Victor Ongkowijaya
Hi! I’m a graduate student in computer science at Princeton University. My current interests are broadly in computer security/privacy, networks, and systems.
I received my B.S.E. in computer science magna cum laude from the University of Michigan. While taking full-time student course loads, I worked as a research assistant at Prof. Ensafi’s lab (Censored Planet) and as a teaching assistant for EECS 183. In the past, I was a software engineering intern at Nokia Deepfield and a research assistant at Merit Networks (mentored by Dr. Kallitsis), both in the field of network security.
In my spare time, I watch and play a lot of badminton. I’m a sucker for self-improvement books, biographies, and most video games. My special talent is being allergic to everything floating in the air. I’m from Jakarta, Indonesia.
Decentralized Control: A Case Study of Russia Unlike other censoring countries such as China and Iran, very little is known about Russia’s censorship practices. We collaborated with activists and developed new measurement methods to capture the information control ecosystem of Russia. Our work was covered by 80+ news agencies around the world: ABC / NYT / WP / AP / CPJ / Japan / China / Taiwan. |
![]() |
Censored Planet To protect freedom of speech, there must be a way to independently detect if something has been censored. Our platform uses remote measurement techniques to collect and publish such data, weekly, for more than 150 countries. The platform has detected surreptitious censorship involving Saudi Arabia and Kazakhstan. |
![]() |
ISP-Scale DDoS Mitigation Internet service providers are susceptible to DDoS attacks, leading to user downtimes and network congestion. We worked with real-world Internet traffic data, coming from Merit’s 4000 miles of Internet fiber-optic infrastructure, to explore DNS-side DDoS detection and enhance the existing network monitoring software (AMON). |
![]() |
Voting Machine Forensic Analysis Wiped voting machines can be found on online shopping platforms such as eBay, possibly to recover some election costs. We tore apart a used WinVote and iVotronic for forensic analysis. Although we did not discover any groundbreaking security flaws, this phenomenon remains deeply concerning. Covered in UMich News. |
![]() |
Coursework
Princeton Course Guide / Michigan Course Guide
COS 518: Distributed Systems |
COS 597: Computer Science for Policy & Law |
EECS 482: Operating Systems |
EECS 489: Computer Networks |
EECS 484: Database Systems |
EECS 494: Game Development |
EECS 485: Web Systems |
EECS 498: Election Cybersecurity |
EECS 398: Autonomous Robotics |
EECS 388: Computer Security |
EECS 370: Computer Architecture |
EECS 281: Data Structures & Algorithms |