Steering Committee, ACM WPES
(ACM Workshop on Privacy in the Electronic Society)
Charter Member, IFIP WG 1.7,
on Theoretical Foundations of Security Analysis and Design
Advertisements for some past activities that I was ``in charge of'' in some way:
Steering Committee, ACM CCS (ACM Computer and Communications Security
Conference)
Director, IFCA
(International Financial Cryptography Association), 2002 -- 2005
Director, ICISA
(International Communications and Information Security
Association)
Editor, Cipher Newsletter
of the IEEE Computer Society Technical Committee on Security
and Privacy, 1998 -- 2000
Current Primary Research Interests
My primary research interest is traffic-secure communications:
basic theory, system design, protocols, incentives, trust, threat
models, performance, usability, applications, etc. This began with and
continues to focus on onion
routing, an approach to traffic-secure communications invented by
David Goldschlag, Michael Reed, and myself at the Naval Research
Laboratory in 1995. It includes Tor, an instance of onion routing
designed by Roger Dingledine, Nick Mathewson, and myself in 2002 as
part of one of my onion routing projects, and since spun off to its
own nonprofit organization, The
Tor Project, Inc.. I sometimes dabble in other areas of security
and privacy, also in probability and decision theory, logic,
knowledge, combat epistemology, etc.
Some publications
Books:
Logic, Convention, and Common Knowledge: A Conventionalist Account
of Logic. Published by CSLI
Lecture Notes. The full text, except for the forward by Anthony
Everett, is available in the following
PDF.
Concerning Film Rights: Against the
expressed personal advice of Neal Stephenson, movie
rights to this book have been optioned to Nick Mathewson, to whom
all inquiries in this regard should be directed.
A preliminary version Probabilistic Analysis of Onion
Routing in a Black-box Model [Extended
Abstract], (PDF)
appeared in WPES'07: Proceedings of the 2007 ACM Workshop on
Privacy in Electronic Society: ACM Press, pp. 1-10, 2007.
Introduction of representation in the universally composable
(UC) framework was made in Anonymity Analysis of Onion
Routing in the Universally Composable
Framework(PDF),
appearing in
the 2012
Provable Privacy Workshop.
Practical Vulnerabilities of the Tor Anonymity Network.
by Paul
Syverson.
In Advances in Cyber Security: Technology, Operation and
Experiences, Fordham University
Press, 2013.    
PDF
Distance Bounding Protocols: Authentication Logic Analysis
and Collusion Attacks.
by Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu
Chang, and Paul Syverson
In "Secure Localization and Time Synchronization for Wireless
Sensor and Ad Hoc Networks", Springer-Verlag 2007.
   PDF
Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A
Graph Theoretic Approach.
by Loukas Lazos, Radha Poovendran, Catherine Meadows, Paul Syverson, and
LiWu Chang.
In IEEE Wireless Communications and Networking Conference (WCNC 2005).
   PDF
Formal Specification and Analysis of the Group Domain of
Interpretation Protocol Using NPATRL and the NRL Protocol
Analyzer.
by Catherine Meadows, Paul Syverson, and Iliano Cervesato.
In Journal of
Computer Security.    PDF
Quasi-Anonymous Channels. by Ira S. Moskowitz, Richard
E. Newman, and Paul Syverson.
In IASTED International Conference on Communication, Network,
and Information Security (CNIS 2003).     PDF
Metrics for Traffic Analysis Prevention. by Richard
E. Newman, Ira S. Moskowitz, Paul Syverson, and Andrei
Serjantov.
In Privacy Enhancing
Technologies (PET 2003).    
PDF
On the Economics of Anonymity .
by Alessandro Acquisti, Roger Dingledine, and Paul Syverson.
In Financial
Cryptography (FC 2003).    PDF,
PS,
  
Slides: (PDF)
From a Trickle to a Flood: Active Attacks on Several Mix Types.
by Andrei Serjantov, Roger Dingledine, and Paul Syverson.
In Information
Hiding,
Oct 2002.    
PDF
Reputation in Privacy Enhancing Technologies.
by Roger Dingledine, Nick Mathewson, and Paul Syverson.
In Computers,
Freedom, and Privacy, Apr 2002.     html,
PDF
  
Slides: ( PPT,
PS
)
Reliable MIX Cascade Networks through Reputation.
by Roger Dingledine and Paul Syverson.
In Financial Cryptography 2002.
    PDF,
  
Slides: (PDF)
The Logic of Authentication Protocols.
by Paul Syverson and Iliano Cervesato.
In Foundations of Security Analysis
and Design, Springer-Verlag LNCS 2171
   PDF
Weakly Secret Bit Commitment: Applications to Lotteries and
Fair Exchange.
by Paul Syverson.
In Proceedings of the 1998 IEEE Computer Security Foundations
Workshop (CSFW11).    PDF
A logical approach to multilevel security of probabilistic systems.
by James W. Gray, III and Paul Syverson.
In Distributed Computing, 11(2), 1998.    PDF
A Different Look at Secure Distributed Computation.
by Paul Syverson.
In Proceedings of the 1997 IEEE Computer Security Foundations
Workshop (CSFW10).    PDF
Protocols using Anonymous Connections: Mobile Applications.
by Michael Reed, Paul Syverson, and David Goldschlag.
In Security Protocols 1997, Proceedings of the 5th International Workshop, Springer-Verlag LNCS 1361.    Abstract,
PDF
Hiding Routing Information.
by Michael Reed, Paul Syverson, and David Goldschlag.
In Information Hiding, First International Workshop,
Springer-Verlag LNCS 1174.    Abstract,
PDF