You are now leaving the DARPA.mil website that is under the control and management of DARPA. The appearance of hyperlinks does not constitute endorsement by DARPA of non-U.S. Government sites or the information, products, or services contained therein. Although DARPA may or may not use these sites as additional distribution channels for Department of Defense information, it does not exercise editorial control over all of the information that you may find at these locations. Such links are provided consistent with the stated purpose of this website.

After reading this message, click to continue immediately.

Go Back

/ Information Innovation Office (I2O)

Safer Warfighter Communications (SAFER)

The SAFER program seeks to develop technology to enable safe, resilient communications over the Internet, particularly in situations in which third parties attempt to discover the identity or location of the end users, or block communications. The program also seeks to provide the technological quality of service required to support applications such as electronic mail, instant messaging, voice over IP, and other media that promote effective communication.

Program Manager: Mr. Michael Walker

Contact: michael.walker@darpa.mil

The content below has been generated by organizations that are partially funded by DARPA; the views and conclusions contained therein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of DARPA or the U.S. Government.

Report a problem: opencatalog@darpa.mil

Last updated: November 13, 2015

TeamProjectCategoryCodeDescriptionLicense
Georgetown University (publications) Senser Networking https://security.cs.georgetown.edu/code/senser-0.1.tar.gz A distributed consensus system for web sites that uses distributed sensors to render a majority view. (Java) custom, BSD-based
Georgetown University (publications) Tortoise Networking https://security.cs.georgetown.edu/lib/tortoise/tortoise-tor-0.2.1.28.patch Tortoise is a system for rate limiting Tor at its ingress points in order to increase the bandwidth capacity of the network and consequently improve the experience of interactive web users. The system incurs little penalty for interactive web users, while significantly decreasing the throughput for filesharers. These techniques provide incentives to filesharers to configure their Tor clients to also relay traffic, which in turn improves the network's overall performance. Large-scale emulation results indicate that interactive users will achieve a significant speedup if even a small fraction of clients opt to run relays. (C) Released as patch to Tor; follows Tor license at https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=LICENSE
Naval Research Laboratory (publications) Shadow Networking https://github.com/shadow/shadow.git Shadow is an open source, discrete-event network simulator that runs real applications such as Tor. Shadow combines the accuracy of emulation with the efficiency and control of simulation, achieving the best of both approaches. Shadow links to real application software and natively executes the application code during simulation, providing faithful experiments and accurate results. Shadow models and runs distributed networks using these applications on a single Linux machine, easing experiment management. (C) BSDv3, modified for U.S. Government work
Naval Research Laboratory (publications) The Tor Path Simulator (TorPS) Networking https://github.com/torps/torps.git TorPS provides efficient simulation of path selection over time by Tor. For each sample, it uses measurements of the Tor network and of user behavior to simulate how a Tor client selects relays. The use of actual measurements and an accurate reimplementation of Tor's path-selection algorithms provides highly realistic behavior. Also, a TorPS simulation is much faster than the Tor client itself, which allows for millions of simulations over periods of many months, allowing for an accurate estimation of the full probability distribution of client behavior over time. (Python/C/Bash) Custom (specific to U.S. Government work)
SRI International Chutney Networking https://gitweb.torproject.org/chutney.git A tool to spin up a local Tor network for automated testing. (Python/sh) Tiny
SRI International TorFlow Networking https://gitweb.torproject.org/torflow.git TorFlow is a set of Python scripts for interacting with and measuring the Tor network. (Python) BSDv3
SRI International Libevent Networking https://github.com/libevent/libevent A software library that provides asynchronous event notification. It is the network library underlying Tor, obfsproxy, and others. We co-maintain it with Niels Provos. (C) BSDv3
SRI International Python pluggable transport library Networking https://gitweb.torproject.org/pluggable-transports/pyptlib.git Python pluggable transport library. (Python) BSDv3
SRI International Go pluggable transport library Networking https://gitweb.torproject.org/pluggable-transports/goptlib.git Go pluggable transport library. (Go) CC0
SRI International Websocket pluggable transport Networking https://gitweb.torproject.org/pluggable-transports/websocket.git/tree Client and server for transporting traffic over websocket. (Go) CC0
SRI International Obfsproxy Networking https://gitweb.torproject.org/pluggable-transports/obfsproxy.git A framework to make it easy to write pluggable transports for Tor. (Python) BSDv3
SRI International Flashproxy Networking https://gitweb.torproject.org/flashproxy.git A tool that uses Websockets to turn browsers into Tor bridges. (Python/Go) MIT
SRI International StegoTorus Networking https://gitweb.torproject.org/stegotorus.git/ HTTP-based pluggable transport for Tor that implements flow chop reassembly. (C/C++) BSDv3
SRI International BridgeDB Networking https://gitweb.torproject.org/bridgedb.git Service to distribute Tor bridge addresses via https, gmail, etc. (Python) BSDv3
SRI International Onionoo Networking https://gitweb.torproject.org/onionoo.git A backend database and scripts to organize and serve the Tor metrics data. (Java) BSDv3
SRI International Metrics Networking https://gitweb.torproject.org/metrics-db.git Scripts to store, serve, analyze, and visualize Tor network data. (Java/Python) BSDv3
SRI International Atlas Networking https://gitweb.torproject.org/atlas.git A web application to display Tor relay information. (JavaScript/CSS) BSDv2
SRI International Globe Networking https://github.com/makepanic/globe.git A web application to display Tor relay and bridge information. (JavaScript/CSS) MIT
SRI International Compass Networking https://gitweb.torproject.org/compass.git A web application to display Tor relay and network statistics. (Python/JavaScript) MIT
SRI International Tor Browser Networking https://gitweb.torproject.org/builders/tor-browser-bundle.git A fork of Firefox that fixes many privacy issues. (C++) BSDv3
SRI International Tor Browser Button Networking https://gitweb.torproject.org/torbutton.git A Firefox extension to lock down Tor Browser Bundle for application-level privacy. (JavaScript/XUL) MIT
SRI International Vidalia Networking https://gitweb.torproject.org/vidalia.git The older Qt-based Tor controller (obsoleted by Tor Launcher). (C++) GPL
SRI International Tor Launcher Networking https://gitweb.torproject.org/tor-launcher.git A Firefox extension to launch and manage Tor in Tor Browser Bundle. (JavaScript/XUL) BSDv3
SRI International HTTPS Everywhere Networking https://gitweb.torproject.org/https-everywhere.git A Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure. (JavaScript/XUL) GPL
SRI International Torbirdy Networking https://gitweb.torproject.org/torbirdy.git An extension like Torbutton but for Thunderbird (for securing email over Tor). (JavaScript/XUL/C++) BSDv2
SRI International ChatSecure Networking https://github.com/guardianproject/ChatSecureAndroid.git A secure chat client for Android with push-to-talk Tor support. (Java) AL
TeamTitleLink
Stanford University OSS: Using Online Scanning Services for Censorship Circumvention
Stanford University, The Tor Project Evading Censorship with Browser-Based Proxies
Stanford University, SRI StegoTorus: a camouflage proxy for the Tor anonymity system
Stanford University, University of Texas - Austin The most dangerous code in the world: validating SSL certificates in non-browser software
Stanford University, SRI Bootstrapping Communications into an Anti-Censorship System
Yale University Hang With Your Buddies to Resist Intersection Attacks
Stanford University, Yale University Ensuring High-Quality Randomness in Cryptographic Key Generation
Yale University Proactively Accountable Anonymous Messaging in Verdict
University of Texas - Austin The Parrot is Dead: Observing Unobservable Network Communications
University of Texas - Austin I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
Yale University Dissent in Numbers: Making Strong Anonymity Scale
Yale University Crypto-Book: An Architecture for Privacy Preserving Online Identities
Yale University Conscript Your Friends into Larger Anonymity Sets with JavaScript
Yale University Reducing Latency in Tor Circuits with Unordered Delivery
Yale University Welcome to the World of Human Rights: Please Make Yourself Uncomfortable
Yale University Scavenging for Anonymity with BlogDrop (Abstract)
Yale University Scalable Anonymous Group Communication in the Anytrust Model
Georgetown University The Design and Implementation of the A3 Application-Aware Anonymity Platform
Georgetown University Validating Web Content with Senser
Georgetown University, Naval Research Laboratory Users Get Routed: Traffic Correlation on Tor By Realistic Adversaries
Georgetown University, University of Pennsylvania Distributed Time-aware Provenance
Georgetown University An Empirical Evaluation of Relay Selection in Tor
Georgetown University, University of Pennsylvania Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks
Georgetown University, University of Pennsylvania Collaborative Red Teaming for Anonymity System Evaluation
Georgetown University Private and Verifiable Interdomain Routing Decisions
Rutgers University, Yale University Accountability as an Interface between Cybersecurity and Social Science
Yale University, University of Texas - Austin, Naval Research Laboratory Probabilistic Analysis of Onion Routing in a Black-box Model
Naval Research Laboratory How Low Can You Go: Balancing Performance with Anonymity in Tor
Yale University, The Tor Project, Naval Research Laboratory Methodically Modeling the Tor Network
Naval Research Laboratory Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
Naval Research Laboratory LIRA: Lightweight Incentivized Routing for Anonymity
Naval Research Laboratory Throttling Tor Bandwidth Parasites
Naval Research Laboratory Onions for Sale: Putting Privacy on the Market
University of Texas - Austin, Naval Research Laboratory Privacy-Preserving Data Exploration in Genome-Wide Association Studies
Yale University, University of Texas - Austin, Naval Research Laboratory Security Analysis of Accountable Anonymous Group Communication in Dissent
Naval Research Laboratory Practical Vulnerabilities of the Tor Anonymity Network
Naval Research Laboratory Why I'm not an entropist
MIT Melting Pad: A Secure Efficiently Decodable Coding Scheme
California Institute of Technology Practical Improvements to Bus-Based Strategies for Reliable Anonymous Networking
California Institute of Technology Peer-to-peer anonymous networking using coding
Georgia Tech, Princeton University A Slick Control Plane for Network Middleboxes

Software

Publications