Roya Ensafi
Roya Ensafi
Assistant Professor, Computer Science & Engineering, University of Michigan
Verified email at umich.edu - Homepage
Title
Cited by
Cited by
Year
Examining how the Great Firewall discovers hidden circumvention servers
R Ensafi, D Fifield, P Winter, N Feamster, N Weaver, V Paxson
Proceedings of the 2015 Internet Measurement Conference, 445-458, 2015
672015
A look at router geolocation in public and commercial databases
M Gharaibeh, A Shah, B Huffaker, H Zhang, R Ensafi, C Papadopoulos
Proceedings of the 2017 Internet Measurement Conference, 463-469, 2017
582017
China’s great cannon
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
Citizen Lab 10, 2015
572015
Analyzing the Great Firewall of China over space and time
R Ensafi, P Winter, A Mueen, JR Crandall
Proceedings on privacy enhancing technologies 2015 (1), 61-76, 2015
562015
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
International Conference on Passive and Active Network Measurement, 109-118, 2014
53*2014
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
R Ensafi, JC Park, D Kapur, JR Crandall
USENIX Security Symposium, 257-272, 2010
532010
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.
R Ensafi, JC Park, D Kapur, JR Crandall
USENIX Security Symposium, 257-272, 2010
532010
Global Measurement of {DNS} Manipulation
P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson
26th {USENIX} Security Symposium ({USENIX} Security 17), 307-323, 2017
482017
An Analysis of China’s “Great Cannon”
B Marczak, N Weaver, J Dalek, R Ensafi, D Fifield, S McKune, A Rey, ...
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
392015
Augur: Internet-wide detection of connectivity disruptions
P Pearce, R Ensafi, F Li, N Feamster, V Paxson
2017 IEEE Symposium on Security and Privacy (SP), 427-443, 2017
362017
Optimizing fuzzy k-means for network anomaly detection using pso
R Ensafi, S Dehghanzadeh, R Mohammad, T Akbarzadeh
Computer Systems and Applications, 2008. AICCSA 2008. IEEE/ACS International …, 2008
362008
Identifying and characterizing Sybils in the Tor network
P Winter, R Ensafi, K Loesing, N Feamster
25th {USENIX} Security Symposium ({USENIX} Security 16), 1169-1185, 2016
242016
The ecology of malware
JR Crandall, R Ensafi, S Forrest, J Ladau, B Shebaro
Proceedings of the 2008 New Security Paradigms Workshop, 99-106, 2008
232008
A first look into transnational routing detours
A Edmundson, R Ensafi, N Feamster, J Rexford
Proceedings of the 2016 ACM SIGCOMM Conference, 567-568, 2016
19*2016
A Fuzzy-Based Multi-criteria Scheduler for Uniform Multiprocessor Real-Time Systems
V Salmani, R Ensafi, N Khatib-Astaneh, M Naghibzadeh
Information Technology,(ICIT 2007). 10th International Conference on, 179-184, 2007
182007
Ethical Concerns for Censorship Measurement
B Jones, R Ensafi, N Feamster, V Paxson, N Weaver
SIGCOMM Workshop on Ethics in Networked Systems Research, 2015
142015
The chain of implicit trust: An analysis of the web third-party resources loading
M Ikram, R Masood, G Tyson, MA Kaafar, N Loizon, R Ensafi
The World Wide Web Conference, 2851-2857, 2019
132019
403 forbidden: A global view of cdn geoblocking
A McDonald, M Bernhard, L Valenta, B VanderSloot, W Scott, N Sullivan, ...
Proceedings of the Internet Measurement Conference 2018, 218-230, 2018
132018
Quack: Scalable remote measurement of application-layer censorship
B VanderSloot, A McDonald, W Scott, JA Halderman, R Ensafi
27th {USENIX} Security Symposium ({USENIX} Security 18), 187-202, 2018
102018
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
R Ensafi, M Jacobi, JR Crandall
CSET, 2012
102012
The system can't perform the operation now. Try again later.
Articles 1–20