Students who don't understand information flow should be eaten: an experience paper

Roya Ensafi , Mike Jacobi , Jedidiah R. Crandall
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test 10 -10

6
2012
An Analysis of China's "Great Cannon"

Nicholas Weaver , Arn Rey , Bill Marczak , David Fifield
5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 15)

31
2015
Idle port scanning and non-interference analysis of network protocol stacks using model checking

Roya Ensafi , Deepak Kapur , Jedidiah R. Crandall , Jong Chun Park
usenix security symposium 17 -17

71
2010
Identifying and characterizing Sybils in the Tor network

Roya Ensafi , Nick Feamster , Karsten Loesing , Philipp Winter
arXiv: Cryptography and Security

51
2016
Global Measurement of {DNS} Manipulation

Roya Ensafi , Vern Paxson , Nick Feamster , Frank Li
usenix security symposium 307 -323

41
2017
Quack: Scalable Remote Measurement of Application-Layer Censorship

Roya Ensafi , Benjamin VanderSloot , J. Alex Halderman , Will Scott
usenix security symposium 187 -202

14
2018
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory

Roya Ensafi , Katharina Kohls , Ram Sundara Raman , Prerana Shenoy
computer and communications security 49 -66

54
2020
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels

Roya Ensafi , Jeffrey Knockel , Geoffrey Alexander , Jedidiah R. Crandall
passive and active network measurement 109 -118

43
2014
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading

Muhammad Ikram , Rahat Masood , Gareth Tyson , Mohamed Ali Kaafar
ACM Transactions on Privacy and Security (TOPS) 23 ( 2) 1 -27

2020
403 Forbidden: A Global View of CDN Geoblocking

Allison McDonald , Matthew Bernhard , Luke Valenta , Benjamin VanderSloot
internet measurement conference 218 -230

43
2018
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading

Muhammad Ikram , Rahat Masood , Gareth Tyson , Mohamed Ali Kaafar
the web conference 2851 -2857

26
2019
Toward Continual Measurement of Global Network-Level Censorship

Paul Pearce , Roya Ensafi , Frank Li , Nick Feamster
ieee symposium on security and privacy 16 ( 1) 24 -33

3
2018
A look at router geolocation in public and commercial databases

Manaf Gharaibeh , Anant Shah , Bradley Huffaker , Han Zhang
internet measurement conference 463 -469

45
2017
The ecology of Malware

Jedidiah R. Crandall , Roya Ensafi , Stephanie Forrest , Joshua Ladau
new security paradigms workshop 99 -106

17
2008
Measuring the Deployment of Network Censorship Filters at Global Scale

Ram Sundara Raman , Adrian Stoll , Jakub Dalek , Reethika Ramesh
Proceedings 2020 Network and Distributed System Security Symposium

3
2020
Decentralized Control: A Case Study of Russia

Reethika Ramesh , Ram Sundara Raman , Matthew Bernhard , Victor Ongkowijaya
Proceedings 2020 Network and Distributed System Security Symposium

6
2020
Investigating Large Scale HTTPS Interception in Kazakhstan

Ram Sundara Raman , Leonid Evdokimov , Eric Wurstrow , J. Alex Halderman
internet measurement conference 125 -132

28
2020
A First Look into Transnational Routing Detours

Anne Edmundson , Roya Ensafi , Nick Feamster , Jennifer Rexford
acm special interest group on data communication 567 -568

3
2016
A case study of traffic demand response to broadband service-plan upgrades

Sarthak Grover , Roya Ensafi , Nick Feamster
passive and active network measurement 124 -135

2016
Nation-State Hegemony in Internet Routing

Anne Edmundson , Roya Ensafi , Nick Feamster , Jennifer Rexford
The Compass 17

6
2018