Kevin Bauer
ke23793@mit.edu

Technical Staff
Massachusetts Institute of Technology
Lincoln Laboratory
244 Wood Street
Lexington, MA 02420-9108
(781) 981-2618
Kevin's picture

Biography

Kevin Bauer is a Technical Staff member in the Cyber Systems and Technology group at MIT Lincoln Laboratory. His research interests include privacy enhancing technologies, low-latency anonymous communications, cyber security experimentation, and network security.

Prior to joining MIT, he was a Postdoctoral Fellow at the University of Waterloo where he was supervised by Ian Goldberg. Kevin received his PhD in Computer Science from the University of Colorado where he worked with Dirk Grunwald and Douglas Sicker on improving the security and performance of low-latency anonymity networks.

Kevin previously worked with Stefan Savage and Geoffrey Voelker in the Systems and Networking group at UCSD, Vern Paxson at the International Computer Science Institute's Center for Internet Research, and Energy Sciences Network at the Lawrence Berkeley National Laboratory.


Service

Program committee, 8th USENIX Workshop on Cyber Security Experimentation and Test (CSET), Aug 2015

Program committee, 17th International Conference on Information Security (ICS), Oct 12-14, 2014

Program committee, 7th USENIX Workshop on Cyber Security Experimentation and Test (CSET), Aug 2014

Program committee, ACM Workshop on Privacy in the Electronic Society (WPES), Nov 4, 2013

Program committee, Workshop on Privacy and Anonymity for the Digital Economy, Oct 2013

Program committee, 18th European Symposium on Research in Computer Security (ESORICS), Sept 9-13, 2013

Program committee, 6th USENIX Workshop on Cyber Security Experimentation and Test (CSET), Aug 12, 2013

Program committee, 13th Privacy Enhancing Technologies Symposium (PETS), July 10-12, 2013

Program committee, 1st ASE/IEEE Cyber Security Conference, Dec 14-16, 2012

Program committee, 17th European Symposium on Research in Computer Security (ESORICS), Sept 10-12, 2012

Program committee, 12th Privacy Enhancing Technologies Symposium (PETS), July 11-13, 2012

Program committee, ACM SIGMETRICS Workshop on Privacy and Anonymity for the Digital Economy, June 15, 2012

Program committee, ACM Workshop on Privacy in the Electronic Society (WPES), Oct 17, 2011

Program committee, 11th Privacy Enhancing Technologies Symposium (PETS), July 27-29, 2011

Program committee, 10th Privacy Enhancing Technologies Symposium (PETS), July 21-23, 2010

Publications

The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting (pdf)
Mashael AlSabah, Kevin Bauer, Tariq Elahi, Ian Goldberg
13th Privacy Enhancing Technologies Symposium (PETS), July 2013
Andreas Pfitzmann Best Student Paper Award

An Empirical Evaluation of Relay Selection in Tor (pdf)
Chris Wacek, Henry Tan, Kevin Bauer, Micah Sherr
20th Network and Distributed System Security Symposium (NDSS), February 2013

Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor (pdf)
Tariq Elahi, Kevin Bauer, Mashael AlSabah, Roger Dingledine, Ian Goldberg
ACM Workshop on Privacy in the Electronic Society (WPES), October 2012

Enhancing Tor's Performance using Real-time Traffic Classification (pdf)
Mashael AlSabah, Kevin Bauer, Ian Goldberg
19th ACM Conference on Computer and Communications Security (CCS), October 2012

Methodically Modeling the Tor Network (pdf | shadow topology | experimentor topology)
Rob Jansen, Kevin Bauer, Nicholas Hopper, Roger Dingledine
5th USENIX Workshop on Cyber Security Experimentation and Test (CSET), August 2012

Congestion-aware Path Selection for Tor (pdf)
Tao Wang, Kevin Bauer, Clara Forero, Ian Goldberg
16th International Conference on Financial Cryptography and Data Security (FC), February 2012

Distribution of Digital Games via BitTorrent (pdf)
Anders Drachen, Kevin Bauer, Robert Veitch
15th ACM SIGMM/SIGCHI International Academic MindTrek Conference, September 2011

ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation (pdf | slides | web)
Kevin Bauer, Micah Sherr, Damon McCoy, Dirk Grunwald
4th USENIX Workshop on Cyber Security Experimentation and Test (CSET), August 2011

DefenestraTor: Throwing out Windows in Tor (pdf)
Mashael AlSabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker
11th Privacy Enhancing Technologies Symposium (PETS), July 2011

Only the Good... Get Pirated: Game Piracy Activity vs. Product Features (short paper) (pdf | web)
Anders Drachen, Kevin Bauer, Robert Veitch
6th Foundations of Digital Games, June 2011

Practical Defenses for Evil Twin Attacks in 802.11 (pdf)
Harold Gonzales, Kevin Bauer, Janne Lindqvist, Damon McCoy, Douglas Sicker
IEEE Globecom Communications and Information Security Symposium, December 2010

The Risks and Regulation of Location (pdf)
Dirk Grunwald, Aaron Beach, Kevin Bauer, Qin Lv, Douglas Sicker
38th Research Conference on Communication, Information and Internet Policy (TPRC), October 2010

Automated Tracking of Online Service Policies (pdf | slides | web)
J. Trent Adams, Kevin Bauer, Asa Hardcastle, Dirk Grunwald, Douglas Sicker
38th Research Conference on Communication, Information and Internet Policy (TPRC), October 2010

On the Optimal Path Length for Tor (pdf)
Kevin Bauer, Joshua Juen, Nikita Borisov, Dirk Grunwald, Douglas Sicker, Damon McCoy
3rd Hot Topics in Privacy Enhancing Technologies (HotPETS), July 2010

Predicting Tor Path Compromise by Exit Port (pdf | slides)
Kevin Bauer, Dirk Grunwald, Douglas Sicker
2nd IEEE International Workshop on Information and Data Assurance, December 2009

BitStalker: Accurately and Efficiently Monitoring BitTorrent Traffic (pdf | web)
Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker
1st IEEE International Workshop on Information Forensics and Security (WIFS), December 2009

The Directional Attack on Wireless Localization - or - How to Spoof Your Location with a Tin Can (pdf | slides | data)
Kevin Bauer, Damon McCoy, Eric Anderson, Markus Breitenbach, Greg Grudic, Dirk Grunwald, Douglas Sicker
IEEE Globecom Communications and Information Security Symposium, December 2009

The Arms Race in P2P (pdf | slides)
Kevin Bauer, Dirk Grunwald, Douglas Sicker
37th Research Conference on Communication, Information, and Internet Policy (TPRC), September 2009

Physical Layer Attacks on Unlinkability in Wireless LANs (pdf | slides | data)
Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker
9th Privacy Enhancing Technologies Symposium (PETS), August 2009

SniffMob: Inferring Human Contact Patterns using Wireless Devices (pdf)
Eric Anderson, Caleb Phillips, Harold Gonzales, Kevin Bauer, Dirk Grunwald, Douglas Sicker
1st ACM International Workshop on Hot Topics in Planet-Scale Measurement, June 2009

The Challenges of Stopping Illegal Peer-to-Peer File Sharing (paper | slides | web)
Kevin Bauer, Dirk Grunwald, Douglas Sicker
National Cable & Telecommunications Association Technical Papers, April 2009

Performing Traffic Analysis on a Wireless Identifier-free Link Layer (pdf)
Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker
5th ACM Richard Tapia Celebration of Diversity in Computing Conference, April 2009

Mitigating Evil Twin Attacks in 802.11 (pdf)
Kevin Bauer, Harold Gonzales, Damon McCoy
1st IEEE International Workshop on Information and Data Assurance, December 2008

BitBlender: Light-Weight Anonymity for BitTorrent (pdf | slides)
Kevin Bauer, Damon McCoy, Dirk Grunwald, Douglas Sicker
ACM Workshop on Applications of Private and Anonymous Communications, September 2008

Shining Light in Dark Places: Understanding the Tor Network (pdf | slides)
Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
8th Privacy Enhancing Technologies Symposium (PETS), July 2008

Using Wireless Physical Layer Information to Construct Implicit Identifiers (pdf)
Kevin Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas Sicker
1st Hot Topics in Privacy Enhancing Technologies (HotPETS), July 2008

Modeling Directionality in Wireless Networks (short paper) (pdf)
Eric Anderson, Caleb Phillips, Kevin Bauer, Dirk Grunwald, Douglas Sicker
ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, June 2008

Low-Resource Routing Attacks Against Tor (pdf | slides | web)
Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
ACM Workshop on Privacy in the Electronic Society (WPES), October 2007

A Distributed Authentication Scheme for a Wireless Sensing System (pdf | slides)
Kevin Bauer and Hyunyoung Lee
2nd International Workshop on Networked Sensing Systems, June 2005


Last updated: Fri Oct 24 08:52:37 EDT 2014
Web design courtesy of Katrina LaCurts
Valid XHTML 1.1 Strict Valid CSS!