New developments in Nmap. Talk given at the 2007 Front Range Information Security Conference.
Metro State commencement address 2007.
Fun with Nmap and free software development.
Work and play with Nmap and friends, my talk at LinuxTag 2009.
The Nmap Scripting Engine, FOSDEM 2010.
Mastering the Nmap Scripting Engine, Black Hat and Def Con 2010.
Remote IPv6 OS classification, talk at Security Lunch on October 19, 2011.
OWASP talk about flash proxies, given November 30, 2011 at Stanford for the OWASP Bay Area group.
Stanford ACM talk about flash proxies, given February 17, 2012.
Stanford EE Computer Systems Colloquium (EE380) talk about flash proxies, given February 20, 2013. Winter schedule. Abstract. Video stream. Zip of speaker's materials (including graphics etc.).
Using online scanning services for censorship circumvention, presented July 11, 2013 at PETS 2013.
So you want to write a Tor pluggable transport, presented December 30, 2013 at 30C3.
Domain fronting, work-in-progress talk presented August 18, 2014 at FOCI 2014.
Fingerprinting web users through font metrics, presented January 26, 2015 at Financial Crypto 2015.
Blocking-resistant communication through domain fronting, presented June 30, 2015 at PETS 2015.
A refresher course in programming in C and debugging with GDB, lecture given September 15, 2015 for CS 161 (Computer Security).Remote Operating System Classification over IPv6, presented October 16, 2015 at AISec 2015.
Tor lecture given October 20, 2015 for CS 161 (Computer Security).
Sound Features in Greek Poetry with Stephen Sansom, presented November 6, 2015 at the Intersections graduate student conference.
Do You See What I See? Differential Treatment of Anonymous Users with Sadia Afroz, presenting research also by Sheharbano Khattak, Mobin Javed, Srikanth Dundaresan, Vern Paxson, Steven J. Murdoch, and Damon McCoy. Presented March 22, 2016 at Twitter.
the meek saga, AD 2014–present FOCI 16 rump session, August 8, 2016.
Threat modeling and circumvention of Internet censorship Ph.D. thesis proposal (qualifying exam), November 15, 2016. The proposal itself (25 pages).
Flow feature–based classification in commercial firewalls: A coming menace? PETS 2017 rump session, July 20, 2017.
Center for Long-Term Cybersecurity Research Exchange (PPTX) September 8, 2017. zip file.
Threat modeling and circumvention of Internet censorship (dissertation talk) Ph.D. dissertation talk, September 28, 2017.
TARdiss: packaging bugs in package manager About security bugs in RubyGems (anonymized because at the time the bugs were not public). With Nathan Malkin, November 1, 2017.
Censorship talk at MSU Denver, .
Censorship talk at Colorado School of Mines, .
Censorship talk at University of Colorado, Boulder, .
A better zip bomb, talk at Denhac/DC303, .
A better zip bomb, USENIX WOOT 2019, .
Turbo Tunnel, USENIX FOCI 2019 short talk, .
Turbo Tunnel, a good way to design censorship circumvention protocols, USENIX FOCI 2020, .
How China Detects and Blocks Shadowsocks, presented on behalf of the authors at Internet Measurement Conference 2020, .
Turbo Tunnel Q&A and workshop, Pluggable Transports Implementers' Meeting, .
Presenter for EP of the year, The Wavy Awards 2022.
Internet censorship and circumvention, guest lecture for CS3640 Intro to Computer Networks, University of Iowa, .
Empirical syllable length in performance of hexameter, at the Metri Causa conference, .
Running a high-performance pluggable transports Tor bridge, FOCI 2023, .
Calibrating Tor Metrics user estimates, PETS 2023, .
Internet censorship and circumvention, guest lecture for CS3640 Intro to Computer Networks, University of Iowa, .
Against the "arms race", keynote talk at FOCI 2024.1, .
Snowflake, a censorship circumvention system using temporary WebRTC proxies, USENIX Security 2024, .
How cryptography relates to Internet censorship circumvention, Workshop on Attacks in Cryptography 7, .
Internet censorship and circumvention, guest lecture for CS3640 Intro to Computer Networks, University of Iowa, .