I am a PhD candidate in the computer science department at the University of Maryland, advised by Dave Levin. My work focuses on enabling open communication, improving network security, and evading censorship.
I created Geneva, a genetic algorithm that discovers ways to evade nation-state Internet censorship, and run the censorship team in the Breakerspace Lab. I am honored to be one of the 2021 winners Facebook and USNEIX’s Internet Defense Prize, IRTF’s international Applied Network Research Prize (ANRP), and a recipient of USENIX Security’s Distinguished Paper Award.
I am also the creator of and instructor for HACS408T: Introduction to Penetration Testing for the University of Maryland Honors College Program ACES (Advanced Cybersecurity Experience for Students).
PhD in Computer Science, (in progress)
University of Maryland
Masters in Computer Science, 2018
University of Maryland
BS in Computer Science, 2017
University of Maryland
In this paper, we present evidence that suggests the GFW has deployed a second HTTPS censorship middlebox that runs in parallel to the first. We present a detailed analysis of this secondary censorship middlebox—how it operates, the content it blocks, and how it interacts with the primary middlebox. We also present several packet-based evasion strategies for the secondary middlebox and demonstrate that the primary censorship middlebox can be defeated independently from the secondary.
In this paper, we present the first non-trivial TCP-based DDoS amplification attack by weaponizing censoring middleboxes. We develop a novel mechanism to discover these amplification attacks and perform Internet-wide measurements to measure the threat censoring middleboxes pose. We find hundreds of thousands of IP addresses that offer amplification factors greater than 100×. We also report on network phenomena that causes some of the TCP-based attacks to be so effective as to technically have infinite amplification factor (after the attacker sends a constant number of bytes, the reflector generates traffic indefinitely).
Censors pose an even greater threat to the Internet than previously understood. We demonstrate an off-path attack that exploits residual censorship, a feature by which a censor continues blocking traffic between two end-hosts for some time after a censorship event. Our attack sends spoofed packets with censored content, keeping two victim end-hosts separated by a censor from being able to communicate with one another. This attack allows anyone to weaponize censorship infrastructure to perform their own blocking.
Earlier this year, Iran deployed their protocol filter that permits only a small set of protocols (DNS, HTTP, and HTTPS) and censors connections using any other protocol. In this paper, we present the first detailed analysis of Iran’s protocol filter: how it works, its limitations, and how it can be defeated.
In this paper, we present the first purely server-side censorship evasion strategies—11 in total—enabling servers to subvert censorship on behalf of clients. We extend Geneva to automate the discovery and implementation of server-side strategies, and we apply it to four countries (China, India, Iran, and Kazakhstan) and five protocols (DNS-over-TCP, FTP, HTTP, HTTPS, and SMTP).
We present Geneva, a novel genetic algorithm that evolves packet-manipulation-based censorship evasion strategies against nation-state level censors. With experiments performed both in-lab and against several real censors (in China, India, and Kazakhstan), we demonstrate that Geneva is able to quickly and independently re-derive most strategies from prior work, and derive novel subspecies and altogether new species of packet manipulation strategies.