Hi! I’m a graduate student in computer science at Princeton University. My current interests are broadly in computer security/privacy, networks, and systems.

I received my B.S.E. in computer science magna cum laude from the University of Michigan. While taking full-time student course loads, I worked as a research assistant at Prof. Ensafi’s lab (Censored Planet) and as a teaching assistant for EECS 183. In the past, I was a software engineering intern at Nokia Deepfield and a research assistant at Merit Networks (mentored by Dr. Kallitsis), both in the field of network security.

In my spare time, I watch and play a lot of badminton. I’m a sucker for self-improvement books, biographies, and most video games. My special talent is being allergic to everything floating in the air. I’m from Jakarta, Indonesia.

Decentralized Control: A Case Study of Russia

Paper (NDSS’20) / Report

Unlike other censoring countries such as China and Iran, very little is known about Russia’s censorship practices. We collaborated with activists and developed new measurement methods to capture the information control ecosystem of Russia. Our work was covered by 80+ news agencies around the world: ABC / NYT / WP / AP / CPJ / Japan / China / Taiwan.

Censored Planet

Project Site

To protect freedom of speech, there must be a way to independently detect if something has been censored. Our platform uses remote measurement techniques to collect and publish such data, weekly, for more than 150 countries. The platform has detected surreptitious censorship involving Saudi Arabia and Kazakhstan.

ISP-Scale DDoS Mitigation
Poster (UMich UROP Symposium)

Internet service providers are susceptible to DDoS attacks, leading to user downtimes and network congestion. We worked with real-world Internet traffic data, coming from Merit’s 4000 miles of Internet fiber-optic infrastructure, to explore DNS-side DDoS detection and enhance the existing network monitoring software (AMON).

Voting Machine Forensic Analysis

Wiped voting machines can be found on online shopping platforms such as eBay, possibly to recover some election costs. We tore apart a used WinVote and iVotronic for forensic analysis. Although we did not discover any groundbreaking security flaws, this phenomenon remains deeply concerning. Covered in UMich News.


Princeton Course Guide / Michigan Course Guide

COS 518: Distributed Systems

COS 597: Computer Science for Policy & Law

EECS 482: Operating Systems

EECS 489: Computer Networks

EECS 484: Database Systems

EECS 494: Game Development

EECS 485: Web Systems

EECS 498: Election Cybersecurity

EECS 398: Autonomous Robotics

EECS 388: Computer Security

EECS 370: Computer Architecture

EECS 281: Data Structures & Algorithms