Nguyen Phong Hoang
Nguyen Phong Hoang
Home
Publications
Media Coverage
Projects
TMC
GFWatch
Domain Name Privacy
I2P Metrics
I2P Reseed Server
Prospective Students
Teaching (Access only from UBC Network)
2024W1 CPSC 538H - Network Security
2024W2 CPSC 417 - Computer Networking
Publications
Type
Date
2024
2023
2022
2021
2020
2019
2018
2016
2015
2014
GFWeb: Measuring the Great Firewall's Web Censorship at Scale
Abstract: Censorship systems such as the Great Firewall (GFW) have been continuously refined to enhance their filtering capabilities. …
Nguyen Phong Hoang
,
Jakub Dalek
,
Masashi Crete-Nishihata
,
Nicolas Christin
,
Vinod Yegneswaran
,
Michalis Polychronakis
,
Nick Feamster
Cite
[USENIX Security '24 (to appear)]
Toward Automated DNS Tampering Detection Using Machine Learning
Abstract: DNS manipulation is one of the most prevalent and effective techniques for censoring Internet access and interfering with …
Paola Calle
,
Larissa Savitsky
,
Arjun Nitin Bhagoji
,
Nguyen Phong Hoang
,
Shinyoung Cho
Cite
Code
[FOCI '23]
Automatic Generation of Web Censorship Probe Lists
Abstract: Domain probe lists—used to determine which URLs to probe for Web censorship—play a critical role in Internet …
Jenny Tang
,
Léo Alvarez
,
Arjun Brar
,
Nguyen Phong Hoang
,
Nicolas Christin
Cite
Preprint
[PoPETs '24]
DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
Abstract: The arms race between Internet freedom advocates and censors has catalyzed the emergence of sophisticated blocking techniques …
Abderrahmen Amich
,
Birhanu Eshete
,
Vinod Yegneswaran
,
Nguyen Phong Hoang
PDF
Cite
Code
Slides
[USENIX Security '23]
Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
Abstract: The proliferation of global censorship has led to the development of a plethora of measurement platforms to monitor and …
Jacob Brown
,
Xi Jiang
,
Van Tran
,
Arjun Nitin Bhagoji
,
Nguyen Phong Hoang
,
Nick Feamster
,
Prateek Mittal
,
Vinod Yegneswaran
PDF
Cite
Code
Preprint
[KDD '23]
Detecting Network Interference Without Endpoint Participation
Abstract: Internet censorship research has been centered around notorious censors (e.g., China, Russia, and Iran) since they have …
Sadia Nourin
,
Kevin Bock
,
Nguyen Phong Hoang
,
Dave Levin
Cite
[FOCI '23]
Measuring and Evading Turkmenistan's Internet Censorship
Abstract: Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters without Borders due to its …
Sadia Nourin
,
Van Tran
,
Xi Jiang
,
Kevin Bock
,
Nick Feamster
,
Nguyen Phong Hoang
,
Dave Levin
Cite
Code
Slides
Preprint
TMC Dashboard
[WWW '23]
New study finds Internet censorship in Turkmenistan reaches over 122,000 domains
Blanket type censorship results in massive collateral damage! The dictatorship in Turkmenistan does not get a lot of media and …
Nurbek Bekmurzaev
Press release
Measuring the Accessibility of Domain Name Encryption and its Impact on Internet Filtering
Most online communications rely on DNS to map domain names to their hosting IP address(es). Previous work has shown that DNS-based …
Nguyen Phong Hoang
,
Michalis Polychronakis
,
Phillipa Gill
PDF
Cite
Slides
Preprint
[PAM '22]
Exhaustive study puts China’s infamous Great Firewall under the microscope
China’s notorious website-blocking technology is impacting the global DNS system as well as restricting access to content locally, …
John Leyden
Press release
How Great is the Great Firewall? Measuring China's DNS Censorship
Abstract: The DNS filtering apparatus of China’s Great Firewall (GFW) has evolved considerably over the past two decades. …
Nguyen Phong Hoang
,
Arian Akhavan Niaki
,
Jakub Dalek
,
Jeffrey Knockel
,
Pellaeon Lin
,
Bill Marczak
,
Masashi Crete-Nishihata
,
Phillipa Gill
,
Michalis Polychronakis
PDF
Cite
Dataset
Slides
Video
Preprint
GFWatch Dashboard
[USENIX Security '21]
How The Great Firewall Reflects Beijing’s Policy
The Internet censorship analyst talks about the evolution of China’s system, how it differs from and affects other countries, and …
Katrina Northrop
Press release
Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting
Although the security benefits of domain name encryption technologies such as DNS over TLS (DoT), DNS over HTTPS (DoH), and Encrypted …
Nguyen Phong Hoang
,
Arian Akhavan Niaki
,
Phillipa Gill
,
Michalis Polychronakis
PDF
Cite
Dataset
Poster
Slides
Video
Preprint
[PoPETs '21]
China’s Great Firewall is blocking around 311k domains, 41k by accident
In the largest study of its kind, a team of academics from four US and Canadian universities said they were able to determine the size …
Catalin Cimpanu
Press release
Español
日本語
한글
简体
繁体
русский
босански
עִבְרִית
Français
ខ្មែរ
China suddenly blocked an Indonesian newspaper. No one knows why
Earlier this week, Chinese censors abruptly blocked access to the website of Jawa Pos, one of Indonesia’s largest newspapers, …
Peter Guest
Press release
Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior
The Great Firewall of China (GFW) has long used DNS packet injection to censor Internet access. In this work, we analyze the DNS …
Anonymous
,
Arian Akhavan Niaki
,
Nguyen Phong Hoang
,
Phillipa Gill
,
Amir Houmansadr
PDF
Cite
Slides
[USENIX FOCI '20]
Assessing the Privacy Benefits of Domain Name Encryption
As Internet users have become more savvy about the potential for their Internet communication to be observed, the use of network …
Nguyen Phong Hoang
,
Arian Akhavan Niaki
,
Nikita Borisov
,
Phillipa Gill
,
Michalis Polychronakis
PDF
Cite
Dataset
[ACM AsiaCCS '20]
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
Researchers have studied Internet censorship for nearly as long as attempts to censor contents have taken place. Most studies have …
Arian Akhavan Niaki
,
Shinyoung Cho
,
Zachary Weinberg
,
Nguyen Phong Hoang
,
Abbas Razaghpanah
,
Nicolas Christin
,
Phillipa Gill
PDF
Cite
Code
Dataset
Slides
Video
[IEEE S&P '20]
The Web is Still Small After More Than a Decade - A Revisit Study of Web Co-location
Understanding web co-location is essential for various reasons. For instance, it can help one to assess the collateral damage that …
Nguyen Phong Hoang
,
Arian Akhavan Niaki
,
Michalis Polychronakis
,
Phillipa Gill
PDF
Cite
Dataset
Preprint
[SIGCOMM CCR '20]
K-resolver: Towards Decentralizing Encrypted DNS Resolution
Centralized DNS over HTTPS/TLS (DoH/DoT) resolution , which has started being deployed by major hosting providers and web browsers, has …
Nguyen Phong Hoang
,
Ivan Lin
,
Seyedhamed Ghavamnia
,
Michalis Polychronakis
PDF
Cite
Dataset
Poster
Slides
[NDSS MADWeb '20]
How Gay Dating Apps Are Being Abused & Used For Entrapment Around The World?
Grindr has been used by gay, bi, and transgender men for over ten years in nearly 200 countries. Gay communities in countries where …
Alex Myers
Press release
Measuring I2P Censorship at a Global Scale
The prevalence of Internet censorship has prompted the creation of several measurement platforms for monitoring filtering activities. …
Nguyen Phong Hoang
,
Sadie Doreen
,
Michalis Polychronakis
PDF
Cite
Slides
[USENIX FOCI '19]
An Empirical Study of the I2P Anonymity Network and Its Censorship Resistance
Tor and I2P are well-known anonymity networks used by many individuals to protect their online privacy and anonymity. Tor’s …
Nguyen Phong Hoang
,
Panagiotis Kintis
,
Manos Antonakakis
,
Michalis Polychronakis
PDF
Cite
DOI
I2P Metrics Portal
[ACM IMC '18]
同性恋交友应用真的安全吗?研究人员的发现让人有些失望
几天前,我提醒我的妻子我所做的实验完全与性无关,免得她偷瞄我的手机。之后我安装了同性恋交友应用Grindr。我把头像设为一只猫,并且关掉了应用上的“显示距离”选项,这样做能隐藏我的位置。一分钟之后,我打电话给Nguyen Phong Hoang(日本京都的一名安全研究人 …
猎云网 - 编译:Panda
Press release
Renewed Concerns about Privacy on Grindr, Hornet, and Similar Gay Hookup Apps
After claims that Egyptian police used gay hook-up apps to track down gay people and arrest them in 2014 (penalty for same-sex sexual …
Muri Assunção
Press release
Same-Sex Dating App Gives Away Your Exact Location, Even When You Tell It Not To
Three researchers from the Kyoto University in Japan have discovered that three of the most popular same-sex dating apps today are …
Catalin Cimpanu
Press release
Is Your Location Really Private on Grindr? Not Quite...
If someone is truly determined, they can pinpoint where you are by comparing your proximity to fake accounts. Researchers at …
David Murphy
Press release
Gay Dating Apps Promise Privacy, But Leak Your Exact Location
A FEW DAYS ago, I warned my wife that the experiment I was about to engage in was entirely non-sexual, lest she glance over my shoulder …
Andy Greenberg
Press release
Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications
Trilateration is one of the well-known threat models to the user’s location privacy in location-based apps; especially those …
Nguyen Phong Hoang
,
Yasuhito Asano
,
Masatoshi Yoshikawa
PDF
Cite
DOI
[TACT '16]
Your Neighbors Are My Spies: Location and Other Privacy Concerns in Dating Apps
Trilateration has recently become one of the wellknown threat models to the user’s location privacy in locationbased applications …
Nguyen Phong Hoang
,
Yasuhito Asano
,
Masatoshi Yoshikawa
PDF
Cite
DOI
[IEEE ICACT '16]
Anti-RAPTOR: Anti Routing Attack on Privacy for a Securer and Scalable Tor
Regardless of Tor’s robustness against individual attackers thanks to its distributed characteristics, the network is still highly …
Nguyen Phong Hoang
,
Yasuhito Asano
,
Masatoshi Yoshikawa
PDF
Cite
DOI
[IEEE ICACT '15]
Anonymous Communication and Its Importance in Social Networking
Digital information has become a social infrastructure and with the expansion of the Internet, network infrastructure has become an …
Nguyen Phong Hoang
,
Davar Pishva
PDF
Cite
DOI
[TACT '15]
Anonymous Communication and Its Importance in Social Networking
Digital information has become a social infrastructure and with the expansion of the Internet, network infrastructure has become an …
Nguyen Phong Hoang
,
Davar Pishva
PDF
Cite
DOI
[IEEE ICACT '14]
Cite
×