2025
OpenVPN is Open to VPN Fingerprinting.
Commun. ACM, January, 2025
2024
Attacking Connection Tracking Frameworks as used by Virtual Private Networks.
Proc. Priv. Enhancing Technol., 2024
Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape.
Proceedings of the 33rd USENIX Security Symposium, 2024
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes.
Proceedings of the 33rd USENIX Security Symposium, 2024
CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse.
Proceedings of the 33rd USENIX Security Symposium, 2024
Digital Discrimination of Users in Sanctioned States: The Case of the Cuba Embargo.
Proceedings of the 33rd USENIX Security Symposium, 2024
Modeling and Detecting Internet Censorship Events.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates.
Proc. Priv. Enhancing Technol., July, 2023
"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers.
Proceedings of the 32nd USENIX Security Symposium, 2023
Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom.
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
A Study of Third-party Resources Loading on Web.
CoRR, 2022
A Large-scale Investigation into Geodifferences in Mobile Apps.
Proceedings of the 31st USENIX Security Symposium, 2022
VPNInspector: Systematic Investigation of the VPN Ecosystem.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
TSPU: Russia's decentralized censorship system.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Network measurement methods for locating and examining censorship devices.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022
2021
Challenges in cybersecurity: Lessons from biological defense systems.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2021
Throttling Twitter: an emerging censorship technique in Russia.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021
Lost in Transmission: Investigating Filtering of COVID-19 Websites.
Proceedings of the Financial Cryptography and Data Security, 2021
2020
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading.
ACM Trans. Priv. Secur., 2020
Characterizing Transnational Internet Performance and the Great Bottleneck of China.
Proc. ACM Meas. Anal. Comput. Syst., 2020
Decentralized Control: A Case Study of Russia.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Measuring the Deployment of Network Censorship Filters at Global Scale.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Investigating Large Scale HTTPS Interception in Kazakhstan.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading.
Proceedings of the World Wide Web Conference, 2019
2018
Toward Continual Measurement of Global Network-Level Censorship.
IEEE Secur. Priv., 2018
Quack: Scalable Remote Measurement of Application-Layer Censorship.
Proceedings of the 27th USENIX Security Symposium, 2018
403 Forbidden: A Global View of CDN Geoblocking.
Proceedings of the Internet Measurement Conference 2018, 2018
Nation-State Hegemony in Internet Routing.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018
2017
Global-Scale Measurement of DNS Manipulation.
login Usenix Mag., 2017
Global Measurement of DNS Manipulation.
Proceedings of the 26th USENIX Security Symposium, 2017
Augur: Internet-Wide Detection of Connectivity Disruptions.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
A look at router geolocation in public and commercial databases.
Proceedings of the 2017 Internet Measurement Conference, 2017
2016
Characterizing and Avoiding Routing Detours Through Surveillance States.
CoRR, 2016
Identifying and Characterizing Sybils in the Tor Network.
Proceedings of the 25th USENIX Security Symposium, 2016
A First Look into Transnational Routing Detours.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016
A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016
2015
Analyzing the Great Firewall of China Over Space and Time.
Proc. Priv. Enhancing Technol., 2015
Ethical Concerns for Censorship Measurement.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015
Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
2014
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall.
CoRR, 2014
A Case Study in Helping Students to Covertly Eat Their Classmates.
Proceedings of the 2014 USENIX Summit on Gaming, 2014
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
2013
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version.
CoRR, 2013
2012
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
2010
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
Proceedings of the 19th USENIX Security Symposium, 2010
2008
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Optimizing Fuzzy K-means for network anomaly detection using PSO.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
2007
A Fuzzy-Based Multi-criteria Scheduler for Uniform Multiprocessor Real-Time Systems.
Proceedings of the 10th International Conference on Information Technology, 2007