Publications
(2014). Here Be Web Proxies.
8362, 183-192.
(2014). The Matter of Heartbleed.
(2015). An Analysis of China’s “Great Cannon”.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
(2015). China’s Great Cannon.
The Citizen Report.
(2015). Cookies Lack Integrity: Real-World Implications.
707-721.
(2015). Ethical Concerns for Censorship Measurement.
Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
(2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers.
Proceedings of ACM Internet Measurement Conference.
(2016). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of ACM CCS.
(2016). A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2018). The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
(2018). Risks of Cryptocurrencies.
Communications of the ACM. 61(6), 20-24.
(2020). Apple vs FBI: Pensacola Isn’t San Bernardino.
Lawfare.
(2020). Blocking International Students Is an Attack on America’s Future.
Lawfare.
(2020). How Easy Is it to Build a Robot Assassin?.
Lawfare.
(2021). Disrupting Cryptocurrencies 2: Lessons From the Poly 'Hack'.
Lawfare.

]