Public Verification for Private Hash Matching
IEEE Symposium on Security and Privacy (2023)
Content Moderation for End-to-End Encryption
Privacy Enhancing Technologies Symposium (2023)
Network Measurement Methods for Locating and Examining Censorship Devices
ACM CoNEXT (2022)
Estimating Incidental Collection in Foreign Intelligence Surveillance
Usenix Security (2022)
Adapting Security Warnings to Counter Online Disinformation
Usenix Security (2021)
Identifying Harmful Media in End-to-End Encrypted Communication
Usenix Security (2021)
What Makes a Dark Pattern... Dark?
ACM CHI (2021)
Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset
WWW (2021)
No WAN's Land: Mapping U.S. Broadband Coverage with Millions of Address Queries to ISPs
ACM IMC (2020)
Identifying Disinformation Websites Using Infrastructure Features
Usenix FOCI (2020)
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites
ACM CSCW (2019)
Evaluating the Privacy Properties of Telephone Metadata
Proceedings of the National Academy of Sciences (2016)
Cybercrime Litigation
University of Pennsylvania Law Review (2016)
The “Narrow” Interpretation of the Computer Fraud and Abuse Act: A User Guide for Applying United States v. Nosal
George Washington Law Review (2016)
Third-Party Web Tracking: Policy and Technology
IEEE Symposium on Security and Privacy (2012)