Publications
VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016).
(2015).
An Analysis of China’s “Great Cannon”.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
(2015).
(2015). Blocking-resistant communication through domain fronting.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
(2015). Censorship Arms Race: Research vs. Practice.
Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
(2015). China’s Great Cannon.
The Citizen Report.
(2015). Ethical Concerns for Censorship Measurement.
Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
(2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of ACM Internet Measurement Conference.
(2015). Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Proceedings of ACM Cloud Computing Security Workshop.
(2015).
(2015). Measurement and Analysis of Traffic Exchange Services.
Proceedings of ICM Internet Measurement Conference.
(2015). A Primer on IPv4 Scarcity.
ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
(2015).
(2015).
(2014).
(2014).
(2014).
Here Be Web Proxies.
8362, 183-192.
(2014).
(2014).
(2014).
(2014).
(2014). On Modeling the Costs of Censorship.
CoRR. abs/1409.3211,
(2014).
(2014).