|
Roya Ensafi
Assistant Professor
Computer Science & Engineering, University of Michigan
Email:  ensafi [@] umich.edu
My research focuses on security and privacy, with an emphasis on designing techniques and systems to protect users from adversarial networks. Much of my work has focused on detecting and defending against adversaries who manipulate Internet traffic in order to block, monitor, or otherwise tamper with users' online activities.
Members of my lab: Reethika Ramesh, Ram Sundara Raman, Renuka Kumar ( co-advised by Atul Prakash), Leonid Evdokimov, and Elio Qoshi. Alumni include: Victor Ongkowijaya, Adrian Stoll, and Muhammad Ikram.
|
Selected Publications
The full list of my publications is available here.
-
Measuring the Deployment of Network Censorship Filters
at Global Scale
R. Sundara Raman, A. Stoll, J. Dalek, A. Sarabi, R. Ramesh,
W. Scott, R.Ensafi
In: NDSS, Feb 2020
-
Decentralized Control: A Case Study of Russia
R. Ramesh, R. Sundara Raman, M. Bernhard, V. Ongkowijaya,
L. Evdokimov, A. Edmundson, S. Sprecher, M. Ikram, R.Ensafi
In: NDSS, Feb 2020
-
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading
M. Ikram, R. Masood, G. Tyson, M. Kaafar, N. Loizon,and R.Ensafi
In: WWW 2019, May 2019
-
403 Forbidden: A Global View of CDN Geoblocking
A. McDonald, M. Bernhard, B. VanderSloot, W. Scott, J. A. Halderman, and R. Ensafi
In: ACM IMC , November 2018
-
Quack: Scalable Remote Measurement of Application-Layer Censorship
B. VanderSloot, A. McDonald, W. Scott, J. A. Halderman, R. Ensafi
In: USENIX Security , August 2018
-
Nation-State Hegemony in Internet Routing
A. Edmundson,R. Ensafi, N. Feamster, J. Rexford
In: ACM SIGCAS Conference on Computing and Sustainable Societies, , July 2018
-
A Look at Infrastructure Geolocation in Public and Commercial Databases
M. Gharaibeh, A. Shah, B. Huffaker, H. Zhang, R. Ensafi , C. Papadopoulos
In: ACM IMC , November 2017
-
Global Measurement of DNS Manipulation
P. Pearce, B. Jones, F. Li, R. Ensafi , N. Feamster, V. Paxson
In: USENIX Security, August 2017
-
Augur: Internet-Wide Detection of Connectivity Disruptions
P. Pearce* , R. Ensafi* , F. Li, N. Feamster, V. Paxson (* joint first authors)
In: IEEE Symposium on Security and Privacy (Oakland), May 2017
-
Identifying and Characterizing Sybils in the Tor Network
P. Winter, R. Ensafi, K. Loesing, and N. Feamster
In: USENIX Security Symposium (USENIX Security), August 2016
-
Examining How the Great Firewall Discovers Hidden Circumvention Servers
R. Ensafi, D. Fifield, P. Winter, N. Feamster, N. Weaver, and V. Paxson
In: ACM Internet Measurement Conference (IMC), October 2015
IRTF Applied Networking Research Prize winner
-
Analyzing the Great Firewall of China Over Space and Time
R. Ensafi, P. Winter, M. Abdullah, and J. Crandall
In: Privacy Enhancing Technologies Symposium (PETS), July 2015
-
An Analysis of China's Great Cannon
B. Marczak, N. Weaver, J. Dalek, R. Ensafi, D. Fifield, S. McKune, A. Rey, J. Railton, R. Deibert, and V. Paxson
In: USENIX Workshop on Free and Open Communications on the Internet (FOCI), August 2015.
Also appeared as a Citizen Lab report, April 2015
|