Victor Ongkowijaya
Hi! I received my Master’s degree in computer science from Princeton University with full scholarship (formerly a PhD candidate), and received my Bachelor’s degree in computer science with honors from the University of Michigan. I pivoted from research to industry in pursuit of building products, and I currently work as a software engineer at Square (Block, Inc).
During my academic years, I focused primarily on research and teaching. At Princeton, I worked with Prof. Jonathan Mayer in the field of computer privacy & policy and briefly with Prof. Jennifer Rexford in the field of networks & systems. At Michigan, I worked in the field of computer security with Prof. Roya Ensafi, Dr. Michalis Kallitsis, and at Nokia Deepfield. I really enjoy teaching and have taught about 6 semesters of Data Structures & Algorithms (EECS 183, COS 226). Balancing full time semesters with research and teaching was a challenging experience, which was only made possible by my amazing mentors, colleagues, and students.
In my spare time, I enjoy learning new sports, playing video games, and walking with Kip, my happy-go-lucky golden retriever. My special talent is being allergic to everything floating in the air. I’m from Jakarta, Indonesia.
Decentralized Control: A Case Study of Russia Unlike other censoring countries such as China and Iran, very little is known about Russia’s censorship practices. We collaborated with activists and developed new measurement methods to capture the information control ecosystem of Russia. Our work was covered by 80+ news agencies around the world: ABC / NYT / WP / AP / CPJ / Japan / China / Taiwan. |
|
Censored Planet To protect freedom of speech, there must be a way to independently detect if something has been censored. Our platform uses remote measurement techniques to collect and publish such data, weekly, for more than 150 countries. The platform has detected surreptitious censorship involving Saudi Arabia and Kazakhstan. |
|
ISP-Scale DDoS Mitigation Internet service providers are susceptible to DDoS attacks, leading to user downtimes and network congestion. We worked with real-world Internet traffic data, coming from Merit’s 4000 miles of Internet fiber-optic infrastructure, to explore DNS-side DDoS detection and enhance the existing network monitoring software (AMON). |
|
Voting Machine Forensic Analysis Wiped voting machines can be found on online shopping platforms such as eBay, possibly to recover some election costs. We tore apart a used WinVote and iVotronic for forensic analysis. Although we did not discover any groundbreaking security flaws, this phenomenon remains deeply concerning. Covered in UMich News. |
Coursework
Princeton Course Guide / Michigan Course Guide
COS 518: Distributed Systems |
COS 597: Computer Science for Policy & Law |
EECS 482: Operating Systems |
EECS 489: Computer Networks |
EECS 484: Database Systems |
EECS 494: Game Development |
EECS 485: Web Systems |
EECS 498: Election Cybersecurity |
EECS 398: Autonomous Robotics |
EECS 388: Computer Security |
EECS 370: Computer Architecture |
EECS 281: Data Structures & Algorithms |