Recent Awards:
Sloan Research Fellowship
NSF CAREER (2023)
IRTF Applied Networking (2016,2023)
USENIX Security Internet Defense Prize (2022)
My research broadly lies at the intersection of networking, security and privacy, and Internet measurement. I build scalable techniques and systems to protect users’ Internet experiences from disruption, surveillance, and digital inequity. My work takes a data-driven approach to detecting and defending
against powerful network intermediaries, government threat actors, and technologies and practices that impact users’ freedom of expression online.
Alumni include: Name (Postdoc/PhD/Master/Undergrad--> immdidate position after graduating) Reethika Ramesh (PhD student → Senior Staff Researcher at Palo Alto Networks.),Renuka Kumar
(PhD student → Software Engineer IV at Cisco),Muhammad Ikram (Postdoc→ Lecturer, Macquarie University), Gavin Li(Undergrad→ Graduate Student, Standford),
Apurva Virkud (Undergrad→ PhD Student, UIUC),
<, Kevin Wang(Undergrad),
Arham Jain (Undergrad→ Software Engineer, Google),
Yael Eiger(Software engineer→ PhD Student, Washington University),
Kyle Astroth(Masters student→),
Anjali Vyas (Undergrad→ Masters Student, Cornell Tech),
Rose Ceccio (Undergrad→ PhD Student, Wisconsin - Madison),
Victor Ongkowijaya (Undergrad→ PhD Student, Princeton),
Adrian Stoll (Undergrad→ Software Engineer, Google),
Prerana Shenoy (Undergrad→ Product Security Engineer, Atlassian),
Leonid Evdokimov, Elio Qoshi (→ Ura Design).
I have multiple openings for PhD students and a postdoctoral fellow. Join me to protect users' Internet experiences from censorship, surveillance, and digital inequity!
OpenVPN is Open to VPN Fingerprinting
D. Xue, R. Ramesh, A. Jain, M. Kallitsis, A. Halderman, J. R. Crandall, R. Ensafi
In: USENIX Security Symposium, August 2022 🏆 Distinguished paper award 🏆 Won First Prize 🏆 in the 2022 Internet Defense Prize
University of Michigan [Winter 2020, Fall 2022, Fall 2023]
Course Description: This course teaches the security mindset and introduces the principles and practices of computer security as applied to software, host systems, and networks. I hope any interested CS undergraduate students take this course.
Prerequisites: EECS 281 required; EECS 201 and EECS 370 recommended.