Internet censorship is a significant threat to the freedom of speech and open access to information across the world. While there exists an arsenal of tools to circumvent Internet censorship, they fall short in helping censored users effectively and reliably. In this talk, I will present insights from a decade of research on combating Internet censorship, highlighting the key technical and non-technical challenges, as well as promising directions for future advancements.

Speaker's Biography: Amir Houmansadr is an Associate Professor of computer science at UMass Amherst. He received his Ph.D. from the University of Illinois at Urbana-Champaign, and was a postdoctoral researcher at the University of Texas at Austin. Amir is broadly interested in the security and privacy of networked/AI systems. To that end, he designs and deploys privacy-enhancing technologies, analyzes network protocols and services (e.g., messaging apps and machine learning APIs) for privacy leakage, and performs theoretical analysis to derive bounds on privacy (e.g., using game theory and information theory). Amir has received several awards including the 2013 IEEE S&P Best Practical Paper Award, a 2015 Google Faculty Research Award, a 2016 NSF CAREER Award, a 2022 DARPA Young Faculty Award (YFA), the 2023 Best Practical Paper Award from the FOCI Community, the first place at CSAW 2023 Applied Research Competition, a Distinguished Paper Award from ACM CCS 2023, a 2024 Applied Networking Research Prize (ANRP), and a 2024 DARPA Directors Award.

View More Papers

PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR

Zizhi Jin (Zhejiang University), Qinhong Jiang (Zhejiang University), Xuancun Lu (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Wenyuan Xu (Zhejiang University)

Read More

ABElity: Attribute Based Encryption for Securing RIC Communication in...

K Sowjanya (Indian Institute of Technology Delhi), Rahul Saini (Eindhoven University of Technology), Dhiman Saha (Indian Institute of Technology Bhilai), Kishor Joshi (Eindhoven University of Technology), Madhurima Das (Indian Institute of Technology Delhi)

Read More

From Large to Mammoth: A Comparative Evaluation of Large...

Jie Lin (University of Central Florida), David Mohaisen (University of Central Florida)

Read More

Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces...

Yanzuo Chen (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong Kong University of Science and Technology), Sihang Hu (Huawei Technologies), Tianxiang Li (Huawei Technologies), Shuai Wang (The Hong Kong University of Science and Technology)

Read More