Skip to main content

Showing 1–10 of 10 results for author: Ensafi, R

.
  1. arXiv:2403.03998  [pdf, other

    cs.CR

    OpenVPN is Open to VPN Fingerprinting

    Authors: Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi

    Abstract: VPN adoption has seen steady growth over the past decade due to increased public awareness of privacy and surveillance threats. In response, certain governments are attempting to restrict VPN access by identifying connections using "dual use" DPI technology. To investigate the potential for VPN blocking, we develop mechanisms for accurately fingerprinting connections using OpenVPN, the most popula… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: In: USENIX Security Symposium 2022 (USENIX Security '22)

    Journal ref: 31st USENIX Security Symposium (USENIX Security 22). 2022

  2. CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates

    Authors: Elisa Tsai, Deepak Kumar, Ram Sundara Raman, Gavin Li, Yael Eiger, Roya Ensafi

    Abstract: DNS manipulation is an increasingly common technique used by censors and other network adversaries to prevent users from accessing restricted Internet resources and hijack their connections. Prior work in detecting DNS manipulation relies largely on comparing DNS resolutions with trusted control results to identify inconsistencies. However, the emergence of CDNs and other cloud providers practicin… ▽ More

    Submitted 14 May, 2023; originally announced May 2023.

    Comments: To Appear in: Privacy Enhancing Technologies Symposium (PETS), July 2023

  3. arXiv:2208.03505  [pdf, other

    cs.CR

    "All of them claim to be the best": Multi-perspective study of VPN users and VPN providers

    Authors: Reethika Ramesh, Anjali Vyas, Roya Ensafi

    Abstract: As more users adopt VPNs for a variety of reasons, it is important to develop empirical knowledge of their needs and mental models of what a VPN offers. Moreover, studying VPN users alone is not enough because, by using a VPN, a user essentially transfers trust, say from their network provider, onto the VPN provider. To that end, we are the first to study the VPN ecosystem from both the users' and… ▽ More

    Submitted 28 September, 2022; v1 submitted 6 August, 2022; originally announced August 2022.

    Comments: Accepted to appear at USENIX Security Symposium 2023 (32nd USENIX Security Symposium, 2023)

  4. arXiv:2203.03077  [pdf, other

    cs.CR

    A Study of Third-party Resources Loading on Web

    Authors: Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Roya Ensafi

    Abstract: This paper performs a large-scale study of dependency chains in the web, to find that around 50% of first-party websites render content that they did not directly load. Although the majority (84.91%) of websites have short dependency chains (below 3 levels), we find websites with dependency chains exceeding 30. Using VirusTotal, we show that 1.2% of these third-parties are classified as suspicious… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

    Comments: 3 pages. arXiv admin note: substantial text overlap with arXiv:1901.07699

  5. arXiv:2107.10344  [pdf

    cs.CY q-bio.PE

    Challenges in cybersecurity: Lessons from biological defense systems

    Authors: Edward Schrom, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. de Boer, Adam Doupé, Roya Ensafi, Stuart Feldman, Bryan T. Grenfell. Alex Halderman, Silvie Huijben, Carlo Maley, Melanie Mosesr, Alan S. Perelson, Charles Perrings, Joshua Plotkin, Jennifer Rexford, Mohit Tiwari

    Abstract: We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and how insights derived from studying the evolution of natural defenses can inform the design of more effective cybersecurity systems. More generally, security challenges are crucial for… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 20 pages

    MSC Class: A.0

  6. arXiv:1901.07699  [pdf, other

    cs.CR

    The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading

    Authors: Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kaafar, Noha Loizon, Roya Ensafi

    Abstract: The Web is a tangled mass of interconnected services, where websites import a range of external resources from various third-party domains. However, the latter can further load resources hosted on other domains. For each website, this creates a dependency chain underpinned by a form of implicit trust between the first-party and transitively connected third-parties. The chain can only be loosely co… ▽ More

    Submitted 18 February, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

    Comments: 12 pages

  7. arXiv:1605.07685  [pdf, other

    cs.NI

    Characterizing and Avoiding Routing Detours Through Surveillance States

    Authors: Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford

    Abstract: An increasing number of countries are passing laws that facilitate the mass surveillance of Internet traffic. In response, governments and citizens are increasingly paying attention to the countries that their Internet traffic traverses. In some cases, countries are taking extreme steps, such as building new Internet Exchange Points (IXPs), which allow networks to interconnect directly, and encour… ▽ More

    Submitted 24 May, 2016; originally announced May 2016.

  8. arXiv:1602.07787  [pdf, other

    cs.CR

    Identifying and characterizing Sybils in the Tor network

    Authors: Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster

    Abstract: Being a volunteer-run, distributed anonymity network, Tor is vulnerable to Sybil attacks. Little is known about real-world Sybils in the Tor network, and we lack practical tools and methods to expose Sybil attacks. In this work, we develop sybilhunter, the first system for detecting Sybil relays based on their appearance, such as configuration; and behavior, such as uptime sequences. We used sybil… ▽ More

    Submitted 24 February, 2016; originally announced February 2016.

  9. arXiv:1410.0735  [pdf, other

    cs.NI

    Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall

    Authors: Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall

    Abstract: A nation-scale firewall, colloquially referred to as the "Great Firewall of China," implements many different types of censorship and content filtering to control China's Internet traffic. Past work has shown that the firewall occasionally fails. In other words, sometimes clients in China are able to reach blacklisted servers outside of China. This phenomenon has not yet been characterized because… ▽ More

    Submitted 2 October, 2014; originally announced October 2014.

  10. arXiv:1312.5739  [pdf, other

    cs.NI

    Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version

    Authors: Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall

    Abstract: We describe a method for remotely detecting intentional packet drops on the Internet via side channel inferences. That is, given two arbitrary IP addresses on the Internet that meet some simple requirements, our proposed technique can discover packet drops (e.g., due to censorship) between the two remote machines, as well as infer in which direction the packet drops are occurring. The only major r… ▽ More

    Submitted 19 December, 2013; originally announced December 2013.

    Comments: This is the extended version of a paper from the 2014 Passive and Active Measurements Conference (PAM), March 10th-11th, 2014, Los Angeles, California