default search action
Roya Ensafi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Tarun Ayyagari, Deepak Kapur, Roya Ensafi, Jedidiah R. Crandall:
Attacking Connection Tracking Frameworks as used by Virtual Private Networks. Proc. Priv. Enhancing Technol. 2024(3): 109-126 (2024) - [c38]Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi:
Modeling and Detecting Internet Censorship Events. NDSS 2024 - [c37]Anna Ablove, Shreyas Chandrashekaran, Hieu Le, Ram Sundara Raman, Reethika Ramesh, Harry Oppenheimer, Roya Ensafi:
Digital Discrimination of Users in Sanctioned States: The Case of the Cuba Embargo. USENIX Security Symposium 2024 - [c36]Reethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi:
CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse. USENIX Security Symposium 2024 - [c35]Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi:
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. USENIX Security Symposium 2024 - [c34]Diwen Xue, Anna Ablove, Reethika Ramesh, Grace Kwak Danciu, Roya Ensafi:
Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape. USENIX Security Symposium 2024 - [i10]Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. CoRR abs/2403.03998 (2024) - 2023
- [j6]Elisa Tsai, Deepak Kumar, Ram Sundara Raman, Gavin Li, Yael Eiger, Roya Ensafi:
CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates. Proc. Priv. Enhancing Technol. 2023(3): 122-137 (2023) - [c33]Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Douglas Madory, Roya Ensafi:
Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom. USENIX Security Symposium 2023: 2581-2598 - [c32]Reethika Ramesh, Anjali Vyas, Roya Ensafi:
"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers. USENIX Security Symposium 2023: 5773-5789 - [i9]Elisa Tsai, Deepak Kumar, Ram Sundara Raman, Gavin Li, Yael Eiger, Roya Ensafi:
CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates. CoRR abs/2305.08189 (2023) - 2022
- [c31]Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan R. Mayer, Roya Ensafi:
Network measurement methods for locating and examining censorship devices. CoNEXT 2022: 18-34 - [c30]Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi:
TSPU: Russia's decentralized censorship system. IMC 2022: 179-194 - [c29]Reethika Ramesh, Leonid Evdokimov, Diwen Xue, Roya Ensafi:
VPNInspector: Systematic Investigation of the VPN Ecosystem. NDSS 2022 - [c28]Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. USENIX Security Symposium 2022: 483-500 - [c27]Renuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash, Roya Ensafi:
A Large-scale Investigation into Geodifferences in Mobile Apps. USENIX Security Symposium 2022: 1203-1220 - [e2]Roya Ensafi, Andra Lutu, Anna Sperotto, Roland van Rijswijk-Deij:
6th Network Traffic Measurement and Analysis Conference, TMA 2022, Enschede, The Netherlands, June 27-30, 2022. IFIP 2022, ISBN 978-3-903176-47-8 [contents] - [i8]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Roya Ensafi:
A Study of Third-party Resources Loading on Web. CoRR abs/2203.03077 (2022) - [i7]Reethika Ramesh, Anjali Vyas, Roya Ensafi:
"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers. CoRR abs/2208.03505 (2022) - 2021
- [c26]Anjali Vyas, Ram Sundara Raman, Nick Ceccio, Philipp M. Lutscher, Roya Ensafi:
Lost in Transmission: Investigating Filtering of COVID-19 Websites. Financial Cryptography (2) 2021: 417-436 - [c25]Diwen Xue, Reethika Ramesh, Valdik S. S, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi:
Throttling Twitter: an emerging censorship technique in Russia. Internet Measurement Conference 2021: 435-443 - [i6]Edward C. Schrom II, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. De Boer, Adam Doupé, Roya Ensafi, Stuart I. Feldman, Bryan T. Grenfell, J. Alex Halderman, Silvie Huijben, Carlo C. Maley, Melanie E. Moses, Alan S. Perelson, Charles Perrings, Joshua B. Plotkin, Jennifer Rexford, Mohit Tiwari:
Challenges in cybersecurity: Lessons from biological defense systems. CoRR abs/2107.10344 (2021) - 2020
- [j5]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. Proc. ACM Meas. Anal. Comput. Syst. 4(1): 13:1-13:23 (2020) - [j4]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading. ACM Trans. Priv. Secur. 23(2): 8:1-8:27 (2020) - [c24]Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi:
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. CCS 2020: 49-66 - [c23]Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi:
Investigating Large Scale HTTPS Interception in Kazakhstan. Internet Measurement Conference 2020: 125-132 - [c22]Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi:
Measuring the Deployment of Network Censorship Filters at Global Scale. NDSS 2020 - [c21]Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi:
Decentralized Control: A Case Study of Russia. NDSS 2020 - [c20]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. SIGMETRICS (Abstracts) 2020: 69-70 - [e1]Roya Ensafi, Hans Klein:
10th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2020, August 11, 2020. USENIX Association 2020 [contents]
2010 – 2019
- 2019
- [c19]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. WWW 2019: 2851-2857 - [i5]Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi:
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading. CoRR abs/1901.07699 (2019) - 2018
- [j3]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Toward Continual Measurement of Global Network-Level Censorship. IEEE Secur. Priv. 16(1): 24-33 (2018) - [c18]Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford:
Nation-State Hegemony in Internet Routing. COMPASS 2018: 17:1-17:11 - [c17]Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi:
403 Forbidden: A Global View of CDN Geoblocking. Internet Measurement Conference 2018: 218-230 - [c16]Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi:
Quack: Scalable Remote Measurement of Application-Layer Censorship. USENIX Security Symposium 2018: 187-202 - 2017
- [j2]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global-Scale Measurement of DNS Manipulation. login Usenix Mag. 42(4) (2017) - [c15]Manaf Gharaibeh, Anant Shah, Bradley Huffaker, Han Zhang, Roya Ensafi, Christos Papadopoulos:
A look at router geolocation in public and commercial databases. Internet Measurement Conference 2017: 463-469 - [c14]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Augur: Internet-Wide Detection of Connectivity Disruptions. IEEE Symposium on Security and Privacy 2017: 427-443 - [c13]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global Measurement of DNS Manipulation. USENIX Security Symposium 2017: 307-323 - 2016
- [c12]Sarthak Grover, Roya Ensafi, Nick Feamster:
A Case Study of Traffic Demand Response to Broadband Service-Plan Upgrades. PAM 2016: 124-135 - [c11]Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford:
A First Look into Transnational Routing Detours. SIGCOMM 2016: 567-568 - [c10]Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster:
Identifying and Characterizing Sybils in the Tor Network. USENIX Security Symposium 2016: 1169-1185 - [i4]Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster:
Identifying and characterizing Sybils in the Tor network. CoRR abs/1602.07787 (2016) - [i3]Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford:
Characterizing and Avoiding Routing Detours Through Surveillance States. CoRR abs/1605.07685 (2016) - 2015
- [j1]Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall:
Analyzing the Great Firewall of China Over Space and Time. Proc. Priv. Enhancing Technol. 2015(1): 61-76 (2015) - [c9]Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson:
Examining How the Great Firewall Discovers Hidden Circumvention Servers. Internet Measurement Conference 2015: 445-458 - [c8]Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nicholas Weaver:
Ethical Concerns for Censorship Measurement. NS Ethics@SIGCOMM 2015: 17-19 - 2014
- [c7]Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall:
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels. PAM 2014: 109-118 - [c6]Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall:
A Case Study in Helping Students to Covertly Eat Their Classmates. 3GSE 2014 - [i2]Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall:
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall. CoRR abs/1410.0735 (2014) - 2013
- [i1]Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall:
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version. CoRR abs/1312.5739 (2013) - 2012
- [c5]Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall:
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper. CSET 2012 - 2010
- [c4]Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall:
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. USENIX Security Symposium 2010: 257-272
2000 – 2009
- 2008
- [c3]Roya Ensafi, Soheila Dehghanzadeh, Mohammad R. Akbarzadeh-Totonchi:
Optimizing Fuzzy K-means for network anomaly detection using PSO. AICCSA 2008: 686-693 - [c2]Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, Bilal Shebaro:
The ecology of Malware. NSPW 2008: 99-106 - 2007
- [c1]Vahid Salmani, Roya Ensafi, Narges Khatib-Astaneh, Mahmoud Naghibzadeh:
A Fuzzy-Based Multi-criteria Scheduler for Uniform Multiprocessor Real-Time Systems. ICIT 2007: 179-184
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint