I am an assistant professor in the College of Computer and Information
Science at Northeastern University. My research is primarily in the areas of distributed systems and
networking, with a recent focus on mobile systems. Much of my work
entails crowdsourcing measurement and performance evaluation of
Internet systems by deploying software to users at the scale of tens
or hundreds of thousands of users. To date, more than 1 million users
have installed software produced from my research and more than 15
research groups worldwide have integrated my datasets into their
research projects. Please click around to check out more details about
me and my work.
- Prospective students! I am currently
looking to admit Ph.D. students starting in the Fall 2017. Please see this page
for more information. Also, I am recruiting graduate and undergraduate students
who are interested in privacy, anonymity, security, network transparency, and building mobile systems.
Experience with networking/mobile/cloud systems (e.g., app development, network measurement, AppEngine) strongly preferred.
- Postdoc position I am looking for a postdoc who is interested in privacy, particulalry for mobile and IoT devices. For related project information and results from our recent work, please see the ReCon project page. A good candidate will have a strong background in networking and network measurement, and a projection onto privacy, security, and machine learning. Start date is ideally November or December, 2016. Please contact me if interested!
- 9/10/16 My paper titled "A Case for Personal Virtual Networks" was selected to appear at HotNets '16! Looking forward to an interactive workshop!
- 8/31/16 Our work on next-generation anonymity systems (beyond Tor) was covered in Ars Technica!
- 7/30/16 Deja Vu all over again! Northeastern, for a second year in a row, has a whopping 7 papers appearing at IMC (more than 1/7 of the program)! I am involved in five of the papers:
Congrats to all of our collaborators, and particularly to the students and postdocs who did all the hard work! More details to come when the camera ready versions are available.
- "Should You Use the App for That? Comparing the Privacy Implications of Web- and App-based Online Services",
- "Classifiers Unclassified: An Efficient Approach to Revealing IP-Traffic Classification Rules" (with Stony Brook),
- "Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet",
- "Measuring and Applying Invalid SSL Certificates: The Silent Majority" (with U of Maryland, Duke), and
- "Inspecting the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service" (with MPI, University of Cape Town, LUMS, and IIT Kharagpur).
- 7/22/16 Our work on measuring and analyzing private key sharing in the HTTPS
ecosystem was accepted to CCS! This is joint work with U. Marlyand, Duke/Akamai, and Northeastern.
- 6/22/16 I gave a talk about ReCon at the Mozilla Privacy Lab at ICSI. Watch the video here!
- 6/21/16 I'm happy to report the NSF has funded our work on PKI research, a joint effort with Alan Mislove, Christo Wilson, myself, Dave Levin (UMD) and Tudor Dumitras (UMD)!
- 6/18/16 Our paper analyzing T-Mobile's Binge On implementation and its implications was accepted to the SIGCOMM Internet-QoE workshop!
- 2/23/16 Our paper on ReCon was accepted to appear at MobiSys 2016! Congrats to my student Jingjing Ren, and to our co-authors Ashwin Rao, Martina Lindorfer, and Arnaud Legout!
- 1/8/16 Want to know what information your mobile apps are leaking about you? Check out the Recon App Report! We break it down by app, OS, information leaked, and who is collecting it. If you're interested, also check out the ReCon Web Report, showing the same details for information leaked through your mobile Web browser.
- 12/8/15 Our proposal to adopt in-flight IP connectivity to serve a variety of airline flight communication applications was accepted to HotMobile '16! This is a collaboration with NorthWEstern University, led by the talented John Rula, advised by Fabian Bustamante.
- 11/17/15 Our work on ReCon, presented at the DTL conference, was covered by the Boston Globe, CS Monitor, and NBC News, among others!
- 10/1/15 Interested in whether there's a proxy in your network? Check out Proxy Detector for Android! Also see the associated tech report for more details.
- 8/25/15 I am starting a two-year term as Associate Editor for CCR. Keep those excellent submissions coming!
- 8/15/15 I was awarded a Google Research Award for my work on identifying traffic differentiation. Many thanks to Google for their support!
- 7/23/15 Our research group at NEU has a whopping 7 papers appearing at IMC (1/6 of the program)! I am involved in three of the papers: "Identifying Traffic Differentiation in Mobile Networks" (with Stony Brook), "On SSL Certificate Revocation: The Race to the Bottom in Securing the Web's PKI" (with U of Maryland, Duke, and Stanford), and "Investigating Interdomain Routing Policies in the Wild" (with Stony Brook, UFMG, and USC). Congrats to all of our collaborators, and particularly to the students who did all the hard work! More details to come when the camera ready versions are available.
- 6/12/15 Our ReCon project (part of Meddle) was awarded a grant from the Data Transparency Lab! We are very grateful to
the DTL board for their generous support.
- 6/4/15 Our Differentiation Detector app for determining if your mobile carrier is violating net neutrality and shaping your traffic is now live
in the Google Play Store. (CACM article, NEU article)
- Older news...
For those who don't know me, the following passage has become a theme
that runs through my life. In short, I "push the rock," just like Sisyphus from Greek
mythology. But Camus tells it better:
As for this myth, one
sees merely the whole effort of a body straining to raise the huge
stone, to roll it and push it up a slope a hundred times over; one sees
the face screwed up, the cheek tight against the stone, the shoulder
bracing the clay-covered mass, the foot wedging it, the fresh start
with arms outstretched, the wholly human security of two earth-clotted
hands. At the very end of his long effort measured by skyless space and
time without depth, the purpose is achieved. Then Sisyphus watches the
stone rush down in a few moments toward that lower world whence he will
have to push it up again toward the summit. He goes back down to the
plain. It is during that return, that pause, that Sisyphus interests
me. A face that toils so close to stones is already stone itself! I see
that man going back down with a heavy yet measured step toward the
torment of which he will never know the end. That hour like a
breathing-space which returns as surely as his suffering, that is the
hour of consciousness. At each of those moments when he leaves the
heights and gradually sinks toward the lairs of the gods, he is
superior to his fate. He is stronger than his rock.
-- Albert Camus, The Myth of Sisyphus