Publications

Books and Proceedings

  1. Ying-Dar Lin, Chun-Ying Huang, Matthew Wright, and Georgios Kambourakis (Eds.), IEEE Computer Special Issue on Mobile Application Security, June 2014.
  2. Emiliano De Cristofaro and Matthew Wright (Eds.), Privacy Enhancing Technologies, 13th International Symposium (PETS 2013), Bloomington, IN, USA. 264 pages. July 2013.
  3. Simone Fischer-Hübner and Matthew Wright (Eds.), Privacy Enhancing Technologies, 12th International Symposium (PETS 2012), Vigo, Spain. 319 pages. July 2012.

Book Chapters

  1. Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal K. Das. “Distributed detection of replica node attacks in sensor networks,” Chapter 25 of Distributed Sensor Networks, Richard Brooks and S.S. Iyengar, editors. CRC Press/Taylor& Francis, December 2012.

[Citation counts ≥ 10 provided by Google Scholar, Jan. 2018]

Journal Publications (26 in publication, 2 under review)

  1. Mohsen Imani, Mehrdad Amirabadi, and Matthew Wright, “Modified Relay Selection and Circuit Selection for Faster Tor,” (under review).
  2. Mahdi Nasrullah Al-Ameen, Sonali T. Marne, Kanis Fatema, Shannon Scielzo, and Matthew Wright, “On Improving the Memorability of System-Assigned Cognometric Graphical Passwords,” (under review).
  3. Mohsen Imani, Armon Barton, and Matthew Wright, “Guard Sets in Tor using AS Relationships,” Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2018, No. 1, Jan. 2018. PDF
  4. Jun-Won Ho and Matthew Wright, “Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations,” IEEE Access, Jan. 2017. PDF
  5. Mahdi N. Al-Ameen and Matthew Wright, “A Comprehensive Study of the GeoPass User Authentication Scheme,” Interacting with Computers (IwC), published online: Nov. 2016.
  6. Mahdi Nasrullah Al-Ameen and Matthew Wright, “iPersea: Towards Improving the Sybil-Resilience of Social DHT,” Journal of Networking and Computer Applications (JNCA), Vol. 71.
  7. Mahdi Nasrullah Al-Ameen, S M Taiabul Haque, and Matthew Wright, “Leveraging Autobiographical Memory for Two-Factor Online Authentication,” Information & Computer Security. Vol. 24, No. 4, Oct. 2016.
  8. Armon Barton and Matthew Wright, “DeNASA: Destination-Naive AS-Awareness in Anonymous Communications,” Proceedings on Privacy Enhancing Technologies (PoPETs), Vol. 2016, No. 4, pp. 356-372, Aug. 2016. Cited by 10. PDF
  9. S M Taiabul Haque, Matthew Wright, and Shannon Scielzo, “Hierarchy of Users' Web Passwords: Perceptions, Practices and Susceptibilities,” International Journal of Human-Computer Studies (IJHCS) Vol. 72, No. 12, pp. 860-874, Dec. 2014. Cited by 15. HTML
  10. Na Li, Mayank Raj, Donggang Liu, Matthew Wright, Sajal K. Das. “Using data mules to preserve source location privacy in wireless sensor networks,” Pervasive and Mobile Computing (PMC), Vol. 14, No. 1, pp. 244-260, Apr. 2014. Cited by 32. PDF
  11. Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, and Matthew Wright, “ReDS: A Framework for Reputation-Enhanced DHTs,” Transactions on Parallel and Distributed Systems (TPDS) Special Issue on Trust, Security, and Privacy, Vol. 25, No. 2, pp. 321-331, Feb. 2014. Cited by 12. PDF
    • Supplementary Material: PDF
  12. Qi Dong, Donggang Liu, and Matthew Wright, “Mitigating Jamming Attacks in Wireless Broadcast Systems,” ACM/Springer Journal on Wireless Networks (WINET), Vol. 19, No. 8, pp. 1867-1880, Nov. 2013. HTML
  13. Kush Kothari and Matthew Wright, “Mimic: An active covert channel that evades regularity-based detection,” Computer Networks (Elsevier). Vol. 57, No. 3, pp. 647-657, Feb. 2013. Cited by 19. HTML
  14. Mahdi N. Al-Ameen, Charles Gatz, and Matthew Wright, “SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure,” Journal of Networks Special Issue on Selected Papers ICCIT 2011, Vol. 7, No. 12, pp. 1943-1951, Dec. 2012. PDF
  15. Jun-Won Ho, Matthew Wright, and Sajal. K. Das, “ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis,” Transactions on Dependable and Secure Computing (TDSC) Special Issue on Learning, Games, and Security. Vol. 9, No. 4, pp. 494-510, July 2012. Cited by 43. PDF
  16. Jun-Won Ho, Matthew Wright, and Sajal. K. Das, “Distributed Detection of Mobile Malicious Node Attacks in Wireless Sensor Networks,” Ad-Hoc Networks (Elsevier), Vol. 10, No. 3, pp. 512-523, May 2012. Cited by 27. HTML
  17. Kiran Mehta, Donggang Liu, and Matthew Wright, “Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper,” IEEE Transactions on Mobile Computing (TMC), Vol. 11, No. 2, pp. 320-336, Feb. 2012. Cited by 141. PDF
  18. Nayantara Mallesh and Matthew Wright, “An Analysis of the Statistical Disclosure Attack and Receiver-Bound Cover,” Computers & Security (Elsevier), Vol. 30, No. 8, Nov. 2011, pp. 597-612. PDF
  19. Gauri Vakde, Radhika Bibikar, Zhengyi Le, and Matthew Wright, “EnPassant: Anonymous Routing for Disruption-Tolerant Networks with Applications in Assistive Environments,” Security and Communication Networks (Wiley SCN), Vol. 4, No. 11, pp. 1243-1256, Nov. 2011. PDF
  20. Boris Margolin, Brian Levine, and Matthew Wright, “Economic Incentives for Protecting Digital Rights Online,” Electronic Commerce Research and Applications (Elsevier ECRA), Vol. 10, No. 5, 553-564, Sep. 2011. PDF
  21. Jun-Won Ho, Matthew Wright, and Sajal K. Das, “Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing,” IEEE Transactions on Mobile Computing (TMC), Vol. 10, No. 6, pp. 767-782, June 2011. Cited by 63. PDF
  22. Robert J. Walls, Kush Kothari, and Matthew Wright, “Liquid: A Detection-Resistant Covert Timing Channel Based on IPD Shaping,” Computer Networks (Elsevier) Vol. 55, No. 6, April 2011, pp. 1217-1228. Cited by 30. PDF
  23. Marc Liberatore, Bikas Gurung, Brian Levine, and Matthew Wright, “Empirical Tests of Anonymous Voice Over IP,” Journal of Networking and Computer Applications (Elsevier JNCA), vol. 34, no. 1, pp. 341-350, Jan. 2011. PDF
  24. Safwan M. Khan, Nayantara Mallesh, Arjun Nambiar, and Matthew Wright, “The Dynamics of Salsa: a Structured Approach to Large-Scale Anonymity,” Network Protocols and Algorithms (NPA), Vol. 2, No. 4, pp. 40-60, Dec. 2010. PDF
  25. Jaideep Padhye, Kush Kothari, Madhu Venkateshaiah, and Matthew Wright, “Evading Stepping Stone Detection Under the Cloak of Streaming Media with SNEAK,” Computer Networks (Elsevier), vol. 54, no. 13, pp. 2310-2325, Sep. 2010. PDF
  26. Jun-Won Ho, Donggang Liu, Matthew Wright, and Sajal K. Das, “Distributed Detection of Replica Node Attacks with Group Deployment Knowledge in Wireless Sensor Networks,” Ad-Hoc Networks Journal (Elsevier) Special Edition on Privacy and Security in Wireless Sensor Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009. Cited by 81.
  27. Matthew Wright, Micah Adler, Brian N. Levine, and Clay Shields, “Passive Logging Attacks Against Anonymous Communications,” ACM Transactions on Information and Systems Security (TISSEC), vol. 11, no. 2, 2008, pp. article no. 3, Cited by 40. PDF
  28. Matthew Wright, Micah Adler, Brian N. Levine, and Clay Shields, “The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems,” ACM Transactions on Information and Systems Security (TISSEC), vol. 7, no. 4, pp. 489-522, Nov. 2004 (By invitation), Cited by 236. PDF

Conference Publications (34 papers)

  1. Payap Sirinam, Marc Juarez, Mohsen Imani, and Matthew Wright, “Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning,” Proc. ACM Conference on Computer and Communications Security (CCS), Oct. 2018. PDF
  2. Armon Barton, Mohsen Imani, Jiang Ming, and Matthew Wright, “Towards Predicting Efficient and Anonymous Tor Circuits,” Proc. USENIX Security Symposium, Aug. 2018. PDF
  3. John P. Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, and Matthew Wright, “LiLAC: Lightweight Low-Latency Anonymous Chat,” Proc. IEEE Symposium on Privacy-Aware Computing (PAC), Aug. 2017. PDF
  4. S M Taiabul Haque, Mahdi Nasrullah Al-Ameen, Matthew Wright and Shannon Scielzo, “Learning system-assigned passwords (up to 56 bits) in a single registration session with the methods of cognitive psychology,” Proc. Usable Security Mini-Conference (USEC), Feb. 2017. PDF
  5. Sovantharith Seng, Sadia Ahmed, Mahdi Nasrullah Al-Ameen and Matthew Wright, “(Work in Progress) An Insight into the Authentication Performance and Security Perception of Older Users” Proc. Usable Security Mini-Conference (USEC), Feb. 2017. PDF
  6. Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz and Matthew Wright, “Toward an Efficient Website Fingerprinting Defense,” Proc. European Symposium on Research in Computer Security (ESORICS), Sep. 2016. Outstanding Student Paper. Cited by 20. PDF
  7. Changchang Liu, Peng Gao, Matthew Wright, and Prateek Mittal, “Exploiting Temporal Dynamics in Sybil Defenses,” Proc. ACM Conference on Computer and Communications Security (CCS), Oct. 2015. PDF
  8. Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright, and Shannon Scielzo, “Leveraging Real-Life Facts to Make Random Passwords More Memorable,” Proc. European Symposium on Research in Computer Security (ESORICS), Sep. 2015.
  9. Mahdi Nasrullah Al-Ameen, Kanis Fatema, Shannon Scielzo, and Matthew Wright, “The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords,” Proc. Symposium on Usable Privacy and Security (SOUPS), July 2015. PDF
  10. Mahdi Nasrullah Al-Ameen, Shannon Scielzo, and Matthew Wright, “Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues,” Proc. ACM Conference on Human Factors in Computing Systems (CHI), April 2015. Cited by 21. Video preview: https://youtu.be/MgaEPkIYQa8 PDF
  11. S M Taiabul Haque, Shannon Scielzo, and Matthew Wright, “Applying psychometrics to measure user comfort when constructing a strong password,” Proc. Symposium on Usable Privacy and Security (SOUPS), July 2014. Cited by 10. PDF
  12. Jody Sankey and Matthew Wright, “Dovetail: Stronger Anonymity in Next-Generation Internet Routing,” Proc. Privacy Enhancing Technologies Symposium (PETS), July 2014. Cited by 18. PDF
  13. Mahdi Nasrullah Al-Ameen and Matthew Wright, “Design and Evaluation of Persea, a Sybil-Resistant DHT,” ACM Symposium on Information, Computer and Communications Security (ASIACCS), June 2014. PDF
  14. Prateek Mittal, Nikita Borisov, and Matthew Wright, “Pisces: Anonymous communication using social networks,” Proc. ISOC Network and Distributed System Security Symposium (NDSS). Feb. 2013. Cited by 43. PDF
  15. Umair Sadiq, Mohan Kumar, and Matthew Wright, “CRISP: Collusion Resistant Incentive Compatible Routing and Forwarding in Opportunistic Networks,” Proc. ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM). October 2012. Cited by 16. PDF
  16. Kartik Siddhabathula, Qi Dong, Donggang Liu, and Matthew Wright, “Fast Jamming Detection in Sensor Networks,” Proc. IEEE International Conference on Communications (ICC ‘12), June 2012. Cited by 10. PDF
  17. Na Li, Mayank Raj, Dongaang Liu, Matthew Wright, and Sajal K. Das, “Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks,” Proc. 13th International Conference on Distributed Computing and Networking (ICDCN 2012), Jan. 2012. Finalist for “Best Paper: Networking Track” (one of three).
  18. Mahdi Nasrullah Al-Ameen, Charles Gatz, and Matthew Wright, “SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure,” Proc. International Conference on Computer and Information Technology (ICCIT), Dec. 2011.
  19. Titus Abraham and Matthew Wright, “Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes,” Proc. IEEE GLOBECOM, Dec. 2010. PDF
  20. Fei Xu, Jingsha He, Matthew Wright, and Jing Xu. “Privacy Protection in Location-Sharing Systems,” Proc. Intl. Conference on Computer Application and System Modeling (ICCASM ’10), Oct. 2010. PDF
  21. Nayantara Mallesh and Matthew Wright, “The Reverse Statistical Disclosure Attack,” Proc. Information Hiding Conference (IH ’10), June 2010. Cited by 12. PDF
  22. Jun-Won Ho, Matthew Wright, and Sajal. K. Das, “ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis,” Proc. IEEE Symposium on Reliable Distributed Systems (SRDS ’09) [Short Paper], September 2009. PDF
  23. Jun-Won Ho, Matthew Wright, and Sajal K. Das, “Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis,” Proc. IEEE Intl. Conf. on Computer Communications (INFOCOM ‘09), June 2009. Cited by 112.
  24. Jun-Won Ho, Nayantara Mallesh, and Matthew Wright, "The Design and Lessons of the ASCENT Security Teaching Lab," Proc. of the Colloquium for Information Systems Security Education (CISSE ‘09), Jun. 2009. PDF
  25. Brent Lagesse, Mohan Kumar, Justin M. Paluska, and Matthew Wright, “DTT: A Distributed Trust Toolkit for Pervasive Systems,” Proc. IEEE Intl. Conf. on Pervasive Computing and Communications (PerCom ‘09) [Short Paper], Mar. 2009. Cited by 21. PDF
  26. Brent Lagesse, Mohan Kumar, and Matthew Wright, “AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems,” Proc. IEEE Intl. Conf. on Peer-to-Peer Computing (P2P ‘08), Sep. 2008. Cited by 21. PDF
  27. Hatim Daginawala and Matthew Wright, “Studying Timing Analysis on the Internet with SubRosa,” Proc. Privacy Enhancing Technologies Symposium (PETS ‘08), July 2008. PDF
  28. Kiran Mehta, Donggang Liu, and Matthew Wright, “Location Privacy in Sensor Networks Against a Global Eavesdropper,” Proc. IEEE International Conference on Network Protocols (ICNP ‘07), Oct. 2007. Cited by 269. PDF
  29. Nayantara Mallesh and Matthew Wright, “Countering Statistical Disclosure with Receiver-Bound Cover Traffic,” Proc. European Symposium on Research in Computer Security (ESORICS ‘07), Sep. 2007. Cited by 21. PDF
  30. Arjun Nambiar and Matthew Wright, “Salsa: A Structured Approach to Large-Scale Anonymity,” Proc. ACM Conference on Computer and Communications Security (CCS ‘06), Nov. 2006. Cited by 163. PDF
  31. Michael Reiter, Xiaofeng Wang, and Matthew Wright, “Building Reliable Mix Networks with Fair Exchange,” Proc. Applied Cryptography and Network Security Conference (ACNS ‘05), pp. 378-392, June 2005. Cited by 16. PDF
  32. Brian N. Levine, Michael Reiter, Chenxi Wang, and Matthew Wright, “Timing Analysis in Low-Latency Mix Systems,” Proc. Intl. Conference on Financial Cryptography (FC ‘04), Feb. 2004. Cited by 359. Nominated for the Privacy Enhancing Technologies Award. PDF
  33. Matthew Wright, Micah Adler, Brian N. Levine, and Clay Shields, “Defending Anonymous Communications Against Passive Logging Attacks,” Proc. IEEE Symposium on Security and Privacy (S&P ’03), pp. 28-41, May 2003. Cited by 199. PDF
  34. Matthew Wright, Micah Adler, Brian N. Levine, and Clay Shields, “An Analysis of the Degradation of Anonymous Protocols,” Proc. ISOC Network and Distributed Systems Security Symposium (NDSS ‘02), Feb. 2002. Cited by 259. Winner of the Outstanding Paper Award. PDF

Workshop and Poster (29 papers)

  1. Mohammad Saidur Rahman, Kantha Girish Gangadhara, Payap Sirinam, Matthew Wright, “Using Packet Timing in Website Fingerprinting”, Proc. IEEE Symposium on Security & Privacy (Oakland), May 2018. PDF
  2. Mohammad Saidur Rahman, Kantha Girish Gangadhara, Payap Sirinam, Matthew Wright, “Website Fingerprinting Attacks with Timing-based Features using Capsule Networks”, Proc. IEEE Symposium on Security & Privacy (Oakland), May 2018. PDF
  3. Sovantharith Seng, Mahdi Nasrullah Al-Ameen, and Matthew Wright, “Understanding Users' Decision of Clicking on Posts in Facebook with Implications for Phishing,” Proc. Workshop on Technology and Consumer Protection (ConPro), May 2018.
  4. Armon Barton, Mohsen Imani, Jiang Ming, and Matthew Wright, “Poster: PredicTor: Predicting Fast Circuits for A Faster User Experience in Tor,” Proc. IEEE Symposium on Security and Privacy (Oakland), May 2017. PDF
  5. Sonali Marne, Mahdi Nasrullah Al-Ameen, and Matthew Wright, “Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities,” Proc. Workshop on Inclusive Privacy and Security (WIPS), July 2017. PDF
  6. Mohsen Imani, Armon Barton, and Matthew Wright, “Poster: Guard Sets in Tor Using AS Relationships,” Proc. IEEE Symposium on Security and Privacy (Oakland), May 2017. PDF
  7. Marc Juarez, Rob Jansen, Rafael Galvez, Tariz Elahi, Claudia Diaz, and Matthew Wright, “Poster: Fingerprinting Hidden Service Circuits from a Tor Middle Relay,” Proc. IEEE Symposium on Security and Privacy (Oakland), May 2017. PDF
  8. Sovantharith Seng, Mahdi Nasrullah Al-Ameen, and Matthew Wright, “Poster: Phishing on Facebook,” Proc. IEEE Symposium on Security and Privacy (Oakland), May 2017. PDF
  9. Payap Sirinam, Mohsen Imani, and Matthew Wright, “Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning,” Proc. IEEE Symposium on Security and Privacy (Oakland), May 2017. PDF
  10. John P. Podolanko, Jiang Ming, and Matthew Wright, “Countering Double-Spend Attacks on Bitcoin Fast-Pay Transactions,” Proc. Workshop on Technology and Consumer Protection (ConPro), May 2017. PDF
  11. Brian N. Levine, Marc Liberatore, Brian Lynn, and Matthew Wright, “Statistical Detection of Downloaders in Freenet,” Proc. IEEE International Workshop on Privacy Engineering (IWPE), May 2017. PDF
  12. Miri Choi, Jaewon Jang, Yeeji Kwon, Subeen Lim, Jun-Won Ho, and Matthew Wright, "Split-Pipeline Model for Worm Propagation over IoT," Proceedings of the 6th International Conference on the Internet of Things (poster), Nov. 2016.
  13. Omid Asudeh and Matthew Wright, “POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity,” ACM Conference on Computer and Communications Security (CCS), Oct. 2016.
  14. Mahdi Nasrullah Al-Ameen, Kanis Fatema, Sonali Marne, Sadia Ahmed, Sovantharith Seng, Matthew Wright, and Shannon Scielzo, “Towards Improving the Memorability of System-assigned Random Passwords,” Proc. Who Are You?! Adventures in Authentication (WAY), June 2016.
  15. Sadia Ahmed and Matthew Wright, “Exploring Hyper-Personal Analytics' Impact on Social Network Usage,” Symposium on Usable Privacy and Security (SOUPS) Poster Session, June 2016.
  16. Mahdi Nasrullah Al-Ameen and Matthew Wright, “Multiple-Password Interference in the GeoPass User Authentication Scheme,” NDSS Workshop on Usable Security (USEC), February 2015. Cited by 5. PDF
  17. S M Taiabul Haque, Tauhidul Alam, Mamoon Al-Rasheed, and Matthew Wright, “Password Construction and Management Strategies of the Online Users of Bangladesh: A Demographic Comparison with the Users of the First-World Countries,” Workshop on Human and Technology (WHAT), December 2013.
  18. S M Taiabul Haque, Shannon Scielzo, and Matthew Wright. “Passwords and Interfaces: Towards Creating Stronger Passwords by Using Mobile Phone Handsets,” ACM CCS Workshop on Security for Phone and S Mobile (SPSM), November 2013. Cited by 8.
  19. S M Taiabul Haque, Shannon Scielzo, and Matthew Wright. “A Study of User Password Strategy for Multiple Accounts,” Poster Session: ACM Conference on Data and Application Security and Privacy (CODASPY), February 2013. Cited by 21. PDF
  20. Mahdi N. Al-Ameen and Matthew Wright. “Persea: A Sybil-Resistant Social DHT,” Poster Session: ACM Conference on Data and Application Security and Privacy (CODASPY), February 2013. Cited by 5. PDF
  21. Nayantara Mallesh and Matthew Wright, “Shaping Network Topology for Privacy and Performance,” Poster Session: ACM Conference on Computer and Communications Security (CCS), Oct. 2011. Cited by 1. PDF
  22. Ruj Akavipat, Apurv Dhadphale, Apu Kapadia, and Matthew Wright, “ReDS: Reputation for Directory Services in P2P Systems,” Proc. ACM Workshop on Insider Threats (WIT ‘10), Oct. 2010. Cited by 5. PDF
  23. Pranav Krishnamoorthy and Matthew Wright, “Towards Modeling the Behavior of Physical Intruders in a Region Monitored by a Wireless Sensor Network” Proc. ACM Workshop on Artificial Intelligence and Security (AISec ‘10), Oct. 2010. Cited by 3. PDF
  24. Apurv Dhadphale, Apu Kapadia, Mohan Kumar, and Matthew Wright, “ReDS: Reputation for Directory Services in P2P Systems,” Proc. Computer Security and Information Intelligence Research Workshop (CSIIRW ‘10), Apr. 2010. Cited by 4. PDF
  25. Brent Lagesse, Mohan Kumar, and Matthew Wright, “ReSCo: A Middleware Component for Reliable Service Composition in Pervasive Systems,” Proc. Middleware Support for Pervasive Computing Workshop (PerWare ’10), Mar. 2010. Cited by 12. PDF
  26. Zhengyi Le, Gauri Vakde, and Matthew Wright, “PEON: Privacy-Enhanced Opportunistic Networks with Applications in Assistive Environments,” Proc. Workshop on Privacy and Security in Pervasive e-Health and Assistive Environments (PSPAE ‘09), Jun. 2009. Cited by 18. PDF
  27. Jun-Won Ho, Donggang Liu, Matthew Wright, and Sajal K. Das, “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks,” Proc. IEEE Intl. Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS ‘09), Mar. 2009. Cited by 5. PDF
  28. Jun-Won Ho, Matthew Wright, and Sajal K. Das, “Fast Detection of Node Replication Attacks in Mobile Sensor Networks,” Poster Session: Proc. of the IEEE Intl. Conf. on Network Protocols (ICNP ’08), Oct. 2008. Cited by 1. PDF
  29. N. Boris Margolin, Matthew Wright, and Brian N. Levine, “Analysis of an Incentives-based Protection System,” Proc. ACM Workshop on Digital Rights Management (DRM ’04), Oct. 2004. Cited by 11. PDF

Tech Reports/Other (22 papers)

  1. Mohsen Imani, Armon Barton, and Matthew Wright, “Forming Guard Sets using AS Relationships,” arXiv:1706.05592 [cs.CR], Jun. 2017.
  2. Payap Sirinam, Marc Juarez, Mohsen Imani, and Matthew Wright, “Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning,” arXiv:1801.02265 [cs.CR], Jan. 2018.
  3. Mohsen Imani, Mehrdad Amirabadi, and Matthew Wright, “Modified Relay Selection and Circuit Selection for Faster Tor,” arXiv:1608.07343 [cs.CR], Aug. 2016.
  4. Mohsen Imani, Mehrdad Amirabadi, and Matthew Wright, “The Evaluation of Circuit Selection Methods on Tor,” arXiv:1706.06457 [cs.CR], Jun. 2017.
  5. Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright, “WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor,” arXiv:1512.00524 [cs.CR], Dec. 2015. PDF
  6. Mahdi Nasrullah Al-Ameen, Shannon Scielzo, and Matthew Wright, “Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues,” arXiv: 1503.02314 [cs.HC], March 2015.
  7. Mahdi Nasrullah Al-Ameen and Matthew Wright, “iPersea: The Improved Persea with Sybil Detection Mechanism,” arXiv: 1412.6883 [cs.CR], December 2014. PDF
  8. Mahdi Nasrullah Al-Ameen and Matthew Wright, “A Comprehensive Study of the GeoPass User Authentication System,” arXiv: 1408.2852 [cs.HC], August 2014. Cited by 10. PDF
  9. Mahdi Nasrullah Al-Ameen, S M Taiabul Haque, and Matthew Wright, “Q-A: Towards the Solution of Usability-Security Tension in User Authentication,” arXiv: 1407:7277 [cs:HC], July 2014. PDF
  10. Ying-Dar Lin, Chun-Ying Huang, Matthew Wright, and Georgios Kambourakis. “Mobile Application Security: Guest Editors’ Introduction,” IEEE Computer, vol. 47, no. 6, pp. 21-23, June 2014. PDF
  11. Jody Sankey and Matthew Wright, “Dovetail: Stronger Anonymity in Next-Generation Internet Routing,” arXiv:1405.0351 [cs.CR], May 2014.
  12. Nabila Rahman, Matthew Wright, and Donggang Liu. “Fast and energy-efficient technique for jammed region mapping in wireless sensor networks”. arXiv:1401.7002 [cs:NI]. January 2014. PDF
  13. Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew Wright. “ReDS: A Framework for Reputation-Enhanced DHTs”. arXiv:1209.4867 [cs:CR]. September 2012.
  14. Prateek Mittal, Nikita Borisov, Matthew Wright. “Pisces: Anonymous Communication Using Social Networks”. arXiv:1208.6326 [cs:CR]. August 2012.
  15. Dustin Bachrach, Christopher Nunu, Dan S. Wallach, and Matthew Wright, “#h00t: Censorship Resistant Microblogging,” arXiv:1109.6874v1 [cs:CR], Sep. 2011. Cited by 10. PDF
  16. Robert Walls and Matthew Wright, “Liquid: A Detection-Resistant Covert Timing Channel Based on IPD Shaping,” CSE@UTA Technical Report, Publication ID CSE-2009-8, Oct. 2009.
  17. Matthew Wright, “anon.next: A Framework for Privacy in the Next Generation Internet,” Hot Topics in Privacy Enhancing Technologies (HotPETs) (not a published venue), August 2009.
  18. Matthew Wright, “Security and Privacy Challenges in Ubiquitous Computing,” Infosys Technology Roundtable, Mar. 2009.
  19. Jun-Won Ho, Donggang Liu, Matthew Wright, and Sajal K. Das, “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks,” CSE@UTA Technical Report, Publication ID CSE-2008-1, Jan. 2008.
  20. Madhu Venkateshaiah and Matthew Wright, “Evading Stepping Stone Detection Under the Cloak of Streaming Media,” CSE@UTA Technical Report, Publication ID CSE-2007-6, Mar. 2007. PDF
  21. N. Boris Margolin, Matthew Wright, and Brian N. Levine, “SPIES: Secret protection incentive-based escrow system,” P2PEcon Workshop (peer reviewed but not a published venue), June 2004. PDF
  22. N. Boris Margolin, Matthew Wright, and Brian N. Levine, “Guardian: A framework for privacy control in untrusted environments,” Technical Report 04-37 (University of Massachusetts, Amherst), June 2004.