For a more complete list of publications, please see Google Scholar.

Public Verification for Private Hash Matching

IEEE Symposium on Security and Privacy (2023)

Content Moderation for End-to-End Encryption

Privacy Enhancing Technologies Symposium (2023)

Network Measurement Methods for Locating and Examining Censorship Devices

ACM CoNEXT (2022)

Estimating Incidental Collection in Foreign Intelligence Surveillance

Usenix Security (2022)

Adapting Security Warnings to Counter Online Disinformation

Usenix Security (2021)

Identifying Harmful Media in End-to-End Encrypted Communication

Usenix Security (2021)

What Makes a Dark Pattern... Dark?

ACM CHI (2021)

Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset

WWW (2021)

No WAN's Land: Mapping U.S. Broadband Coverage with Millions of Address Queries to ISPs

ACM IMC (2020)

Identifying Disinformation Websites Using Infrastructure Features

Usenix FOCI (2020)

Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites

ACM CSCW (2019)

Government Hacking

Yale Law Journal (2018)

Evaluating the Privacy Properties of Telephone Metadata

Proceedings of the National Academy of Sciences (2016)

Cybercrime Litigation

University of Pennsylvania Law Review (2016)

The “Narrow” Interpretation of the Computer Fraud and Abuse Act: A User Guide for Applying United States v. Nosal

George Washington Law Review (2016)

Third-Party Web Tracking: Policy and Technology

IEEE Symposium on Security and Privacy (2012)