What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Roya Ensafi
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
CenPush: Blocking-Resistant Control Channel Using Push Notifications.
Piyush Kumar Sharma
Diwen Xue
Aaron Ortwein
Cecylia Bocovich
Harry
Roya Ensafi
2025
conf/ndss
The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic.
Diwen Xue
Robert Stanley
Piyush Kumar
Roya Ensafi
2024
journals/popets
Attacking Connection Tracking Frameworks as used by Virtual Private Networks.
Benjamin Mixon-Baca
Jeffrey Knockel
Diwen Xue
Tarun Ayyagari
Deepak Kapur
Roya Ensafi
Jedidiah R. Crandall
2024
conf/uss
Digital Discrimination of Users in Sanctioned States: The Case of the Cuba Embargo.
Anna Ablove
Shreyas Chandrashekaran
Hieu Le
Ram Sundara Raman
Reethika Ramesh
Harry Oppenheimer
Roya Ensafi
2024
conf/uss
Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape.
Diwen Xue
Anna Ablove
Reethika Ramesh
Grace Kwak Danciu
Roya Ensafi
2024
conf/uss
CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse.
Reethika Ramesh
Philipp Winter
Sam Korman
Roya Ensafi
2024
conf/uss
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes.
Diwen Xue
Michalis Kallitsis
Amir Houmansadr
Roya Ensafi
2024
conf/ndss
Modeling and Detecting Internet Censorship Events.
Elisa Tsai
Ram Sundara Raman
Atul Prakash
Roya Ensafi
2023
journals/popets
CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates.
Elisa Tsai
Deepak Kumar
Ram Sundara Raman
Gavin Li
Yael Eiger
Roya Ensafi
2023
conf/uss
Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom.
Reethika Ramesh
Ram Sundara Raman
Apurva Virkud
Alexandra Dirksen
Armin Huremagic
David Fifield
Dirk Rodenburg
Rod Hynes
Douglas Madory
Roya Ensafi
2023
conf/uss
"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers.
Reethika Ramesh
Anjali Vyas
Roya Ensafi
2022
conf/uss
OpenVPN is Open to VPN Fingerprinting.
Diwen Xue
Reethika Ramesh
Arham Jain
Michalis Kallitsis
J. Alex Halderman
Jedidiah R. Crandall
Roya Ensafi
2022
conf/uss
A Large-scale Investigation into Geodifferences in Mobile Apps.
Renuka Kumar
Apurva Virkud
Ram Sundara Raman
Atul Prakash
Roya Ensafi
2022
conf/ndss
VPNInspector: Systematic Investigation of the VPN Ecosystem.
Reethika Ramesh
Leonid Evdokimov
Diwen Xue
Roya Ensafi
2021
conf/fc
Lost in Transmission: Investigating Filtering of COVID-19 Websites.
Anjali Vyas
Ram Sundara Raman
Nick Ceccio
Philipp M. Lutscher
Roya Ensafi
2020
conf/ccs
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory.
Ram Sundara Raman
Prerana Shenoy
Katharina Kohls
Roya Ensafi
2020
conf/ndss
Decentralized Control: A Case Study of Russia.
Reethika Ramesh
Ram Sundara Raman
Matthew Bernhard
Victor Ongkowijaya
Leonid Evdokimov
Anne Edmundson
Steven Sprecher
Muhammad Ikram
Roya Ensafi
2020
conf/ndss
Measuring the Deployment of Network Censorship Filters at Global Scale.
Ram Sundara Raman
Adrian Stoll
Jakub Dalek
Reethika Ramesh
Will Scott
Roya Ensafi
2018
conf/uss
Quack: Scalable Remote Measurement of Application-Layer Censorship.
Benjamin VanderSloot
Allison McDonald
Will Scott
J. Alex Halderman
Roya Ensafi
2017
conf/uss
Global Measurement of DNS Manipulation.
Paul Pearce
Ben Jones
Frank Li
Roya Ensafi
Nick Feamster
Nicholas Weaver
Vern Paxson
2017
conf/sp
Augur: Internet-Wide Detection of Connectivity Disruptions.
Paul Pearce
Roya Ensafi
Frank Li
Nick Feamster
Vern Paxson
2016
conf/uss
Identifying and Characterizing Sybils in the Tor Network.
Philipp Winter
Roya Ensafi
Karsten Loesing
Nick Feamster
2015
journals/popets
Analyzing the Great Firewall of China Over Space and Time.
Roya Ensafi
Philipp Winter
Abdullah Mueen
Jedidiah R. Crandall
2014
conf/uss
A Case Study in Helping Students to Covertly Eat Their Classmates.
Roya Ensafi
Mike Jacobi
Jedidiah R. Crandall
2012
conf/uss
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
Roya Ensafi
Mike Jacobi
Jedidiah R. Crandall
2010
conf/uss
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
Roya Ensafi
Jong Chun Park
Deepak Kapur
Jedidiah R. Crandall
2008
conf/nspw
The ecology of Malware.
Jedidiah R. Crandall
Roya Ensafi
Stephanie Forrest
Joshua Ladau
Bilal Shebaro
Coauthors
Aaron Ortwein
(1)
Abdullah Mueen
(1)
Adrian Stoll
(1)
Alexandra Dirksen
(1)
Allison McDonald
(1)
Amir Houmansadr
(1)
Anjali Vyas
(2)
Anna Ablove
(2)
Anne Edmundson
(1)
Apurva Virkud
(2)
Arham Jain
(1)
Armin Huremagic
(1)
Atul Prakash
(2)
Ben Jones
(1)
Benjamin Mixon-Baca
(1)
Benjamin VanderSloot
(1)
Bilal Shebaro
(1)
Cecylia Bocovich
(1)
David Fifield
(1)
Deepak Kapur
(2)
Deepak Kumar
(1)
Dirk Rodenburg
(1)
Diwen Xue
(7)
Douglas Madory
(1)
Elisa Tsai
(2)
Frank Li
(2)
Gavin Li
(1)
Grace Kwak Danciu
(1)
Harry
(1)
Harry Oppenheimer
(1)
Hieu Le
(1)
J. Alex Halderman
(2)
Jakub Dalek
(1)
Jedidiah R. Crandall
(7)
Jeffrey Knockel
(1)
Jong Chun Park
(1)
Joshua Ladau
(1)
Karsten Loesing
(1)
Katharina Kohls
(1)
Leonid Evdokimov
(2)
Matthew Bernhard
(1)
Michalis Kallitsis
(2)
Mike Jacobi
(2)
Muhammad Ikram
(1)
Nicholas Weaver
(1)
Nick Ceccio
(1)
Nick Feamster
(3)
Paul Pearce
(2)
Philipp M. Lutscher
(1)
Philipp Winter
(3)
Piyush Kumar
(1)
Piyush Kumar Sharma
(1)
Prerana Shenoy
(1)
Ram Sundara Raman
(9)
Reethika Ramesh
(9)
Renuka Kumar
(1)
Robert Stanley
(1)
Rod Hynes
(1)
Roya Ensafi
(27)
Sam Korman
(1)
Shreyas Chandrashekaran
(1)
Stephanie Forrest
(1)
Steven Sprecher
(1)
Tarun Ayyagari
(1)
Vern Paxson
(2)
Victor Ongkowijaya
(1)
Will Scott
(2)
Yael Eiger
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to