Roya Ensafi

According to our database1, Roya Ensafi authored at least 49 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attacking Connection Tracking Frameworks as used by Virtual Private Networks.
Proc. Priv. Enhancing Technol., 2024

Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape.
Proceedings of the 33rd USENIX Security Symposium, 2024

Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes.
Proceedings of the 33rd USENIX Security Symposium, 2024

CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse.
Proceedings of the 33rd USENIX Security Symposium, 2024

Digital Discrimination of Users in Sanctioned States: The Case of the Cuba Embargo.
Proceedings of the 33rd USENIX Security Symposium, 2024

Modeling and Detecting Internet Censorship Events.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates.
Proc. Priv. Enhancing Technol., July, 2023

"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
A Study of Third-party Resources Loading on Web.
CoRR, 2022

OpenVPN is Open to VPN Fingerprinting.
Proceedings of the 31st USENIX Security Symposium, 2022

A Large-scale Investigation into Geodifferences in Mobile Apps.
Proceedings of the 31st USENIX Security Symposium, 2022

VPNInspector: Systematic Investigation of the VPN Ecosystem.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

TSPU: Russia's decentralized censorship system.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Network measurement methods for locating and examining censorship devices.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022

2021
Challenges in cybersecurity: Lessons from biological defense systems.
CoRR, 2021

Throttling Twitter: an emerging censorship technique in Russia.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Lost in Transmission: Investigating Filtering of COVID-19 Websites.
Proceedings of the Financial Cryptography and Data Security, 2021

2020
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading.
ACM Trans. Priv. Secur., 2020

Characterizing Transnational Internet Performance and the Great Bottleneck of China.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Decentralized Control: A Case Study of Russia.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Measuring the Deployment of Network Censorship Filters at Global Scale.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Investigating Large Scale HTTPS Interception in Kazakhstan.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Censored Planet: An Internet-wide, Longitudinal Censorship Observatory.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading.
Proceedings of the World Wide Web Conference, 2019

2018
Toward Continual Measurement of Global Network-Level Censorship.
IEEE Secur. Priv., 2018

Quack: Scalable Remote Measurement of Application-Layer Censorship.
Proceedings of the 27th USENIX Security Symposium, 2018

403 Forbidden: A Global View of CDN Geoblocking.
Proceedings of the Internet Measurement Conference 2018, 2018

Nation-State Hegemony in Internet Routing.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

2017
Global-Scale Measurement of DNS Manipulation.
login Usenix Mag., 2017

Global Measurement of DNS Manipulation.
Proceedings of the 26th USENIX Security Symposium, 2017

Augur: Internet-Wide Detection of Connectivity Disruptions.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

A look at router geolocation in public and commercial databases.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
Characterizing and Avoiding Routing Detours Through Surveillance States.
CoRR, 2016

Identifying and Characterizing Sybils in the Tor Network.
Proceedings of the 25th USENIX Security Symposium, 2016

A First Look into Transnational Routing Detours.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

2015
Analyzing the Great Firewall of China Over Space and Time.
Proc. Priv. Enhancing Technol., 2015

Ethical Concerns for Censorship Measurement.
Proceedings of the 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research, 2015

Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall.
CoRR, 2014

A Case Study in Helping Students to Covertly Eat Their Classmates.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

2013
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version.
CoRR, 2013

2012
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

2010
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
Proceedings of the 19th USENIX Security Symposium, 2010

2008
The ecology of Malware.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

Optimizing Fuzzy K-means for network anomaly detection using PSO.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
A Fuzzy-Based Multi-criteria Scheduler for Uniform Multiprocessor Real-Time Systems.
Proceedings of the 10th International Conference on Information Technology, 2007


  Loading...