Leading Johnny to water: Designing for usability and trust E Atwater, C Bocovich, U Hengartner, E Lank, I Goldberg Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), USENIX …, 2015 | 76 | 2015 |
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement C Bocovich, I Goldberg Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 42 | 2016 |
Variable-specific resolutions for feature interactions C Bocovich, JM Atlee Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014 | 28 | 2014 |
Secure asymmetry and deployability for decoy routing systems C Bocovich, I Goldberg Proceedings on Privacy Enhancing Technologies, 2018 | 19 | 2018 |
Exploring simple detection techniques for DNS-over-HTTPS tunnels C Kwan, P Janiszewski, S Qiu, C Wang, C Bocovich Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications …, 2021 | 18 | 2021 |
OUStralopithecus: Overt user simulation for censorship circumvention AH Lorimer, L Tulloch, C Bocovich, I Goldberg Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021 | 10 | 2021 |
Lavinia: An audit-payment protocol for censorship-resistant storage C Bocovich, JA Doucette, I Goldberg Financial Cryptography and Data Security: 21st International Conference, FC …, 2017 | 10 | 2017 |
Live Lesson: Netsim: Network simulation and hacking for high schoolers E Atwater, C Bocovich, U Hengartner, I Goldberg 2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17), 2017 | 8 | 2017 |
Recipes for Resistance: A Censorship Circumvention Cookbook C Bocovich University of Waterloo, 2018 | 2 | 2018 |
Feature-Oriented Modelling in BIP: A Case Study C Bocovich, J Atlee 3nd International Workshop on Interplay of Model-Driven and Component-Based …, 2016 | 2 | 2016 |
Modeling-Based Calculus with R/mosaic. D Kaplan, C Bocovich, R Pruim UMAP Journal 36 (1), 2015 | 2 | 2015 |
A feature interaction resolution scheme based on controlled phenomena C Bocovich University of Waterloo, 2014 | 2 | 2014 |
Elliptic Curves of High Rank C Bocovich | 2 | 2012 |
Addressing denial of service attacks on free and open communication on the internet C Bocovich, R Dingledine, A Færøy, K Hanna, P Winter, T Yu Tech. Rep. 2019-05-001, 2019.[Online]. Available: https://research …, 2019 | 1 | 2019 |
Poster: Incentivized Censorship Resistance with Payment Contracts C Bocovich, JA Doucette, I Goldberg | | |