Publications
(2014).
(2014).
(2014).
(2014).
On Modeling the Costs of Censorship.
CoRR. abs/1409.3211,
(2014).
(2014).
(2014).
(2014).
(2015).
An Analysis of China’s “Great Cannon”.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
(2015).
(2015). Blocking-resistant communication through domain fronting.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
(2015). Censorship Arms Race: Research vs. Practice.
Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
(2015). China’s Great Cannon.
The Citizen Report.
(2015). Ethical Concerns for Censorship Measurement.
Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
(2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of ACM Internet Measurement Conference.
(2015). Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Proceedings of ACM Cloud Computing Security Workshop.
(2015).
(2015). Measurement and Analysis of Traffic Exchange Services.
Proceedings of ICM Internet Measurement Conference.
(2015). A Primer on IPv4 Scarcity.
ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
(2015).
(2015). An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of ACM Internet Measurement Conference.
(2016). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). Forwarding-Loop Attacks in Content Delivery Networks.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016).