We released a new report on the proliferation of censorship filtersRead Report

Investigating Security and Privacy Violations on the Internet

Censored Planet is a Research Lab at the University of Michigan operating at the intersection of networking, security, privacy, and Internet measurement.

University of Michigan logo

News

Latest Reports

Our research publications are often technical and complex, here we aim to communicate our research to a broader audience.

Russia’s Information Control

How the Russian government is gradually building national-level censorship policies on thousands of ISPs using commodity DPIs. Censored Planet obtained...

Read Report

Kazakhstan’s HTTPS Interception

The Kazakhstan government recently began using a fake root CA to perform a man-in-the-middle (MitM) attack against HTTPS connections to...

Read Report

Measuring the Deployment of Network Censorship Filters at Global Scale with FilterMap

Investigation into the global proliferation of content filtering technologies used for censorship using FilterMap, a novel framework that can scalably...

Read Report

Latest Reports

Our research publications are often technical and complex, here we aim to communicate our research to a broader audience.

Russia’s Information Control

How the Russian government is gradually building national-level censorship policies on thousands of ISPs using commodity DPIs. Censored Planet obtained...

Read Report

Kazakhstan’s HTTPS Interception

The Kazakhstan government recently began using a fake root CA to perform a man-in-the-middle (MitM) attack against HTTPS connections to...

Read Report

Measuring the Deployment of Network Censorship Filters at Global Scale with FilterMap

Investigation into the global proliferation of content filtering technologies used for censorship using FilterMap, a novel framework that can scalably...

Read Report

Observatory

Our observatory provides continuous data about Internet censorship practices in countries around the world.

Observatory

Our observatory provides continuous data about Internet censorship practices in countries around the world.

Projects

We design and deploy scalable techniques and systems to detect and protect users’ Internet experience from censorship, geo-discrimnation, surveillance and various other internet freedom violations.

Call for Students

We are always looking for promising students (computer science, political science, journalism) and developers to join our team!

Call for Students

We are always looking for promising students (CS, political science, journalism) and developers to join our team!

Featured Publications

February 2020 Network and Distributed System Security Symposium (NDSS)

Measuring the Deployment of Network Censorship Filters at Global Scale

Ram Sundara Raman Adrian Stoll Jakub Dalek Armin Sarabi Reethika Ramesh Will Scott Roya Ensafi

@inproceedings{filtermap,
title={Measuring the Deployment of Network Censorship Filters at Global Scale},
author={Sundara Raman, Ram and Stoll, Adrian and Dalek, Jakub and Sarabi, Armin and Ramesh, Reethika and Scott, Will and Ensafi, Roya},
booktitle={Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA},
year={2020}
}

February 2020 Network and Distributed System Security Symposium (NDSS)

Decentralized Control: A Case Study of Russia

Reethika Ramesh Ram Sundara Raman Matthew Bernhard Victor Ongkowijaya Leonid Evdokimov Annie Edmundson S. Sprecher Muhammad Ikram Roya Ensafi

Press: Associated Press CPJ Voice of America MSN ABC News New York Times Washington Post University of Michigan News

PDF

@inproceedings{ndss20-russia,
title={Decentralized Control: A Case Study of Russia},
author={R. Ramesh, R. Sundara Raman, M. Bernhard, V. Ongkowijaya, L. Evdokimov, A. Edmundson, S. Sprecher, M. Ikram, R.Ensafi},
booktitle={Proceedings of the Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA},
year={2020}
}

May 2019 International World Wide Web Conference (WWW)

The chain of implicit trust: An analysis of the Web third-party resources loading

Muhammad Ikram Rahat Masood Gareth Tyson Kaafar Mohamed Ali Noha Loizon Roya Ensafi

PDF

@inproceedings{065961dc95474ceaa258c117581529ec,
title={The chain of implicit trust: an analysis of the Web third-party resources loading},
author={Muhammad Ikram and Rahat Masood and Gareth Tyson and Kaafar, Mohamed Ali and Noha Loizon and Roya Ensafi},
year={2019},
booktitle={Proceeding WWW ’19 The World Wide Web Conference},
publisher={Association for Computing Machinery (ACM)}
}

November 2018 ACM Internet Measurement Conference (IMC)

403 Forbidden: A Global View of CDN Geoblocking

Allison McDonald Matthew Bernhard Luke Valenta Benjamin VanderSloot Will Scott Nick Sullivan J. Alex Halderman Roya Ensafi

PDF

@inproceedings{Allison2018403,
title={403 Forbidden: A Global View of CDN Geoblocking},
author={Allison McDonald and Matthew Bernhard and Luke Valenta and Benjamin VanderSloot and Will Scott and Nick Sullivan and J. Alex Halderman and Roya Ensafi},
booktitle={ACM Internet Measurement Conference},
year={2018}
}

August 2018 USENIX Security Symposium

Quack: Scalable Remote Measurement of Application-Layer Censorship

Benjamin VanderSloot Allison McDonald J. Alex Halderman Will Scott Roya Ensafi

PDF

@inproceedings{Ben2018Quack:,
title={Quack: Scalable Remote Measurement of Application-Layer Censorship},
author={Ben VanderSloot and Allison McDonald and Will Scott and J. Alex Halderman and Roya Ensafi},
booktitle={USENIX Security Symposium},
year={2018}
}

In the Media

Censored Planet projects and research reports have appeared in various news outlets and tech publications.


© 2020 Censored Planet|Terms of Service