14th International Conference on Financial Cryptography and Data Security. pp. 359–366. January 2010. (Acceptance rate: 26%, 34/130)
Extended version available as CACR Tech Report 2009-33.
- Ian Goldberg, Berkant Ustaoğlu, Matthew Van Gundy, Hao Chen. "Multi-party Off-the-Record Messaging". 16th ACM Conference on Computer and Communications Security. pp. 358–368. November 2009. (Acceptance rate: 18%, 58/315)
- Chris Alexander, Joel Reardon, Ian Goldberg. "Plinko: Polling with a Physical Implementation of a Noisy Channel". 8th ACM Workshop on Privacy in the Electronic Society. pp. 109–112. November 2009. (Acceptance rate: 54%, 15/28)
Extended version available as CACR Tech Report 2009-21.
- Joel Reardon, Ian Goldberg. "Improving Tor Using a TCP-over-DTLS Tunnel". 18th USENIX Security Symposium. pp. 119–133. August 2009. (Acceptance rate: 15%, 26/176)
- Aniket Kate, Ian Goldberg. "Distributed Key Generation for the Internet". 29th International Conference on Distributed Computing Systems. pp. 119–128. June 2009. (Acceptance rate: 16%, 74/455)
- Ian Goldberg, Atefeh Mashatan, Douglas Stinson. "A New Message Recognition Protocol With Self-Recoverability for Ad Hoc Pervasive Networks". 7th International Conference on Applied Cryptography and Network Security. pp. 219–237. June 2009. (Acceptance rate: 21%, 32/150)
- George Danezis, Ian Goldberg. "Sphinx: A Compact and Provably Secure Mix Format". 2009 IEEE Symposium on Security and Privacy. pp. 269–282. May 2009. (Acceptance rate: 10%, 26/254)
- Ryan Stedman, Kayo Yoshida, Ian Goldberg. "A User Study of Off-the-Record Messaging". The 2008 Symposium On Usable Privacy and Security. pp. 95–104. July 2008. (Acceptance rate: 28%, 12/43)
- Chris Alexander, Ian Goldberg. "Improved User Authentication in Off-The-Record Messaging". 6th ACM Workshop on Privacy in the Electronic Society. pp. 41–47. October 2007. (Acceptance rate: 19%, 9/48)
- Ge Zhong, Ian Goldberg, Urs Hengartner. "Louis, Lester and Pierre: Three Protocols for Location Privacy". 7th Privacy Enhancing Technologies Symposium. pp. 62–76. June 2007. (Acceptance rate: 19%, 16/84)
- Aniket Kate, Gregory Zaverucha, Ian Goldberg. "Pairing-Based Onion Routing". 7th Privacy Enhancing Technologies Symposium. pp. 95–112. June 2007. (Acceptance rate: 19%, 16/84)
- Ian Goldberg. "Improving the Robustness of Private Information Retrieval". 2007 IEEE Symposium on Security and Privacy. pp. 131–145. May 2007. (Acceptance rate: 8%, 20/246)
- Ian Goldberg. "On the Security of the Tor Authentication Protocol". Workshop on Privacy Enhancing Technologies 2006. pp. 316–331. June 2006. (Acceptance rate: 26%, 24/91)
- Nikita Borisov, Ian Goldberg, Eric Brewer. "Off-the-Record Communication, or, Why Not To Use PGP". 3rd ACM Workshop on Privacy in the Electronic Society. pp. 77–84. October 2004. (Acceptance rate: 22%, 10/45)
- Ian Goldberg. "Privacy-enhancing Technologies for the Internet, II: Five Years Later". Workshop on Privacy Enhancing Technologies 2002. pp. 1–12. April 2002. (Acceptance rate: 35%, 17/48)
- Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Song, David Wagner. "A Cryptanalysis of the High-bandwidth Digital Content Protection System". Workshop on Security and Privacy in Digital Rights Management 2001. pp. 192–200. November 2001. (Acceptance rate: 30%, 15/50)
- Nikita Borisov, Ian Goldberg, David Wagner. "Intercepting Mobile Communications: The Insecurity of 802.11". ACM SIGMOBILE Annual International Conference on Mobile Computing and Networking 2001. pp. 180–189. July 2001. (Acceptance rate: 11%, 30/281)
- David Wagner, Ian Goldberg. "Proofs of Security for the Unix Password Hashing Algorithm". Asiacrypt 2000. pp. 560–572. December 2000. (Acceptance rate: 32%, 45/139)
- Chris Hall, Ian Goldberg, Bruce Schneier. "Reaction Attacks Against Several Public-Key Cryptosystems". International Conference on Information and Communication Security 1999. pp. 2–12. November 1999.
- Ian Goldberg, Steven D. Gribble, David Wagner, Eric A. Brewer. "The Ninja Jukebox". 2nd USENIX Symposium on Internet Technologies and Systems. 10 pages. October 1999.
- Armando Fox, Ian Goldberg, Steven D. Gribble, David C. Lee, Anthony Polito, Eric A. Brewer. "Experience With Top Gun Wingman: A Proxy-Based Graphical Web Browser for the 3Com PalmPilot". IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing (Middleware) 1998. 18 pages. September 1998.
- Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer. "A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker". 6th USENIX Security Symposium. pp. 1–13. July 1996. (Winner of the Best Paper Award and winner of the 2019 USENIX Security Test of Time Award)
Books Edited
Book Chapters
- Ian Goldberg. "Privacy-Enhancing Technologies for the Internet III: Ten Years Later". Chapter 1 of "Digital Privacy: Theory, Technologies, and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina di Vimercati, editors. pp. 3–18. Auerbach, December 2007.
- Ian Goldberg, David Wagner. "Architectural Considerations for Cryptanalytic Hardware". Chapter 10 of "Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design". pp. 10-1–10-26. O'Reilly, July 1998.
Other Invited Publications
- Ian Goldberg, Austin Hill, Adam Shostack. "Trust, Ethics, and Privacy". Boston University Law Review. Vol. 81, No. 2. pp. 407–422. April 2001.
- Ian Goldberg, David Wagner, Eric A. Brewer. "Privacy-enhancing Technologies for the Internet". IEEE COMPCON '97. pp. 103–109. February 1997.
Technical Specifications
Technical Reports
- Tariq Elahi, Colleen M. Swanson, Ian Goldberg. "Slipping Past the Cordon: A Systematization of Internet Censorship Resistance". CACR Tech Report 2015-10. 20 pages. August 2015.
- Ryan Henry, Ian Goldberg. "All-but-k Mercurial Commitments and their Applications". CACR Tech Report 2012-26. 7 pages. December 2012.
- Aniket Kate, Yizhou Huang, Ian Goldberg. "Distributed Key Generation in the Wild". ePrint Tech Report 2012/377. 21 pages. July 2012.
- Angèle Hamel, Jean-Charles Grégoire, Ian Goldberg. "The Mis-entropists: New Approaches to Measures in Tor". CACR Tech Report 2011-18. 10 pages. July 2011.
- Simina Brânzei, Tariq Elahi, Ian Goldberg. "Local Anonymity: A Metric for Improving User Privacy in Tor". CACR Tech Report 2011-17. 6 pages. July 2011.
- Femi Olumofin, Ian Goldberg. "Preserving Access Privacy Over Large Databases". CACR Tech Report 2010-33. 22 pages. November 2010.
- Joel Reardon, Jeff Pound, Ian Goldberg. "Relational-Complete Private Information Retrieval". CACR Tech Report 2007-34. 24 pages. November 2007.
- Joel Reardon, Alan Kligman, Brian Agala, Ian Goldberg. "KleeQ: Asynchronous Key Management for Dynamic Ad-Hoc Networks". CACR Tech Report 2007-03. 17 pages. January 2007.
Invited Talks
-
"Supporting Privacy and Freedom of Expression Worldwide (and Helping Your Research, Too!)". Kitchener-Waterloo Linux User Group. April 2024.
-
"Data Collection and Effective Public Policy". 2022 Cybersecurity and Privacy Institute Annual Conference. October 2022. (panel with Lyall King, Kelly O'Hearn, Nicolas Papernot, Anindya Sen)
-
"FROST: Flexible Round-Optimized Schnorr Threshold Signatures". Stinson66—New Advances in Designs, Codes and Cryptography. June 2022.
-
"Privacy Research that Matters". CPI Talks, University of Waterloo Cybersecurity and Privacy Institute. October 2021. (with Jennifer Whitson)
-
"A Career in Computer Science". Competitive Coding Club, University of Toronto Schools. March 2021.
-
"Walking Onions: Scaling Anonymity Networks while Protecting Users". Computer Science Seminar, University of British Columbia. November 2019.
-
"Walking Onions: Scaling Anonymity Networks while Protecting Users". InfoSec Seminar, University College London. November 2019.
-
"Walking Onions: Scaling Anonymity Networks while Protecting Users". DISI Seminar, University of Trento. October 2019.
-
"Privacy Enhancing Technologies for the Internet". Citizen Hacks. September 2019.
-
"Privacy Enhancing Technologies for the Internet". Canadian Computing Olympiad Seminar. May 2019.
-
"Privacy Enhancing Technologies for the Internet". Office of the Information and Privacy Commissioner for British Columbia. March 2019.
-
"Privacy Enhancing Technologies for the Internet". Keynote, WatITis conference, University of Waterloo. December 2018.
-
"How to Share a Secret". Exploring Math and Computer Science (EMACS) Invited Speaker. July 2018.
-
"Coders' Free Speech Rights in The Americas at Risk". RightsCon 2018. May 2018. (panel with Katitza Rodriguez, María Paz Canales, Sarah McKune, Kurt Opsahl, Leandro Ucciferri)
-
"Regulating in the Dark: Mapping the Encryption Debate". University of Toronto Faculty of Law. February 2018. (panel with Yan Zhu and Ross Anderson)
-
"Security and Privacy for an Open Internet". Toronto CISO Executive Summit. December 2017.
-
"Perfect Imitation and Secure Asymmetry for Decoy Routing Systems with Slitheen". Symposium on Privacy in the Era of Censorship and Bitcoin, Radboud University Nijmegen, Netherlands. October 2017.
-
"Perfect Imitation and Secure Asymmetry for Decoy Routing Systems with Slitheen". EPFL Summer Research Institute, Lausanne, Switzerland. June 2017.
-
"DP5: Privacy-preserving Presence Protocols". Post-Snowden Cryptography Workshop, Brussels. December 2015.
-
"DP5: Privacy-preserving Presence Protocols". Zurich Information Security and Privacy Center Seminar, ETH Zurich. April 2015.
-
"DP5: Privacy-preserving Presence Protocols". LCA1 Research Group Seminar, EPFL. April 2015.
-
"Ibis: An Overlay Mix Network for Microblogging". Computer and Communication Sciences Seminar, EPFL. April 2015.
-
"Ibis: An Overlay Mix Network for Microblogging". COSIC Seminar, KU Leuven. April 2015.
-
"Keynote Address". Bits of Freedom Boffel, Amsterdam, Netherlands. March 2015.
-
"Ibis: An Overlay Mix Network for Microblogging". Tactical Interdisciplinary Research in the Post-Snowden Era Workshop, University of Nijmegen, Netherlands. March 2015.
-
"Privacy Enhancing Technologies: Combatting surveillance and censorship on the Internet". Clare Hall Colloquium, University of Cambridge. February 2015.
-
"Ibis: An Overlay Mix Network for Microblogging". ACE Distinguished Seminar Speaker, University College London. February 2015.
-
"DP5: Privacy-preserving Presence Protocols". Security Seminar, University of Edinburgh. January 2015.
-
"DP5: Privacy-preserving Presence Protocols". 4th Real World Cryptography Workshop, London. January 2015.
-
"DP5: PIR for Privacy-preserving Presence". 31st Chaos Communication Congress (31C3), Hamburg. December 2014. (with George Danezis)
-
"Privacy Online: What Now? (part 2)". Keynote address, Privacy & Identity Lab Annual Event, Amsterdam. December 2014.
-
"DP5: Privacy-preserving Presence Protocols". COSIC Seminar, KU Leuven. November 2014.
-
"DP5: Privacy-preserving Presence Protocols". Dagstuhl Seminar "Privacy and Security in an Age of Surveillance". October 2014.
-
"DP5: Privacy-preserving Presence Protocols". CISPA Distinguished Lecture, Saarland University. September 2014.
-
"DP5: Privacy-preserving Presence Protocols". University of Cambridge Computer Laboratory Security Seminar. September 2014.
-
"Using Technologies: How Can We Better Promote Usable, Effective, Privacy-Enhancing/Anti-Surveillance Technologies?". The Politics of Surveillance Workshop: Advancing Democracy in a Surveillance Society. May 2014. (panel with Andrew Clement, Roger Clarke, Nadim Kobeissi, Kevin McArthur)
-
"Electronic Privacy and Surveillance". 32nd Annual ACM Conference on Human Factors in Computing Systems (CHI 2014). April 2014. (panel with Juan Pablo Hourcade, Ann Cavoukian, Ronald Deibert, Lorrie Cranor)
-
"Optimally Robust Private Information Retrieval". Pure and Applied Mathematics Seminar, Birkbeck University of London. February 2014.
-
"Privacy Online: What Now?". Keynote address, ShmooCon 2014. January 2014.
-
"Ibis: An Overlay Mix Network for Microblogging". Concordia Institute for Information Systems Engineering Distinguished Seminar. November 2013.
-
"Ibis: An Overlay Mix Network for Microblogging". Stanford Security Seminar. September 2013.
-
"Privacy Enhancing Technologies for the Internet". Canadian Computing Competition Stage 2 Seminar. May 2013.
-
"Software Engineering for Privacy". Canadian University Software Engineering Conference 2013. January 2013.
-
"Privacy Enhancing Technologies for the Internet". 19th Conference on Selected Areas in Cryptography. August 2012.
-
"Cryptography and PETs: happy together or growing apart?". 12th Privacy Enhancing Technologies Symposium. July 2012. (panel with George Danezis, Roger Dingledine, Kenny Paterson and Victor Shoup)
-
"Constant-Size Commitments to Polynomials and Their Applications". ECRYPT II Provable Privacy Workshop. July 2012.
-
"Optimally Robust Private Information Retrieval". Eighth Annual Pitney Bowes Conference on Privacy and Security. June 2012.
-
"PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval". McMaster University Seminar in Computers and Software. September 2011.
-
"PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval". Kansas State University Computing and Information Science Seminar Series. May 2011.
-
"Privacy Enhancing Technologies for the Internet". Kansas State University Computing and Information Science Distinguished Lecture Series. May 2011.
-
"Private Information Retrieval". International Olympiad in Informatics Evening Lecture Series. August 2010.
-
"Achieving Efficient Query Privacy for Location Based Services". Pitney Bowes Sixth Annual Conference on Information Security and Communication. July 2010.
-
"Sphinx: A Compact and Provably Secure Mix Format". University of Illinois at Urbana-Champaign Information Trust Institute Trust and Security Seminar. September 2009.
-
"Sphinx: A Compact and Provably Secure Mix Format". Purdue University CERIAS Security Seminar. August 2009.
-
"Internet Security and Privacy for the Rest of Us". Third Age Learning Speaker Series on "Privacy and Security in Your World". February 2009.
-
"Introduction to Classical Cryptography and Information Security". Information Security in a Quantum World Conference. August 2008. (with Alfred Menezes, Douglas Stinson)
-
"Off-the-Record Messaging: Useful Security and Privacy for IM". Pitney Bowes Fourth Annual Conference on Information Security and Communication. June 2008.
-
"Cryptography, Security, and Privacy on the
Internet". CEMC Lyons Invited Speaker. June 2008.
-
"Off-the-Record Messaging: Useful Security and Privacy for IM". 1st Canada-France MITACS Workshop on Foundations & Practice of Security. May 2008.
-
"Improving the Robustness of Private Information Retrieval". University of California, Berkeley TRUST Seminar. April 2008.
-
"Improving the Robustness of Private Information Retrieval". Johns Hopkins University Information Security Institute Seminar. February 2008.
-
"interceptedI: A Technical Perspective". On The Identity Trail's Revealed I conference. October 2007. (panel with Michael Geist, Clayton Pecknold, Wesley Wark, Philippa Lawson)
-
"Looking Ahead: A Ten-Year Outlook for Internet Security and Privacy". International Conference on Distributed Computing Systems 2007. June 2007. (panel with Ashvin Goel, Emin Gun Sirer, Anthony Joseph, David Lie, Partha Dasgupta)
-
"Polynomial Secret Sharing and Private Information Retrieval". Canadian Mathematics Competition Seminar. June 2007.
-
"Improving the Robustness of Private Information Retrieval". Stanford Security Seminar. May 2007.
-
"Off-the-Record Messaging: Useful Security and Privacy for IM". Stanford University Department of Electrical Engineering Computer Systems Colloquium. May 2007.
-
"Cryptography, Security and Privacy on the Internet". 17th Conference on Computers, Freedom, and Privacy. May 2007.
-
"Off-the-Record Messaging: Useful Security and Privacy for IM". MITACS Digital Security Seminar Series at Carleton University. April 2007.
-
"Improving the Robustness of Private Information Retrieval". University of Massachusetts Amherst Computer Science Department Seminar. April 2007.
-
"Questions and Answers about Off-the-Record Messaging". Hewlett-Packard Software Engineering Seminar. February 2007.
-
"Off-the-Record Messaging". 7th Annual Privacy and Security Workshop &
15th CACR Information Security Workshop. November 2006.
-
"Privacy-Enhancing Technologies for the Internet". Fourth Annual Conference on Privacy, Security, and Trust. October 2006.
-
"Off-the-Record Communication, or, Why Not To Use PGP". Research seminar, University of California, Berkeley. August 2006.
-
"Off-the-Record Messaging". CyLab / ISRI Seminar Series, Carnegie Mellon University. October 2005.
-
"The Promise of Privacy Enhancing Technologies". 12th Conference on Computers, Freedom, and Privacy. April 2002. (with Paul Syverson, Lorrie Faith Cranor, Marc Levine)
-
"Privacy vs. Security: Myth or Fiction?". Financial Cryptography 2002. March 2002. (with Ron Rivest, Graham Wood)
-
"Privacy-Degrading Technologies: How Not to Build the Future". 9th USENIX Security Symposium. August 2000.
-
"A Pseudonymous Communications Infrastructure for the Internet". Stanford University Computer Systems Laboratory EE380 Colloquium. April 2000.
Other Research Seminars
-
"Societal impacts of 21st Century technology". University Research Talk, University of Waterloo. December 2017. (panel with Kate Larson, Jennifer Whitson, Alexander Wong)
-
"Battling Internet censorship and surveillance". University Research Talk, University of Waterloo. February 2016.
-
"Ibis: An Overlay Mix Network for Microblogging". CACR Seminar, University of Waterloo. September 2013.
-
"Sphinx: A Compact and Provably Secure Mix Format". CACR Seminar, University of Waterloo. July 2009.
-
"Off-the-Record Messaging: Useful Security and Privacy for IM". Computer Science Club Seminar, University of Waterloo. October 2007.
-
"Improving the Robustness of Private Information Retrieval". CACR Seminar, University of Waterloo. April 2007.
Guest Lectures
- University of Waterloo, CS 858 (Mobile Privacy and Security). 21 September 2016.
- University of Waterloo, INTEG 221 (On the Nature of Knowledge). 9–11 February 2010.
- University of Waterloo, CS 492 (Computers and Society). 16 January 2009.
- University of Waterloo, CO 487 (Applied Cryptography). 10 March 2006.
- Carnegie Mellon University, 15-508 / 17-801 / 19-608 / 95-818 (Privacy Policy, Law, and Technology). 24 October 2005.
Selected Other Publications and Conference Talks
-
"Low-cost Mitigation against Cold Boot Attacks for an Authentication Token". Cryptography, Security, and Privacy 10th Anniversary Workshop. June 2016.
-
"DP5: A Private Presence Service". 15th Privacy Enhancing Technologies Symposium. June 2015.
-
"Outsourced Private Information Retrieval with Pricing and Access Control". 12th ACM Workshop on Privacy in the Electronic Society. November 2013.
-
"An Improved Algorithm for Tor Circuit Scheduling". 17th ACM Conference on Computer and Communications Security. October 2010.
-
"Sphinx: A Compact and Provably Secure Mix Format". 2009 IEEE Symposium on Security and Privacy. May 2009.
-
"Improving the Robustness of Private Information Retrieval". 2007 IEEE Symposium on Security and Privacy. May 2007.
-
"On the Security of the Tor Authentication Protocol". 6th Workshop on Privacy Enhancing Technologies. June 2006.
-
"Privacy and Anonymity on the Internet". Workshop on Vanishing Anonymity, 15th Conference on Computers, Freedom, and Privacy. April 2005.
-
"Off-the-Record Messaging". CodeCon 2005. February 2005. (with Nikita Borisov)
-
"Privacy-enhancing Technologies for the Internet, II: Five Years Later". 2nd Workshop on Privacy Enhancing Technologies. April 2002.
-
"Six Ways from Sunday: Attacks on the WEP Protocol of 802.11". RSA Conference 2002. February 2002.
-
"The Insecurity of 802.11: An Analysis of the Wired Equivalent Privacy protocol". Black Hat Briefings 2001. July 2001.
-
"Using the Internet Pseudonymously". RSA Conference 2000. January 2000.
-
"Practical Computer Security". CrypTEC '99. July 1999. (with Eric Brewer, David Wagner)
-
"The Palm III as an Authentication Token". RSA Conference 1999. January 1999.
-
"Cryptanalysis of the GSM Identification Algorithm". Black Hat Briefings 1998. July 1998.
- "Shared Libraries on the PalmPilot". Handheld Systems. Vol. 5, No. 6. Nov/Dec 1997.
- "Randomness and the Netscape Browser". Dr. Dobb's Journal. January 1996. (with David Wagner)
Teaching
- Instructor,
CS 798 (Privacy in Computation and Communication)
University of Waterloo, Spring 2024- 17 students
- Instructor,
CS 858 (Hot Topics in Privacy Enhancing Technologies)
University of Waterloo, Spring 2023- 11 students
- Co-instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Spring 2022- 134 students in 2 sections
- with Diogo Barradas
- Co-instructor,
CS 858 / SOC 701 (Surveillance and Privacy)
University of Waterloo, Fall 2020- 22 students
- with Jennifer Whitson
- Instructor,
CS 499R (Readings in Computer Science: Decoy Routing)
University of Waterloo, Fall 2019- 1 student
- Co-instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Spring 2019- 173 students in 2 sections
- with Navid Nasr Esfahani
- Co-instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Fall 2018- 123 students in 2 sections
- with Florian Kerschbaum
- Instructor,
CS 858 (Hot Topics in Privacy Enhancing Technologies)
University of Waterloo, Fall 2018- 13 students
- Instructor,
CS 135 (Designing Functional Programs)
University of Waterloo, Fall 2017- 82 students
- Instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Fall 2015- 64 students
- Instructor,
CS 858 (Hot Topics in Privacy Enhancing Technologies)
University of Waterloo, Fall 2015- 12 students
- Co-instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Winter 2014- 124 students in 2 sections
- with Urs Hengartner
- Instructor,
CS 858 (Hot Topics in Privacy Enhancing Technologies)
University of Waterloo, Spring 2013- 8 students
- Instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Spring 2013- 69 students
- Instructor,
CS 135 (Designing Functional Programs)
University of Waterloo, Fall 2012- 103 students
- Co-instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Winter 2012- 121 students in 2 sections
- with Kevin Bauer
- Instructor,
CS 858 (Hot Topics in Privacy Enhancing Technologies)
University of Waterloo, Fall 2011- 16 students
- Instructor,
CS 135 (Designing Functional Programs)
University of Waterloo, Fall 2011- 92 students
- Instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Winter 2011- 39 students
- Instructor,
CS 499R (Readings in Computer Science: Privacy Enhancing Technologies)
University of Waterloo, Winter 2011- 1 student
- Instructor,
CS 858 (Hot Topics in Privacy Enhancing Technologies)
University of Waterloo, Winter 2011- 10 students
- Instructor,
CS 135 (Designing Functional Programs)
University of Waterloo, Fall 2010- 79 students
- Instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Winter 2010- 47 students
- Instructor,
CS 135 (Designing Functional Programs)
University of Waterloo, Fall 2009- 68 students
- Instructor,
CS 858 (Hot Topics in Privacy Enhancing Technologies)
University of Waterloo, Fall 2009- 12 students
- Instructor,
CS 135 (Designing Functional Programs)
University of Waterloo, Winter 2009- 166 students in 2 sections
- Instructor,
CS 458/658 (Computer Security and Privacy)
University of Waterloo, Fall 2008- 60 students
- Instructor,
CS 135 (Designing Functional Programs)
University of Waterloo, Fall 2008- 90 students
- Instructor,
CS 489/698 section 1 (Computer Security and Privacy)
University of Waterloo, Fall 2007- 58 students
- Instructor,
CS 854 (Hot Topics in Privacy Enhancing Technologies)
University of Waterloo, Fall 2007- 12 students
- Instructor,
CS 456/656 (Computer Networks)
University of Waterloo, Fall 2006- 61 students in 2 sections
- Co-instructor,
CS 261 (Computer Security)
UC Berkeley, Fall 1998- Designed and taught a new graduate-level course in
Computer Security (with fellow graduate student David Wagner).
Developed syllabus and assignments; lectured; advised students
on class projects.
Students Supervised
- Vecna (Ph.D. Student), Fall 2024 – present
- Onur Arpaci (M.Math. Thesis Reader [Florian Kerschbaum and Raouf Boutaba]), Spring 2024 – Spring 2024
- Shreya Arun Naik (M.Math. Thesis Reader [Diogo Barradas]), Spring 2024 – Spring 2024
- Anais Huang (Ph.D. Student), Spring 2024 – present
- Alice Murphy (M.Math. Thesis Reader [Mohammad Hajiabadi]), Winter 2024 – Spring 2024
- Rasoul Akhavan Mahdavi (Ph.D. Advisory Committee [Florian Kerschbaum]), Fall 2023 – present
- Muhammad Arsalan Khan (M.Math. Research Paper Reader [Shane McIntosh]), Spring 2023 – Winter 2024
- Pui Kit (Jack) Ma (Ph.D. Advisory Committee [Sherman Chow, The Chinese University of Hong Kong]), Spring 2023 – Spring 2023
- Vecna (Master's Student), "Troll Patrol: Detecting Blocked Tor Bridges", Fall 2022 – Fall 2024
- Adithya Vadapalli (Postdoctoral Researcher), Fall 2021 – Spring 2023
- Edward Eaton (Ph.D. Advisory Committee [Douglas Steblia]), Spring 2021 – Fall 2022
- Rasoul Akhavan Mahdavi (M.Math. Thesis Reader [Florian Kerschbaum]), Spring 2021 – Fall 2021
- Yuhao Dong (Ph.D. Advisory Committee [Raouf Boutaba]), Spring 2021 – Fall 2023
- Micheal Friesen (M.Math. Thesis Reader [Ali Mashtizadeh and Omid Abari]), Spring 2021 – Spring 2021
- Quentin Dufour (Ph.D. Advisory Committee [Davide Frey and David Bromberg, Université de Rennes 1]), Fall 2020 – Winter 2021
- Renee Leung (Undergraduate Student Research Assistant), "Improving and Deploying Censorship Resistance Systems", Fall 2020
- Chelsea Komlo (Ph.D. Student), Fall 2020 – present
- Arastoo Bozorgi (Ph.D. Advisory Committee [Jonathan Anderson, Memorial University of Newfoundland]), Spring 2020 – Fall 2020
- Sebastian Verschoor (Ph.D. Advisory Committee [Michele Mosca]), Spring 2020 – Winter 2022
- Arash Khoshparvar (Ph.D. Advisory Committee [Anwar Hasan]), Winter 2020
- Anna Lorimer (Undergraduate Research Assistant, part-time), "Decoy Routing", Fall 2019
- Akshaya Mani (Postdoctoral Researcher), Fall 2019 – Spring 2021
- Lindsey Tulloch (Master's Student), "Lox: Protecting the Social Graph in Bridge Distribution", Fall 2019 – Spring 2022
- Miti Mazmudar (Ph.D. Student), Spring 2019 – present
- Mike Ross (Undergraduate Research Assistant, part-time), "Parallelizing NetMirage", Winter 2019
- Chan Nam Ngo (Ph.D. Advisory Committee [Fabio Massacci, Università di Trento]), Fall 2018 – Fall 2019
- Cecylia Bocovich (Postdoctoral Researcher), Fall 2018 – Winter 2019
- Peiyuan Liu (M.Math. Thesis Reader [Urs Hengartner]), Spring 2018 – Fall 2018
- Bailey Kacsmar (M.Math. Thesis Reader [Douglas Stinson]), Spring 2018 – Fall 2018
- Chelsea Komlo (Master's Student), "Walking Onions: Scaling Distribution of Information Safely in Anonymity Networks", Fall 2018 – Spring 2020
- Stan Gurtler (Master's Student), "PRSONA: Private Reputation Supporting Ongoing Network Avatars", Fall 2018 – Fall 2021
- Navid Nasr Esfahani (Ph.D. Advisory Committee [Douglas Stinson]), Spring 2018 – Winter 2021
- Sajin Sasy (Ph.D. Student), "Privacy-Preserving Communications from Privacy-Preserving Computations", Winter 2018 – Spring 2024
- Justin Tracey (Ph.D. Student), "Raising the Bar on Lowering Barriers: Improving Ease of Research and Development Contributions to Privacy Enhancing Technologies", Fall 2017 – Spring 2024
- Steven Engler (Master's Student), "Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput", Fall 2017 – Spring 2020
- Anna Lorimer (Undergraduate Research Assistant, part-time), "Improvements to censorship-resistance systems", Spring 2017 – Fall 2017
- Wouter Lueks (Ph.D. Advisory Committee [Jaap-Henk Hoepman, Radboud University Nijmegen]), Winter 2017 – Fall 2017
- Stefanie Roos (Postdoctoral Researcher), "Improved Congestion Control Mechanisms for Privacy-Preserving Communications Networks", Fall 2016 – Spring 2018
- Miti Mazmudar (Master's Student), "Mitigator: Privacy policy compliance using Intel SGX", Fall 2016 – Spring 2019
- Brittany Postnikoff (Master's Student), "Robot Social Engineering", Fall 2016 – Spring 2020
- Lalit Agarwal (M.Math. Thesis Reader [Urs Hengartner]), Winter 2016 – Spring 2016
- Nahid Juma (Ph.D. Advisory Committee [Mahesh Tripunitara]), Winter 2016 – Spring 2020
- Erinn Atwater (Ph.D. Advisory Committee [Urs Hengartner]), Fall 2015 – Fall 2018
- Kritika Iyer (Master's Student, part-time), "Ghost Recommendations: A Protocol for Efficiently Enhancing User Privacy", Fall 2015 – Winter 2024
- Chris McKnight (Master's Student), "StyleCounsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry", Fall 2015 – Winter 2018
- Justin Tracey (Master's Student), "Building a Better Tor Experimentation Platform from the Magic of Dynamic ELFs", Fall 2015 – Fall 2017
- Shreya Agrawal (M.Math. Thesis Reader [Borzoo Bonakdarpour]), Spring 2015 – Fall 2015
- Nik Unger (Ph.D. Student), "End-to-End Encrypted Group Messaging with Insider Security", Spring 2015 – Spring 2021
- Hassan Khan (Ph.D. Advisory Committee [Urs Hengartner]), Spring 2014 – Spring 2016
- Cecylia Bocovich (Ph.D. Student), "Recipes for Resistance: A Censorship Circumvention Cookbook", Spring 2014 – Spring 2018
- Yiming Ann Yang (Undergraduate Research Assistant, part-time), "Speedups for Private Information Retrieval", Winter 2014
- Zhiping Wu (Ph.D. Advisory Committee [Frank Tompa]), Fall 2013 – Spring 2014
- Sukhbir Singh (Master's Student), "Large-Scale Emulation of Anonymous Communication Networks", Fall 2013 – Spring 2014
- Nik Unger (Master's Student), "Deniable Key Exchanges for Secure Messaging", Fall 2013 – Spring 2015
- Jalaj Upadhyay (Ph.D. Advisory Committee [Douglas Stinson]), Winter 2013 – Fall 2015
- Vitalik Buterin (Undergraduate Research Assistant, part-time), "Implementations of pairing-based cryptography libraries", Winter 2013
- Denis Collette (Master's Student), Fall 2012 – Spring 2013
- Casey Devet (Master's Student), "The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication Efficiency", Fall 2012 – Spring 2014
- Paul Hendry (Undergraduate Research Assistant, part-time), "Ibis: A Mix Overlay Network for Microblogging", Fall 2012
- Sarah Pidcock (M.Math. Thesis Reader [Urs Hengartner]), Spring 2012 – Winter 2013
- Colleen Swanson (Ph.D. Advisory Committee [Douglas Stinson]), Spring 2012 – Spring 2013
- Paul Hendry (Undergraduate Student Research Assistant), "Ibis: A Mix Overlay Network for Microblogging", Spring 2012
- Rob Smits (Technical support staff), Winter 2012
- Yi Ren (Undergraduate Research Assistant, part-time), "Improvements to PIR", Winter 2012
- Paul Hendry (Undergraduate Research Assistant, part-time), "Improvements to PIR", Winter 2012
- Tao Wang (Ph.D. Student), "Website Fingerprinting: Attacks and Defenses", Winter 2012 – Winter 2016
- Casey Devet (Undergraduate Research Assistant, part-time), "Reconstruction of Secret Shares with Errors", Winter 2012 – Spring 2012
- Aleksander Essex (Ph.D. Advisory Committee [Urs Hengartner]), Fall 2011 – Spring 2012
- Kevin Henry (Ph.D. Advisory Committee [Douglas Stinson]), Fall 2011 – Spring 2015
- Casey Devet (Undergraduate Student Research Assistant), "Reconstruction of Secret Shares with Errors", Fall 2011
- Hooman Mohajeri Moghaddam (Master's Student), "SkypeMorph: Protocol Obfuscation for Censorship Resistance", Fall 2011 – Winter 2013
- Yizhou Andy Huang (Master's Student), "Outsourced Private Information Retrieval with Pricing and Access Control", Fall 2011 – Spring 2013
- Kevin Bauer (Postdoctoral Researcher), Spring 2011 – Winter 2012
- Yizhou Andy Huang (Undergraduate Student Research Assistant), "Privacy-enhanced toll collection and DKG visualization", Spring 2011
- Tariq Elahi (Ph.D. Student), "Towards more Effective Censorship Resistance Systems", Winter 2011 – Fall 2015
- Ryan Henry (Ph.D. Student), "Efficient Zero-Knowledge Proofs and Applications", Winter 2011 – Spring 2014
- Hamidreza Ebrahimzadeh Saffar (Ph.D. Advisory Committee [Patrick Mitran]), Fall 2010 – Spring 2014
- Mehrdad Nojoumian (Ph.D. Advisory Committee [Douglas Stinson]), Fall 2010 – Spring 2012
- Rob Smits (Master's Student), "BridgeSPA: A Single Packet Authorization System for Tor Bridges", Fall 2010 – Winter 2012
- Jalaj Upadhyay (M.Math. Thesis Reader [Douglas Stinson]), Spring 2010 – Fall 2010
- Ali Zibaeenejad (Ph.D. Advisory Committee [Amir Khandani]), Spring 2010 – Spring 2012
- Qi Xie (M.Math. Thesis Reader [Urs Hengartner]), Spring 2010
- Wanying Luo (M.Math. Thesis Reader [Urs Hengartner]), Winter 2010
- Maxwell Young (Ph.D. Advisory Committee [Martin Karsten]), Fall 2009 – Spring 2011
- Ryan Henry (Master's Student), "Nymbler: Privacy-enhanced Protection from Abuses of Anonymity", Fall 2009 – Winter 2011
- Jeremy Clark (Ph.D. Advisory Committee [Urs Hengartner]), Spring 2009 – Spring 2011
- Mashael AlSabah (Ph.D. Student), "Network Performance Improvements for Low-Latency Anonymity Networks", Winter 2009 – Spring 2013
- Greg Zaverucha (Ph.D. Advisory Committee [Douglas Stinson]), Winter 2009 – Fall 2010
- Atefeh Mashatan (Ph.D. Advisory Committee [Douglas Stinson]), Fall 2008
- Andrew Chung (Undergraduate Research Assistant, part-time), "Improvements to Off-the-Record Messaging", Fall 2008
- Femi Olumofin (Ph.D. Student), "Practical Private Information Retrieval", Fall 2008 – Spring 2011
- Can Tang (Master's Student), "An Improved Algorithm for Tor Circuit Scheduling", Fall 2008 – Spring 2010
- Willy Lew (Undergraduate Research Assistant, part-time), "Improvements to Off-the-Record Messaging", Spring 2008
- Lisa Du (Undergraduate Research Assistant, part-time), "Improvements to Off-the-Record Messaging", Spring 2008
- Muhaimeen Ashraf (Undergraduate Research Assistant, part-time), "Improvements to Off-the-Record Messaging", Spring 2008
- Robin Snader (Ph.D. Advisory Committee [Nikita Borisov, University of Illinois at Urbana-Champaign]), Winter 2008 – Fall 2009
- Berkant Ustaoğlu (Ph.D. Advisory Committee [Alfred Menezes]), Winter 2008 – Spring 2008
- Jiayuan Sui (M.Math. Thesis Reader [Douglas Stinson]), Winter 2008 – Spring 2008
- Michael Bodis (Undergraduate Research Assistant, part-time), "Improvements to Tor", Winter 2008
- Rob Smits (Undergraduate Research Assistant, part-time), "Improvements to Off-the-Record Messaging", Winter 2008
- Ali Taleghani (Ph.D. Advisory Committee [Jo Atlee]), Fall 2007 – Fall 2010
- Jiang Wu (Ph.D. Advisory Committee [Douglas Stinson]), Fall 2007 – Spring 2009
- Weihan Wang (M.Math. Thesis Reader [Martin Karsten]), Fall 2007
- Xiaoting Sun (Master's Student), "Anonymous, Secure and Efficient Vehicular Communications", Fall 2007
- Chris Alexander (Master's Student), Fall 2007 – Fall 2009
- Douglas Stebila (Ph.D. Advisory Committee [Michele Mosca]), Spring 2007 – Winter 2009
- Chris Alexander (Undergraduate Student Research Assistant), Spring 2007
- Aniket Kate (Ph.D. Student), "Distributed Key Generation and Its Applications", Spring 2007 – Spring 2010
- Chris Alexander (Undergraduate Research Assistant, part-time), Winter 2007
- Joel Reardon (Master's Student), "Improving Tor using a TCP-over-DTLS Tunnel", Fall 2006 – Fall 2008
Software
-
Arctic
- This repository contains the library code, benchmark
harness, and reproduction scripts for our paper "Arctic:
Lightweight, Stateless, and Deterministic Two-Round Threshold
Schnorr Signatures". This code implements both Arctic (the
deterministic two-round threshold Schnorr signature scheme) and
Shine (the underlying verifiable pseudorandom secret sharing
scheme).
- Released: February 2024
-
PRAC
- PRAC (Private Random Access Computations) implements
three-party secure computation, with a particular focus on
computations that require random access to memory. Parties 0 and
1 are the computational peers, while party 2 is the server. The
server aids the computation, but generally does much less than
the two computational peers. This repository enables you to use
PRAC as a 3PC framework, and also to replicate the results in
our PoPETs 2024(3) paper "PRAC: Round-Efficient 3-Party MPC for
Dynamic Data Structures".
- Released: February 2024
-
Lox
- Lox is a reputation-based bridge distribution system that provides
privacy protection to users and their social graph and is open to all
users. Lox prioritizes protecting the privacy of users and their social
graphs and incorporates enumeration resistance mechanisms to
improve access to bridges and limit the malicious behaviour of
censors. We use an updated unlinkable multi-show anonymous
credential scheme, suitable for a single credential issuer and verifier,
to protect Lox bridge users and their social networks from being
identified by malicious actors.
- Released: October 2022
-
Symmetric Private Information Retrieval (SPIR) built on Spiral
- This code implements Symmetric Private Information Retrieval, building on the Spiral PIR library by Menon and Wu.
In ordinary PIR, the client learns the database record they were looking
for, and the server does not learn which record that was. The client is
not prevented, however, from learning additional database records. In
Symmetric PIR (SPIR), the client must learn only one database record, in
addition to the server learning no information about which record that
was. SPIR is similar to oblivious transfer (OT), except that SPIR aims
to have sublinear communication, while OT does not have that
restriction.
- Released: August 2022
-
Private Information Retrieval for Onion Services
- Private Information Retrieval for Onion Services is a
prototype implementation of Tor with support for asynchronous
PIR lookups for onion services. Such private lookups prevent
malicious Tor onion service directories from learning the
relative popularity of onion services or breaking the
unlinkability guarantees of Tor's v3 onion service
addresses.
- Released: June 2022
-
DHTPIR
- DHTPIR demonstrates how to integrate private information
retrieval (PIR) into censorship-resistant publishing systems
based on secure distributed hash tables (DHTs), in order to
protect node operators from being exposed to information about
what files clients are looking up.
- Released: July 2021
-
CMZ14 credentials
- This code is a Rust library implementing the credentials
from the paper "Algebraic MACs and Keyed-Verification Anonymous
Credentials" (Chase, Meiklejohn, and Zaverucha, CCS
2014).
- Released: April 2021
-
ZXAD
- ZXAD (pronounced "zed-zad") is a zero-knowledge based
private Tor exit abuse detection system. ZXAD detects
large-volume traffic attacks without revealing any information,
apart from the fact that some user is conveying a high volume of
traffic through Tor.
- Released: March 2021
-
Walking Onions Simulator
- Walking Onions is a set of protocols and techniques to
scale anonymity networks and reduce the amount of data required
for clients to download.
- Released: June 2020
-
Log-sized Proof of 1-of-N knowledge of DL
- This code implements the protocol of Section 3 of Groth
and Kohlweiss, "One-out-of-Many Proofs: Or How to Leak a Secret
and Spend a Coin", Eurocrypt 2015. You can look at this protocol
in a number of ways: knowledge of an opening of one of N
Pedersen commitments to 0; knowledge of one of N discrete logs
of group elements; or knowledge of one of N private keys.
- Released: April 2020
-
Slitheen
- Slitheen is a decoy routing system for censorship
resistance that uses packet replacement to defend against both
active and passive attacks. Unlike previous systems, it
protects metadata such as the sizes and traffic patterns of
covert web traffic in addition to protecting IP addresses, host
names, and web page contents.
- Released: June 2018
-
DP5
- DP5 is a suite of protocols to implement private presence:
a service provider can let users of a social network know when
their friends are online, without the service provider itself
ever learning who is friends with whom. DP5 uses private
information retrieval (building on the Percy++ library) to
accomplish this task.
- Released: January 2015 – February 2016
-
PBCWrapper
- PBCWrapper is a set of C++ wrapper classes for the PBC
Pairing-Based Cryptography library. It simplifies the use of
that library with C++ programs, providing convenience with
object management, operator overloading, and more.
- Released: December 2013
-
PolyCommit
- An implementation of Kate, Zaverucha, and Goldberg's
polynomial commitments in C++. It provides a convenient
interface for committing to polynomials or vectors and opening
such commitments. This version also provides classes that
implement zero-knowledge proofs and proofs of knowledge about
committed polynomials.
- Released: December 2013
-
DKG
- Distributed key generation allows a number of parties
distributed around the Internet to collaboratively generate a
secret key, without any of them learning (or choosing) the key
individually, or even in small groups. Our software works in the
asynchronous network model, which is appropriate for realistic
networks such as the Internet, and has been tested for up to 70
globally distributed parties.
- Released: June 2012
-
cudadl
- The cudadl package is an implementation of van Oorschot
and Wiener's parallel version of Pollard's rho algorithm for
finding discrete logs. It uses CUDA GPUs (particularly, 2 NVIDIA
M2050 GPUs) to do the computation. It is optimized for solving
discrete logs over 1536-bit RSA numbers whose totient is smooth;
that is, numbers N=pq where p-1 and q-1 are each the product of
distinct primes less than B, for up to 92-bit B.
- Released: January 2012 – March 2012
-
BridgeSPA
- BridgeSPA is a protocol and implementation of innocuous single packet authorization based on Silent Knock that protects Tor bridges from aliveness checks.
- Released: August 2011
-
Sphinx
- Sphinx is a cryptographic message format used to relay anonymized messages within a mix network. It is more compact than any comparable scheme, and supports a full set of security features: indistinguishable replies, hiding the path length and relay position, as well as providing unlinkability for each leg of the message's journey over the network.
- Released: March 2011
-
Percy++
- Percy++ is an implementation of Private Information
Retrieval protocols in C++. It provides information-theoretic,
computational, or hybrid protection for the privacy of the
query, and handles servers that fail to respond or that respond
incorrectly. Percy++ has been accepted into the Advanced Crypto Software
Collection.
- Released: March 2007 – October 2014
-
Off-the-Record Messaging
- Off-the-Record Messaging (OTR) enables secure and private instant messaging over existing IM networks. In order to emulate real-world "off-the-record" conversions, it provides encryption, authentication, forward secrecy and deniability.
- Released: November 2004 – March 2016
Editorial Boards
Program Committees
- 28th ACM Conference on Computer and Communications Security, November 2021
- 30th USENIX Security Symposium, August 2021
- 41st IEEE Symposium on Security and Privacy, May 2020
- 12th USENIX Workshop on Cyber Security Experimentation and Test, August 2019
- Program Co-chair, 23rd International Conference on Financial Cryptography and Data Security, February 2019
- 2018 International Workshop on Privacy Engineering, April 2018
- 2018 Real World Cryptography Conference, January 2018
- 2017 International Workshop on Privacy Engineering, May 2017
- 23rd ACM Conference on Computer and Communications Security, October 2016
- 2016 International Workshop on Privacy Engineering, May 2016
- 14th Privacy Enhancing Technologies Symposium, July 2014
- 22nd USENIX Security Symposium, August 2013
- 7th USENIX Workshop on Hot Topics in Security (HotSec 2012), August 2012
- 21st USENIX Security Symposium, August 2012
- 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012), May 2012
- 20th USENIX Security Symposium, August 2011
- 4th ACM Conference on Wireless Network Security, June 2011
- Program Chair, 19th USENIX Security Symposium, August 2010
- 18th USENIX Security Symposium, August 2009
- Program Co-chair, 9th Privacy Enhancing Technologies Symposium, August 2009
- 30th IEEE Symposium on Security and Privacy, May 2009
- 17th USENIX Security Symposium, July 2008
- Program Co-chair, 8th Privacy Enhancing Technologies Symposium, July 2008
- 34th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM), January 2008
- 14th Workshop on Selected Areas in Cryptography, August 2007
- 7th Privacy Enhancing Technologies Symposium, June 2007
- 6th Workshop on Privacy Enhancing Technologies, June 2006
- 5th CodeCon, February 2006
- Third Annual Conference on Privacy, Security, and Trust, October 2005
- 5th Workshop on Privacy Enhancing Technologies, May 2005
- 4th CodeCon, February 2005
- 4th Workshop on Privacy Enhancing Technologies, May 2004
- 2002 IEEE Symposium on Security and Privacy, May 2002
- 6th International Financial Cryptography Conference, February 2002
- 10th USENIX Security Symposium, August 2001
- 9th USENIX Security Symposium, August 2000
Other Service
- Cheriton School of Computer Science Performance
Review Committee, January 2024 – March 2024
- Chair, Ad Hoc Committee on Graduate Student Support, Nov 2023 – Apr 2024
- Reviewer: NSERC Discovery—Individual (2024, 1 application)
- School of Computer Science Tenure & Promotions Committee, June 2023 – August 2024
- Infrastructure Co-chair, 24th Privacy Enhancing Technologies Symposium, July 2023 – July 2024
- Reviewer: Israel Science Foundation (2023)
- Cheriton School of Computer Science Performance
Review Committee, January 2023 – March 2023
- Cheriton School of Computer Science Equity, Diversity,
and Inclusion Committee, July 2022 – August 2023
- Cheriton School of Computer Science Awards Committee, July 2022 – August 2024
- Infrastructure Co-chair, 23rd Privacy Enhancing Technologies Symposium, July 2022 – July 2023
- Reviewer: NSERC Discovery—Individual (2022, 2 applications)
- Infrastructure Co-chair, 22nd Privacy Enhancing Technologies Symposium, July 2021 – July 2022
- Reviewer: NSERC (2021)
- Reviewer: German Research Foundation — DFG (2021)
- Reviewer: MITACS Accelerate (2021)
- Co-Chair, School Advisory Committee on Appointments, July 2021 – July 2022
- Reviewer: NSERC Discovery—Individual (2021)
- Chair, Distinguished Lecture Series, July 2020 – June 2021
- Chair, Ad Hoc Committee on Graduate Student Support, July 2020 – December 2020
- Infrastructure Co-chair, 21st Privacy Enhancing Technologies Symposium, July 2020 – July 2021
- Reviewer: Fonds de la Recherche Scientifique — FNRS (2020)
- Reviewer: Israel Science Foundation (2020)
- 2020 Caspar Bowden PET Award Committee, July 2020
- Workshop Co-chair, Privacy, Infrastructures, Policy, February 2020
- Reviewer: New Frontiers in Research Fund (2020)
- PhD Chair Committee, July 2019 – June 2020
- School Advisory Committee on Appointments, July 2019 – June 2020
- Reviewer: MITACS Accelerate (2019)
- Web Co-chair, 20th Privacy Enhancing Technologies Symposium, April 2019 – July 2020
- Reviewer: FWF Austrian Science Fund (2019)
- Reviewer: Fonds de la Recherche Scientifique - FNRS (2019)
- Reviewer: Israel Science Foundation (2019)
- Reviewer: NSERC Discovery—Individual (2019)
- Reviewer, Cybersecurity Body of Knowledge (CyBOK) Privacy & Online Rights Knowledge Area, March 2019
- CS Graduate Committee, July 2018 – June 2019
- School Advisory Committee on Appointments (CrySP group representative), July 2018 – June 2019
- Reviewer: IEEE Transactions on Information Forensics and Security (2018)
- Reviewer: Austrian Science Fund (FWF) (2018)
- Web Co-chair, 19th Privacy Enhancing Technologies Symposium, April 2018 – July 2019
- 2018 Caspar Bowden PET Award Committee, July 2018
- Reviewer: NSERC Discovery—Individual (2018)
- Reviewer: Compute Canada Resource Allocation (2018, 2 applications)
- Cybersecurity and Privacy Institute Board of Directors, December 2017 – present
- Reviewer: 15th USENIX Symposium on Networked Systems Design and Implementation (2017)
- Web Co-chair, 18th Privacy Enhancing Technologies Symposium, April 2017 – June 2018
- Reviewer: 26th ACM Symposium on Operating Systems Principles (2017)
- Reviewer: Research Foundation Flanders (FWO)—Postdoctoral Fellow (2017)
- Pure Advisory Committee, March 2017 – December 2018
- CERC Steering Committee, January 2017 – November 2017
- Web Co-chair, 17th Privacy Enhancing Technologies Symposium, April 2016 – June 2017
- Reviewer: 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (2017)
- Reviewer: ACM Transactions on Database Systems (2016)
- Tor Research Safety Board, September 2016 – present
- Director of Graduate Studies, Cheriton School of Computer Science, July 2016 – June 2018
- Workshop Chair, Cryptography, Security, and Privacy 10th Anniversary Workshop, June 2016
- Cybersecurity and Privacy Steering Committee, January 2016 – December 2017
- Reviewer: NSERC Discovery—Individual (2016, 2 applications)
- Reviewer: Thirtieth AAAI Conference on Artificial Intelligence (2016)
- Faculty Digital Footprint Committee, October 2015 – December 2015
- Faculty of Mathematics Honorary Degrees Committee, October 2015 – June 2016
- Chair, Cheriton School of Computer Science Awards Committee, September 2015 – June 2016
- Reviewer: 21st ACM Conference on Computer and Communications Security (2014)
- 2014 PET Award Co-chair, July 2014
- Reviewer: ACM Transactions on Information and System Security (2014, 2 articles)
- Simply Secure Advisory Board, December 2013 – August 2017
- Reviewer: Microsoft Research PhD Scholarship Programme (2013)
- School of Computer Science Director Search Committee, July 2013 – January 2014
- School Advisory Committee on Appointments, July 2013 – June 2014
- Reviewer: 20th ACM Conference on Computer and Communications Security (2013)
- Reviewer: K.U. Leuven Research Council (2013)
- 2013 PET Award Co-chair, July 2013
- Reviewer: NSERC Discovery—Individual (2013)
- Reviewer: Microsoft Research PhD Scholarship Programme (2012)
- Reviewer: Research Foundation Flanders (FWO)—Research Projects (2012)
- Reviewer: 20th Annual European Symposium on Algorithms (2012)
- Reviewer: 32nd International Cryptology Conference (Crypto) (2012)
- Reviewer: K.U. Leuven Research Council (2012)
- School of Computer Science Web Steering Committee, March 2012 – January 2013
- Reviewer: Research Foundation Flanders (FWO)—Pegasus Fellowship (2012)
- Reviewer: Future Internet (2012, 2 articles)
- Reviewer: NSERC Discovery—Individual (2012)
- 2012 PET Award Committee, July 2012
- CERC Search Committee, November 2011 – July 2014
- Reviewer: IET Information Security (2011)
- Reviewer: Security and Communication Networks (2011)
- Reviewer: 12th International Conference on Cryptology in India (Indocrypt) (2011)
- School of Computer Science Tenure & Promotions Committee, July 2011 – June 2013
- Reviewer: IEEE Transactions on Dependable and Secure Computing (2011)
- General Chair, 11th Privacy Enhancing Technologies Symposium, July 2011
- Reviewer: MITACS Accelerate (2011)
- Reviewer: NSERC Discovery—Individual (2011)
- Reviewer: ACM Transactions on Information and System Security (2011, 4 articles)
- Reviewer: IEEE Transactions on Dependable and Secure Computing (2010)
- Reviewer: Microsoft Research PhD Scholarship Program (2010)
- Computer Science Computing Facility Advisory Committee, July 2010 – June 2011
- Reviewer: MITACS Postdoctoral Research Projects (2010, 3 applications)
- Reviewer: Third International Workshop on the Network of the Future (2010)
- Reviewer: ACM Transactions on Information and System Security (2010)
- Reviewer: IEEE Security & Privacy (2010, 2 articles)
- Reviewer: 17th ACM Conference on Computer and Communications Security (2010)
- Reviewer: VLDB Journal (2010)
- Board of Directors, Centre for Education in Mathematics and Computing, May 2010 – April 2013
- Reviewer: Security and Communication Networks (2010)
- Reviewer: NSERC Discovery—Individual (2010)
- Reviewer: IEEE Security & Privacy (2009)
- Reviewer: Eighth Annual IEEE International Conference on Pervasive Computing and Communications (2009)
- Reviewer: ACM Transactions on Information and System Security (2009, 2 articles)
- Reviewer: Elsevier Computers & Security (2008)
- Reviewer: ACM Transactions on Information and System Security (2008, 3 articles)
- Reviewer: 2008 IEEE Symposium on Security and Privacy (2008)
- Reviewer: Graphics Interface 2008 (2008)
- Reviewer: NSERC Discovery—Individual (2008, 3 applications)
- Privacy Enhancing Technologies Advisory Board, June 2007 – present
- Reviewer: Elsevier Journal of Systems and Software (2007)
- Reviewer: 7th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking (2007)
- Reviewer: Journal of Combinatorial Mathematics and Combinatorial Computing (2007)
- Undergraduate Academic Plans Committee, January 2007 – June 2013
- Chair of the Board of Directors, The Tor Project, a scientific and educational
charity, January 2007 – July 2016
- Director, The Tor Project, December 2006 – July 2016
- Ontario Graduate Scholarships Ranking Committee, October 2006
- Reviewer: IEE Proceedings Information Security (2006)
- Reviewer: ACM Computing Surveys (2006)
- Reviewer: Communications of the ACM (2006)
- 2006 PET Award Committee, June 2006
- 2003 PET Award Committee, March 2003
- Reviewer: 8th Workshop on Selected Areas in Cryptography (2001)
Awards and Honours
- Artifact Award, 24th Privacy Enhancing Technologies Symposium, 2024
- ACM Fellow, 2024–present
- Andreas Pfitzmann Best Student Paper Award, 23rd Privacy Enhancing Technologies Symposium, 2023
- IEEE Senior Member, 2023–present
- Outstanding Performance Awards (University of Waterloo), 2012, 2015, 2018, 2022
- Winner of the NRL 54th Annual Alan Berman Research Publication Award, 2022
- Runner-up for the ARES 2021 Best Paper Award, 2021
- USENIX Security Test of Time Award, 2019
- Canada Research Chair in Privacy Enhancing Technologies (Tier 1), 2019–present
- Winner of the 2018 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies, 2018
- Runner-up for the 2018 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies, 2018
- Andreas Pfitzmann Best Student Paper Award, 18th Privacy Enhancing Technologies Symposium, 2018
- ACM Distinguished Member, 2017–2024
- Visiting Fellow, Clare Hall, University of Cambridge, August 2014 – February 2015
- Andreas Pfitzmann Best Student Paper Award, 13th Privacy Enhancing Technologies Symposium, 2013
- Runner-up for the 2012 PET Award for Outstanding Research in Privacy Enhancing Technologies, 2012
- University Research Chair (University of Waterloo), 2012–2019
- Pioneer Award (Electronic Frontier Foundation), 2011
- Outstanding Young Computer Science Researcher Award (Canadian Association of Computer Science), 2011
- Early Researcher Award (Ontario Ministry of Research and Innovation), 2010
- ACM Senior Member, 2010–2017
- Wired Magazine's Wired 25, 1998
- Best Paper Award, 6th USENIX Security Symposium, 1996
- NSERC Post-Graduate Scholarships, 1995–1999
- Governor General's Silver Medal, 1995
Professional Affiliations