Publications
(2022). The Death of Cryptocurrency: The Case for Regulation.
Yale Law School Information Society Project. Digital Future Whitepaper Series,
(2021). Disrupting Cryptocurrencies 2: Lessons From the Poly 'Hack'.
Lawfare.
(2021). How to Cut Down on Ransomware Attacks Without Banning Bitcoin.
Slate.
(2021). How to Start Disrupting Cryptocurrencies: “Mining” Is Money Transmission.
Lawfare.
(2021). What Happened in the Kaseya VSA Incident?.
Lawfare.
(2021). What's the Deal with the Log4Shell Security Nightmare?.
Lawfare.
(2020). Apple vs FBI: Pensacola Isn’t San Bernardino.
Lawfare.
(2020). Blocking International Students Is an Attack on America’s Future.
Lawfare.
(2020). How Easy Is it to Build a Robot Assassin?.
Lawfare.
(2018). The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
(2018). Risks of Cryptocurrencies.
Communications of the ACM. 61(6), 20-24.
(2016). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016). Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Proceedings of ACM CCS.
(2016). A Multi-perspective Analysis of Carrier-Grade NAT Deployment.
Proceedings of ACM Internet Measurement Conference.
(2015). An Analysis of China’s “Great Cannon”.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
(2015). China’s Great Cannon.
The Citizen Report.
(2015). Cookies Lack Integrity: Real-World Implications.
707-721.
(2015). Ethical Concerns for Censorship Measurement.
Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.

]