Publications

Recent publications from the Censored Planet Lab and related projects.

Our research community is a vibrant and growing subfield that exists at the intersection of networking, security and privacy, Internet measurement, and social and political science. Our major publication venues include systems security and privacy conferences (USENIX Security, IEEE S&P, ACM CCS, NDSS, PETS, and SIGCOMM) and measurement conferences (ACM IMC), as well as more specialized interdisciplinary workshops (USENIX FOCI).

Presented in reverse chronological order.

February 2020 Network and Distributed System Security Symposium (NDSS)

Measuring the Deployment of Network Censorship Filters at Global Scale

Ram Sundara Raman Adrian Stoll Jakub Dalek Armin Sarabi Reethika Ramesh Will Scott Roya Ensafi

@inproceedings{filtermap,
title={Measuring the Deployment of Network Censorship Filters at Global Scale},
author={Sundara Raman, Ram and Stoll, Adrian and Dalek, Jakub and Sarabi, Armin and Ramesh, Reethika and Scott, Will and Ensafi, Roya},
booktitle={Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA},
year={2020}
}

February 2020 Network and Distributed System Security Symposium (NDSS)

Decentralized Control: A Case Study of Russia

Reethika Ramesh Ram Sundara Raman Matthew Bernhard Victor Ongkowijaya Leonid Evdokimov Annie Edmundson S. Sprecher Muhammad Ikram Roya Ensafi

Press: Associated Press CPJ Voice of America MSN ABC News New York Times Washington Post University of Michigan News

PDF

@inproceedings{ndss20-russia,
title={Decentralized Control: A Case Study of Russia},
author={R. Ramesh, R. Sundara Raman, M. Bernhard, V. Ongkowijaya, L. Evdokimov, A. Edmundson, S. Sprecher, M. Ikram, R.Ensafi},
booktitle={Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA},
year={2020}
}

May 2019 International World Wide Web Conference (WWW)

The chain of implicit trust: An analysis of the Web third-party resources loading

Muhammad Ikram Rahat Masood Gareth Tyson Kaafar Mohamed Ali Noha Loizon Roya Ensafi

PDF

@inproceedings{065961dc95474ceaa258c117581529ec,
title={The chain of implicit trust: an analysis of the Web third-party resources loading},
author={Muhammad Ikram and Rahat Masood and Gareth Tyson and Kaafar, Mohamed Ali and Noha Loizon and Roya Ensafi},
year={2019},
booktitle={Proceeding WWW ’19 The World Wide Web Conference},
publisher={Association for Computing Machinery (ACM)}
}

November 2018 ACM Internet Measurement Conference (IMC)

403 Forbidden: A Global View of CDN Geoblocking

Allison McDonald Matthew Bernhard Luke Valenta Benjamin VanderSloot Will Scott Nick Sullivan J. Alex Halderman Roya Ensafi

PDF

@inproceedings{Allison2018403,
title={403 Forbidden: A Global View of CDN Geoblocking},
author={Allison McDonald and Matthew Bernhard and Luke Valenta and Benjamin VanderSloot and Will Scott and Nick Sullivan and J. Alex Halderman and Roya Ensafi},
booktitle={ACM Internet Measurement Conference},
year={2018}
}

August 2018 USENIX Security Symposium

Quack: Scalable Remote Measurement of Application-Layer Censorship

Benjamin VanderSloot Allison McDonald J. Alex Halderman Will Scott Roya Ensafi

PDF

@inproceedings{Ben2018Quack:,
title={Quack: Scalable Remote Measurement of Application-Layer Censorship},
author={Ben VanderSloot and Allison McDonald and Will Scott and J. Alex Halderman and Roya Ensafi},
booktitle={USENIX Security Symposium},
year={2018}
}

August 2018 Demo Session, 30th ACM SIGCOMM

A First Look into Transnational Routing Detours

Annie Edmundson Roya Ensafi Nick Feamster Jennifer Rexford

PDF

@inproceedings{Annie2016A,
title={A First Look into Transnational Routing Detours},
author={Annie Edmundson and Roya Ensafi and Nick Feamster and Jennifer Rexford},
booktitle={Demo Session, 30th ACM SIGCOMM},
year={2016}
}

July 2018 ACM SIGCAS Conference on Computing and Sustainable Societies

Nation-State Hegemony in Internet Routing

Annie Edmundson Roya Ensafi Nick Feamster Jennifer Rexford

@inproceedings{Annie2018Nation-State,
title={Nation-State Hegemony in Internet Routing},
author={Annie Edmundson and Roya Ensafi and Nick Feamster and Jennifer Rexford},
booktitle={ACM SIGCAS Conference on Computing and Sustainable Societies},
year={2018}
}

February 2018 IEEE Security & Privacy (S&P)

Towards Continual Measurement of Global Network-Level Censorship

Paul Pearce Roya Ensafi Frank Li Nick Feamster Vern Paxson

PDF

@article{Paul2018Towards,
author={Paul Pearce and Roya Ensafi and Frank Li and Nick Feamster and Vern Paxson},
title={Towards Continual Measurement of Global Network-Level Censorship},
journal={IEEE Security & Privacy},
volume={16},
number={1},
year={2018}
}

August 2017 USENIX Security

Global Measurement of DNS Manipulation

Paul Pearce Ben Jones Frank Li Roya Ensafi Nick Feamster Nick Weaver Vern Paxson

PDF Talk Slides

@inproceedings{Paul2017Global,
title={Global Measurement of DNS Manipulation},
author={Paul Pearce and Ben Jones and Frank Li and Roya Ensafi and Nick Feamster and Nick Weaver and Vern Paxson},
booktitle={USENIX Security},
year={2017}
}

May 2017 IEEE Security and Privacy (S&P)

Augur: Internet-Wide Detection of Connectivity Disruptions

Paul Pearce Roya Ensafi Frank Li Nick Feamster Vern Paxson

PDF Talk

@inproceedings{Paul2017Augur:,
title={Augur: Internet-Wide Detection of Connectivity Disruptions},
author={Paul Pearce and Roya Ensafi and Frank Li and Nick Feamster and Vern Paxson},
booktitle={IEEE Security and Privacy},
year={2017}
}

March 2017 ACM Internet Measurement Conference (IMC)

A Look at Infrastructure Geolocation in Public and Commercial Databases

Manaf Gharaibeh Anant Shah Bradley Huffaker Han Zhang Roya Ensafi Christos Papadopoulos

PDF

@inproceedings{Manaf2017A,
title={A Look at Infrastructure Geolocation in Public and Commercial Databases},
author={Manaf Gharaibeh and Anant Shah and Bradley Huffaker and Han Zhang and Roya Ensafi and Christos Papadopoulos},
booktitle={ACM Internet Measurement Conference},
year={2017}
}

August 2016 USENIX Security Symposium

Identifying and Characterizing Sybils in the Tor Network

Philipp Winter Roya Ensafi Karsten Loesing Nick Feamster

PDF

@inproceedings{Philipp2016Identifying,
title={Identifying and Characterizing Sybils in the Tor Network},
author={Philipp Winter and Roya Ensafi and Karsten Loesing and Nick Feamster},
booktitle={USENIX Security Symposium},
year={2016}
}

April 2016 Passive and Active Measurement Conference (PAM)

A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades

Sarthak Grover Roya Ensafi Nick Feamster

PDF

@inproceedings{Sarthak2016A,
title={A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades},
author={Sarthak Grover and Roya Ensafi and Nick Feamster},
booktitle={ Passive and Active Measurement Conference},
year={2016}
}

October 2015 ACM Internet Measurement Conference (IMC)

Examining How the Great Firewall Discovers Hidden Circumvention Servers

Roya Ensafi David Fifield Philipp Winter Nick Feamster Nicholas Weaver Vern Paxson

PDF

@inproceedings{Roya2015Examining,
title={Examining How the Great Firewall Discovers Hidden Circumvention Servers},
author={Roya Ensafi and David Fifield and Philipp Winter and Nick Feamster and Nicholas Weaver and Vern Paxson},
booktitle={ ACM Internet Measurement Conference},
year={2015}
}

August 2015 ACM SIGCOMM Workshop on Ethics in Networked Systems Research

Ethical Concerns for Censorship Measurement

Ben Jones Roya Ensafi Nick Feamster Vern Paxson Nick Weaver

PDF

@inproceedings{Ben2015Ethical,
title={Ethical Concerns for Censorship Measurement},
author={Ben Jones and Roya Ensafi and Nick Feamster and Vern Paxson and Nick Weaver},
booktitle={ACM SIGCOMM Workshop on Ethics in Networked Systems Research},
year={2015}
}

August 2015 USENIX Workshop on Free and Open Communications on the Internet (USENIX FOCI)

An Analysis of China's Great Cannon

Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi David Fifield Sarah McKune Arn Rey John Scott-Railton Ron Deibert Vern Paxson

PDF

@inproceedings{Bill2015An,
title={An Analysis of China's Great Cannon},
author={Bill Marczak and Nicholas Weaver and Jakub Dalek and Roya Ensafi and David Fifield and Sarah McKune and Arn Rey and John Scott-Railton and Ron Deibert and Vern Paxson},
booktitle={USENIX Workshop on Free and Open Communications on the Internet},
year={2015}
}

July 2015 Privacy Enhancing Technologies Symposium (PETS)

Analyzing the Great Firewall of China Over Space and Time

Roya Ensafi Philipp Winter Abdullah Mueen Jedidiah R. Crandall

PDF

@inproceedings{Roya2015Analyzing,
title={Analyzing the Great Firewall of China Over Space and Time},
author={Roya Ensafi and Philipp Winter and Abdullah Mueen and Jedidiah R. Crandall},
booktitle={Privacy Enhancing Technologies Symposium},
year={2015}
}

August 2014 USENIX Workshop on Free and Open Communications on the Internet (USENIX FOCI)

Global Censorship Detection over the RIPE Atlas Network

Collin Anderson Philipp Winter Roya Ensafi

PDF

@inproceedings{Collin2014Global,
title={Global Censorship Detection over the RIPE Atlas Network},
author={Collin Anderson and Phillipp Winter and Roya Ensafi},
booktitle={USENIX Workshop on Free and Open Communications on the Internet},
year={2014}
}

August 2014 USENIX Workshop on Gaming, Games, and Gamification in Security Education

A Case Study in Helping Students to Covertly Eat Their Classmates

Roya Ensafi Mike Jacobi Jedidiah R. Crandall

PDF

@inproceedings{Roya2014A,
title={A Case Study in Helping Students to Covertly Eat Their Classmates},
author={Roya Ensafi and Mike Jacobi and Jedidiah R. Crandall},
booktitle={USENIX Workshop on Gaming, Games, and Gamification in Security Education},
year={2014}
}

March 2014 Passive and Active Measurement (PAM)

Detecting intentional packet drops on the Internet via TCP/IP side channels

Roya Ensafi Jeffrey Knockel Geoffrey Alexander Jedidiah R Crandall

PDF Talk

@inproceedings{Roya2014Detecting,
title={Detecting intentional packet drops on the Internet via TCP/IP side channels},
author={Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R Crandall},
booktitle={Passive and Active Measurement},
year={2014}
}

August 2012 USENIX Workshop on Cyber Security Experimentation and Test

Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper

Roya Ensafi Mike Jacobi Jedidiah R Crandall

PDF

@inproceedings{Roya2012Students,
title={Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper},
author={Roya Ensafi and Mike Jacobi and Jedidiah R. Crandall},
booktitle={USENIX Workshop on Cyber Security Experimentation and Test},
year={2012}
}

August 2010 USENIX Security Symposium

Idle Port Scanning & Non-interference Analysis of Network Protocol Stacks Using Model Checking

Roya Ensafi Jong Chun Park Deepak Kapur Jedidiah R Crandall

PDF

@inproceedings{Roya2010Idle,
title={Idle Port Scanning & Non-interference Analysis of Network Protocol Stacks Using Model Checking},
author={Roya Ensafi and Jong Chun Park and Deepak Kapur and Jedidiah R. Crandall},
booktitle={USENIX Security Symposium},
year={2010}
}


© 2020 Censored Planet|Terms of Service