Annie Edmundson

Ph.D. Candidate

320 Sherrerd Hall
Department of Computer Science
Princeton University

annee (at)


I'm a fourth year CS Ph.D. student at Princeton University. My research interests are broad in security, privacy, and technology policy.

I'm advised by Nick Feamster and Ed Felten in the Security and Privacy Research Group. I'm also affiliated with the Center for Information Technology Policy. As of September 2015, I am supported by a National Defense Science and Engineering Graduate (NDSEG) Fellowship.

This past summer I worked in the Cyber Analytics and Decisions group at MIT Lincoln Labs. Previously, I interned at Twitter on their application security team.

I received my B.S. in Computer Science at Cornell University in May 2013.


Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks.
Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal.
IEEE Security & Privacy. May 2017 [To Appear]

A First Look into Transnational Routing Detours. [PDF]
Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford.
[Poster] Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference. ACM, 2016.
ACM SIGCOMM Student Research Competition Winner

Characterizing and Avoiding Routing Detours through Surveillance States. [PDF]
Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford.
arXiv:1605.076685, May 2016. Nation-State Routing
NANOG 67 Talk
Blog Post on Freedom to Tinker.

RAPTOR: Routing Attacks on Privacy in Tor. [PDF]
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal.
USENIX Security Symposium. August 2015. RAPTOR

Security Audit of Safeplug "Tor in a Box." [PDF]
Anne Edmundson, Anna Kornfeld Simpson, Joshua A. Kroll, Edward W. Felten.
Proceedings, FOCI. August 2014. Blog Post on Freedom to Tinker.

An empirical study on the effectiveness of security code review. [PDF]
Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David Wagner.
Engineering Secure Software and Systems, March 2013.

Automated analysis of election audit logs. [PDF]
Patrick Baxter, Anne Edmundson, Keishla Ortiz, Ana Maria Quevedo, Samuel Rodrıguez, Cynthia Sturton, David Wagner.
Proceedings, EVT/WOTE. August 2012.


The Internet Doesn’t Route Around Surveillance, Vice Motherboard, August 2016.

The Difficulty of Routing around Internet Surveillance States, Schneier on Security, July 2016.

Despite privacy pushes, it’s hard to keep Internet traffic from passing through US, FastCompany, May 2016.

Deanonymizing Tor Users With Raptor Attacks, ACM Technews, March 23, 2015.

Deanonymizing Tor Users With Raptor Attacks, Help Net Security, March 17 2015.

Tor users at risk of unmasking, says Princeton, Computer Business Review, March 16, 2015.

Princeton boffins sniff Tor users' IDs from TCP ACKs and server sweat, The Register, March 16, 2015.

RAPTOR: Routing Attacks on Privacy in Tor, Blog Post by Aidan Mitchell, March 20, 2015.

With This Tiny Box, You Can Anonymize Everything You Do Online, WIRED, October 13, 2014.

Tor Weekly News, September 24, 2014.

Safeplug Security Analysis, Schneier on Security, September 10, 2014.


Audit-Bear, a web application for analyzing audit logs from ES&S iVotronic voting machines. [Audit-Bear's Homepage]
Patrick Baxter, Anne Edmundson, Keishla Ortiz Lopez, Ana Maria Quevedo, Samuel Rodriguez, Cynthia Sturton, and David Wagner.

Open Source Projects

Scala CSP Configuration Library. [CSP Library on Github ]
Annie Edmundson, Matt Finifter

Teaching Experience

Information Security: Fall 2014, instructor Ed Felten
Innovating Across Technology, Business, and Markets: Spring 2015, instructor Jaswinder Singh

Graduate Coursework

Security and Privacy in Computing and Communications: Fall 2015, instructor Prateek Mittal

Advanced Computer Networks: Fall 2014, instructor Jen Rexford
Programming Languages: Spring 2014, instructor David Walker
Interacting with Data: Spring 2014, instructor David Blei
Advanced Computer Systems: Fall 2013, instructor Mike Freedman
Advanced Topics in Computer Science: Surveillance and Countermeasures: Fall 2013, instructor Ed Felten

Education History

Ph.D. Computer Science, Princeton University, 2013 - Present.
M.A. Computer Science, Princeton University, 2013 - 2015.
B.S. Computer Science, Cornell University, 2010 - 2013.

Last updated September 2016.