Honors and Awards
2008: McKnight Land-Grant Professorship
2007: Science and Engineering Student Board - Best Professor Award
2006: National Science Foundation Faculty Early Career Development Program (CAREER Award)
Selected Grants
DeepCoFFEA: Powerful and Efficient Metadata Traffic Analysis via Metric Learning and Amplification
Wright, M., Yang, S., Hopper, N.; Rochester Institute of Technology; 10/22-10/24
SaTC: CORE: Small: Models and Measurements for Website Fingerprinting
Hopper, N.; National Science Foundation; 9/18-8/23
SaTC: CORE: Small: Consistent and Private Group Communication
Hopper, N.; National Science Foundation; 9/18-8/23
Selected Publications
2022
Oh, S.E., Yang, T., Mathews, N., Holland, J.K., Rahman, M.S., Hopper, N., Wright, M. (2022). DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification. In Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. (1915-1932). (2022 IEEE Symposium on Security and Privacy (SP).). Institute of Electrical and Electronics Engineers Inc..
DOI: 10.1109/SP46214.2022.9833801
Witwer, E., Holland, J.K., Hopper, N. (2022). Padding-only Defenses Add Delay in Tor. In WPES 2022 - Proceedings of the 21st Workshop on Privacy in the Electronic Society, co-located with CCS 2022. (29-33). (WPES 2022 - Proceedings of the 21st Workshop on Privacy in the Electronic Society, co-located with CCS 2022.). Association for Computing Machinery, Inc.
DOI: 10.1145/3559613.3563207
Holland, J.K., Hopper, N. (2022). RegulaTor: A Straightforward Website Fingerprinting Defense. Proceedings on Privacy Enhancing Technologies. 2022 (2), [344-362].
DOI: 10.2478/popets-2022-0049 Electronic version
2021
Oh, S.E., Mathews, N., Rahman, M.S., Wright, M., Hopper, N. (2021). GANDaLF: GAN for Data-Limited Fingerprinting. Proceedings on Privacy Enhancing Technologies. 2021 (2), [305-322].
DOI: 10.2478/popets-2021-0029 Electronic version
2019
Schliep, M., Hopper, N. (2019). End-to-end secure mobile group messaging with conversation integrity and deniability. In WPES 2019 - Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. (55-73). (Proceedings of the ACM Conference on Computer and Communications Security. (1543-7221)). Association for Computing Machinery.
DOI: 10.1145/3338498.3358644
Oh, S.E., Sunkam, S., Hopper, N. (2019). p1 -FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning. Proceedings on Privacy Enhancing Technologies. 2019 (3), [191-209].
DOI: 10.2478/popets-2019-0043 Electronic version
2018
Schliep, M., Vasserman, E., Hopper, N. (2018). Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR. Proceedings on Privacy Enhancing Technologies. 2018 (3), [181-202].
DOI: 10.1515/popets-2018-0027 Electronic version
Li, S., Guo, H., Hopper, N. (2018). Measuring information leakage in website fingerprinting attacks and defenses. In CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. (1977-1992). (Proceedings of the ACM Conference on Computer and Communications Security. (1543-7221)). Association for Computing Machinery.
DOI: 10.1145/3243734.3243832
Parhi, R., Schliep, M., Hopper, N. (2018). MP3: A More Efficient Private Presence Protocol. In Meiklejohn, S., Sako, K. (eds). Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers. (38-57). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10957 LNCS. (0302-9743)). Springer Verlag.
DOI: 10.1007/978-3-662-58387-6_3
Schliep, M., Hopper, N. (2018). POSTER: End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage. Proceedings of the ACM Conference on Computer and Communications Security. [2282-2284].
DOI: 10.1145/3243734.3278506
Jansen, R., Traudt, M., Hopper, N. (2018). Privacy-preserving dynamic learning of tor network traffic. In CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. (1944-1961). (Proceedings of the ACM Conference on Computer and Communications Security. (1543-7221)). Association for Computing Machinery.
DOI: 10.1145/3243734.3243815
2017
Oh, S.E., Li, S., Hopper, N. (2017). Fingerprinting Keywords in Search Queries over Tor. Proceedings on Privacy Enhancing Technologies. 2017 (4), [251-270].
DOI: 10.1515/popets-2017-0048 Electronic version
Schliep, M., Kariniemi, I., Hopper, N. (2017). Is bob sending mixed signals?. In WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. (31-40). (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. 2017-January.). Association for Computing Machinery, Inc.
DOI: 10.1145/3139550.3139568
Johnson, A., Jansen, R., Hopper, N., Segal, A., Syverson, P. (2017). PeerFlow: Secure Load Balancing in Tor. Proceedings on Privacy Enhancing Technologies. 2017 (2), [74-94].
DOI: 10.1515/popets-2017-0017 Electronic version
2016
Geddes, J., Schliep, M., Hopper, N. (2016). ABRA CADABRA: Magically increasing network utilization in tor by avoiding bottlenecks. In WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016. (165-176). (WPES 2016 - Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2016.). Association for Computing Machinery, Inc.
DOI: 10.1145/2994620.2994630
Li, S., Hopper, N. (2016). Mailet: Instant Social Networking under Censorship. Proceedings on Privacy Enhancing Technologies. 2016 (2), [175-192].
DOI: 10.1515/popets-2016-0011 Electronic version
Schuchard, M., Geddes, J., Schliep, M., Hopper, N. (2016). The cost of the path not taken. In 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings. (2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings.). Institute of Electrical and Electronics Engineers Inc..
DOI: 10.1109/GLOCOM.2016.7842316
2015
Chan-Tin, E., Heorhiadi, V., Hopper, N., Kim, Y. (2015). Hijacking the Vuze BitTorrent network: All your hop are belong to us. IET Information Security. 9 (4), [203-208].
DOI: 10.1049/iet-ifs.2014.0337
Hopper, N., Jansen, R. (2015). WPES '15 foreword. WPES 2015 - Proceedings of the 2015 ACM Workshop on Privacy in the Electronic Society, co-located with CCS 2015. [iii].
Hopper, N., Jansen, R. (2015). WPES 2015: The 14th Workshop on Privacy in the Electronic Society. In CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (1719-1720). (Proceedings of the ACM Conference on Computer and Communications Security. 2015-October. (1543-7221)). Association for Computing Machinery.
DOI: 10.1145/2810103.2812628