diff --git a/index.html b/index.html index 18fabe8..e36703b 100644 --- a/index.html +++ b/index.html @@ -185,7 +185,7 @@ @@ -237,6 +237,342 @@ Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah S In Proc. of: USENIX Security Symposium, 2024, USENIX +
  • +
    + +Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy + +
    + +In: Privacy Enhancing Technologies, 2024 + +
  • +
    + +Automatic Generation of Web Censorship Probe Lists + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin + +
    + +In: Privacy Enhancing Technologies, 2024 + +
  • +
    + +Extended Abstract: The Impact of Online Censorship on LLMs + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Mohamed Ahmed, Jeffrey Knockel + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 + +
  • +
    + +Extended Abstract: Leveraging Large Language Models to Identify Internet Censorship through Network Data + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Tianyu Gao, Ping Ji + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 + +
  • +
    + +Toward Automated DNS Tampering Detection Using Machine Learning + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Paola Calle, Larissa Savitsky, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Shinyoung Cho + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 + +
  • +
    + +Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Michael Pu, Andrew Wang, Anthony Chang, Kieran Quan, Yi Wei Zhou + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 + +
  • +
    + +Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Afonso Vilalonga, João S. Resende, Henrique Domingos + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 + +
  • +
    + +Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burdens + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Paul Vines + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 + +
  • +
    + +Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Philipp Müller, Niklas Niere, Felix Lange, Juraj Somorovsky + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 + +
  • +
    + +Detecting VPN Traffic through Encapsulated TCP Behavior + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Michelina Hanlon, Gerry Wan, Anna Ascheman, Zakir Durumeric + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 + +
  • +
    + +Analyzing Prominent Mobile Apps in Latin America + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Beau Kujath, Jeffrey Knockel, Paul Aguilar, Diego Morabito, Masashi Crete-Nishihata, Jedidiah R. Crandall + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 + +
  • +
    + +Lost in Translation: Characterizing Automated Censorship in Online Translation Services + + + +Download icon + + +Cached download icon + + +BibTeX download icon + + +Paper link icon + + +
    +
    + +Samuel Ruo, Jeffrey Knockel, Zoë Reichert + +
    + +In Proc. of: Free and Open Communications on the Internet, 2024 +
  • @@ -249,7 +585,7 @@ Identifying VPN Servers through Graph-Represented Behaviors Cached download icon - + BibTeX download icon @@ -277,7 +613,7 @@ GFWeb: Measuring the Great Firewall’s Web Censorship at Scale Cached download icon - + BibTeX download icon @@ -305,7 +641,7 @@ Digital Repression in Palestine Cached download icon - + BibTeX download icon @@ -333,7 +669,7 @@ How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censor Cached download icon - + BibTeX download icon @@ -362,7 +698,7 @@ Snowflake, a censorship circumvention system using temporary WebRTC proxies Cached download icon - + BibTeX download icon @@ -390,7 +726,7 @@ Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against S Cached download icon - + BibTeX download icon @@ -418,7 +754,7 @@ Out in the Open: On the Implementation of Mobile App Filtering in India Cached download icon - + BibTeX download icon @@ -446,7 +782,7 @@ Communication Breakdown: Modularizing Application Tunneling for Signaling Around Cached download icon - + BibTeX download icon @@ -474,7 +810,7 @@ Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model Cached download icon - + BibTeX download icon @@ -502,7 +838,7 @@ Modeling and Detecting Internet Censorship Events Cached download icon - + BibTeX download icon @@ -530,7 +866,7 @@ Internet Sanctions on Russian Media: Actions and Effects Cached download icon - + BibTeX download icon @@ -559,7 +895,7 @@ Bleeding Wall: A Hematologic Examination on the Great Firewall Cached download icon - + BibTeX download icon @@ -587,7 +923,7 @@ Just add WATER: WebAssembly-based Circumvention Transports Cached download icon - + BibTeX download icon @@ -615,7 +951,7 @@ Extended Abstract: Traffic Splitting for Pluggable Transports Cached download icon - + BibTeX download icon @@ -643,7 +979,7 @@ Extended Abstract: Oscur0: One-shot Circumvention without Registration Cached download icon - + BibTeX download icon @@ -671,7 +1007,7 @@ Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes Cached download icon - + BibTeX download icon @@ -699,7 +1035,7 @@ NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge Cached download icon - + BibTeX download icon @@ -728,7 +1064,7 @@ On Precisely Detecting Censorship Circumvention in Real-World Networks Cached download icon - + BibTeX download icon @@ -759,7 +1095,7 @@ Poster: Circumventing the GFW with TLS Record Fragmentation Cached download icon - + BibTeX download icon @@ -787,7 +1123,7 @@ Website blocking in the European Union: Network interference from the perspectiv Cached download icon - + BibTeX download icon @@ -815,7 +1151,7 @@ Comments on certain past cryptographic flaws affecting fully encrypted censorshi Cached download icon - + BibTeX download icon @@ -843,7 +1179,7 @@ Destination Unreachable: Characterizing Internet Outages and Shutdowns Cached download icon - + BibTeX download icon @@ -871,7 +1207,7 @@ Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning Cached download icon - + BibTeX download icon @@ -899,7 +1235,7 @@ A Study of China’s Censorship and Its Evasion Through the Lens of Online Gamin Cached download icon - + BibTeX download icon @@ -927,7 +1263,7 @@ DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorshi Cached download icon - + BibTeX download icon @@ -955,7 +1291,7 @@ TELEPATH: A Minecraft-based Covert Communication System Cached download icon - + BibTeX download icon @@ -983,7 +1319,7 @@ Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Cached download icon - + BibTeX download icon @@ -1011,7 +1347,7 @@ Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law Cached download icon - + BibTeX download icon @@ -1039,7 +1375,7 @@ A Worldwide View of Nation-state Internet Censorship Cached download icon - + BibTeX download icon @@ -1067,7 +1403,7 @@ The Use of Push Notification in Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1096,7 +1432,7 @@ Measuring and Evading Turkmenistan’s Internet Censorship Cached download icon - + BibTeX download icon @@ -1124,7 +1460,7 @@ Detecting Network Interference Without Endpoint Participation Cached download icon - + BibTeX download icon @@ -1153,7 +1489,7 @@ Running a high-performance pluggable transports Tor bridge Cached download icon - + BibTeX download icon @@ -1181,7 +1517,7 @@ Towards a Comprehensive Understanding of Russian Transit Censorship Cached download icon - + BibTeX download icon @@ -1209,7 +1545,7 @@ Proteus: Programmable Protocols for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1237,7 +1573,7 @@ Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling Cached download icon - + BibTeX download icon @@ -1265,7 +1601,7 @@ Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -1293,7 +1629,7 @@ Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale f Cached download icon - + BibTeX download icon @@ -1321,7 +1657,7 @@ How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic Cached download icon - + BibTeX download icon @@ -1350,7 +1686,7 @@ Lox: Protecting the Social Graph in Bridge Distribution Cached download icon - + BibTeX download icon @@ -1378,7 +1714,7 @@ Dolphin: A Cellular Voice Based Internet Shutdown Resistance System Cached download icon - + BibTeX download icon @@ -1407,7 +1743,7 @@ CensorWatch: On the Implementation of Online Censorship in India Cached download icon - + BibTeX download icon @@ -1436,7 +1772,7 @@ Chasing Shadows: A security analysis of the ShadowTLS proxy Cached download icon - + BibTeX download icon @@ -1464,7 +1800,7 @@ Security Notions for Fully Encrypted Protocols Cached download icon - + BibTeX download icon @@ -1492,7 +1828,7 @@ Advancing the Art of Censorship Data Analysis Cached download icon - + BibTeX download icon @@ -1520,7 +1856,7 @@ Global, Passive Detection of Connection Tampering Cached download icon - + BibTeX download icon @@ -1550,7 +1886,7 @@ Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with Cached download icon - + BibTeX download icon @@ -1578,7 +1914,7 @@ Network Measurement Methods for Locating and Examining Censorship Devices Cached download icon - + BibTeX download icon @@ -1606,7 +1942,7 @@ TSPU: Russia’s Decentralized Censorship System Cached download icon - + BibTeX download icon @@ -1634,7 +1970,7 @@ Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement Cached download icon - + BibTeX download icon @@ -1662,7 +1998,7 @@ GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -1690,7 +2026,7 @@ OpenVPN is Open to VPN Fingerprinting Cached download icon - + BibTeX download icon @@ -1719,7 +2055,7 @@ Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Cached download icon - + BibTeX download icon @@ -1747,7 +2083,7 @@ COVID-19 increased censorship circumvention and access to sensitive topics in Ch Cached download icon - + BibTeX download icon @@ -1775,7 +2111,7 @@ Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Cached download icon - + BibTeX download icon @@ -1805,7 +2141,7 @@ Understanding Internet Censorship in Europe: The Case of Spain Cached download icon - + BibTeX download icon @@ -1833,7 +2169,7 @@ OUStralopithecus: Overt User Simulation for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1861,7 +2197,7 @@ Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels Cached download icon - + BibTeX download icon @@ -1889,7 +2225,7 @@ Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China Cached download icon - + BibTeX download icon @@ -1918,7 +2254,7 @@ Meteor: Cryptographically Secure Steganography for Realistic Distributions Cached download icon - + BibTeX download icon @@ -1946,7 +2282,7 @@ Throttling Twitter: an emerging censorship technique in Russia Cached download icon - + BibTeX download icon @@ -1975,7 +2311,7 @@ Web censorship measurements of HTTP/3 over QUIC Cached download icon - + BibTeX download icon @@ -2003,7 +2339,7 @@ Measuring DoT/DoH blocking using OONI Probe: a preliminary study Cached download icon - + BibTeX download icon @@ -2031,7 +2367,7 @@ A multi-perspective view of Internet censorship in Myanmar Cached download icon - + BibTeX download icon @@ -2041,7 +2377,7 @@ A multi-perspective view of Internet censorship in Myanmar
    -Ramakrishna Padmanabhan, and Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Doug Madory, Molly Roberts, Alberto Dainotti +Ramakrishna Padmanabhan, Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Doug Madory, Molly Roberts, Alberto Dainotti
    @@ -2059,7 +2395,7 @@ Measuring QQMail’s Automated Email Censorship in China
    Cached download icon - + BibTeX download icon @@ -2088,7 +2424,7 @@ Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels Cached download icon - + BibTeX download icon @@ -2116,7 +2452,7 @@ Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middlebo Cached download icon - + BibTeX download icon @@ -2145,7 +2481,7 @@ BlindTLS: Circumventing TLS-Based HTTPS Censorship Cached download icon - + BibTeX download icon @@ -2174,7 +2510,7 @@ Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resis Cached download icon - + BibTeX download icon @@ -2202,7 +2538,7 @@ Weaponizing Middleboxes for TCP Reflected Amplification Cached download icon - + BibTeX download icon @@ -2230,7 +2566,7 @@ How Great is the Great Firewall? Measuring China’s DNS Censorship Cached download icon - + BibTeX download icon @@ -2259,7 +2595,7 @@ Balboa: Bobbing and Weaving around Network Censorship Cached download icon - + BibTeX download icon @@ -2287,7 +2623,7 @@ Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Cached download icon - + BibTeX download icon @@ -2316,7 +2652,7 @@ Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs Cached download icon - + BibTeX download icon @@ -2347,7 +2683,7 @@ Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert C Cached download icon - + BibTeX download icon @@ -2376,7 +2712,7 @@ Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communication Cached download icon - + BibTeX download icon @@ -2405,7 +2741,7 @@ Censored Planet: An Internet-wide, Longitudinal Censorship Observatory Cached download icon - + BibTeX download icon @@ -2433,7 +2769,7 @@ How China Detects and Blocks Shadowsocks Cached download icon - + BibTeX download icon @@ -2462,7 +2798,7 @@ Investigating Large Scale HTTPS Interception in Kazakhstan Cached download icon - + BibTeX download icon @@ -2490,7 +2826,7 @@ Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side E Cached download icon - + BibTeX download icon @@ -2518,7 +2854,7 @@ MIMIQ: Masking IPs with Migration in QUIC Cached download icon - + BibTeX download icon @@ -2547,7 +2883,7 @@ Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Ar Cached download icon - + BibTeX download icon @@ -2576,7 +2912,7 @@ Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior Cached download icon - + BibTeX download icon @@ -2604,7 +2940,7 @@ Slitheen++: Stealth TLS-based Decoy Routing Cached download icon - + BibTeX download icon @@ -2633,7 +2969,7 @@ Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Fil Cached download icon - + BibTeX download icon @@ -2661,7 +2997,7 @@ Turbo Tunnel, a good way to design censorship circumvention protocols Cached download icon - + BibTeX download icon @@ -2690,7 +3026,7 @@ HTTPT: A Probe-Resistant Proxy Cached download icon - + BibTeX download icon @@ -2718,7 +3054,7 @@ How India Censors the Web Cached download icon - + BibTeX download icon @@ -2747,7 +3083,7 @@ Characterizing Transnational Internet Performance and the Great Bottleneck of Ch Cached download icon - + BibTeX download icon @@ -2776,7 +3112,7 @@ SiegeBreaker: An SDN Based Practical Decoy Routing System Cached download icon - + BibTeX download icon @@ -2805,7 +3141,7 @@ Running Refraction Networking for Real Cached download icon - + BibTeX download icon @@ -2834,7 +3170,7 @@ MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencie Cached download icon - + BibTeX download icon @@ -2863,7 +3199,7 @@ ICLab: A Global, Longitudinal Internet Censorship Measurement Platform Cached download icon - + BibTeX download icon @@ -2892,7 +3228,7 @@ SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Disco Cached download icon - + BibTeX download icon @@ -2921,7 +3257,7 @@ MassBrowser: Unblocking the Censored Web for the Masses, by the Masses Cached download icon - + BibTeX download icon @@ -2950,7 +3286,7 @@ Detecting Probe-resistant Proxies Cached download icon - + BibTeX download icon @@ -2979,7 +3315,7 @@ Measuring the Deployment of Network Censorship Filters at Global Scale Cached download icon - + BibTeX download icon @@ -3008,7 +3344,7 @@ Decentralized Control: A Case Study of Russia Cached download icon - + BibTeX download icon @@ -3036,7 +3372,7 @@ Protocol Proxy: An FTE-based covert channel Cached download icon - + BibTeX download icon @@ -3067,7 +3403,7 @@ Conjure: Summoning Proxies from Unused Address Space Cached download icon - + BibTeX download icon @@ -3096,7 +3432,7 @@ Geneva: Evolving Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -3124,7 +3460,7 @@ Distributed Detection of Tor Directory Authorities Censorship in Mexico Cached download icon - + BibTeX download icon @@ -3152,7 +3488,7 @@ Shedding Light on Mobile App Store Censorship Cached download icon - + BibTeX download icon @@ -3181,7 +3517,7 @@ Improving Meek With Adversarial Techniques Cached download icon - + BibTeX download icon @@ -3210,7 +3546,7 @@ On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention Cached download icon - + BibTeX download icon @@ -3238,7 +3574,7 @@ An Efficient Method to Determine which Combination of Keywords Triggered Automat Cached download icon - + BibTeX download icon @@ -3267,7 +3603,7 @@ Measuring I2P Censorship at a Global Scale Cached download icon - + BibTeX download icon @@ -3295,7 +3631,7 @@ Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory Cached download icon - + BibTeX download icon @@ -3324,7 +3660,7 @@ The use of TLS in Censorship Circumvention Cached download icon - + BibTeX download icon @@ -3354,7 +3690,7 @@ On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Ce Cached download icon - + BibTeX download icon @@ -3382,7 +3718,7 @@ Where The Light Gets In: Analyzing Web Censorship Mechanisms in India Cached download icon - + BibTeX download icon @@ -3410,7 +3746,7 @@ In Proc. of: Internet Measurement Conference, 2018, A Cached download icon - + BibTeX download icon @@ -3438,7 +3774,7 @@ An Empirical Study of the I2P Anonymity Network and its Censorship Resistance Cached download icon - + BibTeX download icon @@ -3467,7 +3803,7 @@ Secure asymmetry and deployability for decoy routing systems Cached download icon - + BibTeX download icon @@ -3496,7 +3832,7 @@ Effective Detection of Multimedia Protocol Tunneling using Machine Learning Cached download icon - + BibTeX download icon @@ -3525,7 +3861,7 @@ Quack: Scalable Remote Measurement of Application-Layer Censorship Cached download icon - + BibTeX download icon @@ -3553,7 +3889,7 @@ Incentivizing Censorship Measurements via Circumvention Cached download icon - + BibTeX download icon @@ -3582,7 +3918,7 @@ Analyzing China’s Blocking of Unpublished Tor Bridges Cached download icon - + BibTeX download icon @@ -3611,7 +3947,7 @@ MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption Cached download icon - + BibTeX download icon @@ -3639,7 +3975,7 @@ An analysis of automatic image filtering on WeChat Moments Cached download icon - + BibTeX download icon @@ -3667,7 +4003,7 @@ A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability Cached download icon - + BibTeX download icon @@ -3695,7 +4031,7 @@ Automatically Generating a Large, Culture-Specific Blocklist for China Cached download icon - + BibTeX download icon @@ -3723,7 +4059,7 @@ How Sudden Censorship Can Increase Access to Information Cached download icon - + BibTeX download icon @@ -3751,7 +4087,7 @@ Detecting Censorable Content on Sina Weibo: A Pilot Study Cached download icon - + BibTeX download icon @@ -3779,7 +4115,7 @@ Proof-of-Censorship: Enabling centralized censorship-resistant content providers Cached download icon - + BibTeX download icon @@ -3809,7 +4145,7 @@ The Devil’s in The Details: Placing Decoy Routers in the Internet Cached download icon - + BibTeX download icon @@ -3837,7 +4173,7 @@ Lavinia: An audit-payment protocol for censorship-resistant storage Cached download icon - + BibTeX download icon @@ -3865,7 +4201,7 @@ The Random Forest based Detection of Shadowsock’s Traffic Cached download icon - + BibTeX download icon @@ -3893,7 +4229,7 @@ DeTor: Provably Avoiding Geographic Regions in Tor Cached download icon - + BibTeX download icon @@ -3921,7 +4257,7 @@ Mending Wall: On the Implementation of Censorship in India Cached download icon - + BibTeX download icon @@ -3949,7 +4285,7 @@ Online Advertising under Internet Censorship Cached download icon - + BibTeX download icon @@ -3977,7 +4313,7 @@ Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Cached download icon - + BibTeX download icon @@ -4005,7 +4341,7 @@ Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Cached download icon - + BibTeX download icon @@ -4033,7 +4369,7 @@ A Churn for the Better: Localizing Censorship using Network-level Path Churn and Cached download icon - + BibTeX download icon @@ -4061,7 +4397,7 @@ The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attac Cached download icon - + BibTeX download icon @@ -4089,7 +4425,7 @@ Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship Cached download icon - + BibTeX download icon @@ -4117,7 +4453,7 @@ lib·erate, (n): A library for exposing (traffic-classification) rules and avoid Cached download icon - + BibTeX download icon @@ -4145,7 +4481,7 @@ When the Internet Goes Down in Bangladesh Cached download icon - + BibTeX download icon @@ -4173,7 +4509,7 @@ Characterizing the Nature and Dynamics of Tor Exit Blocking Cached download icon - + BibTeX download icon @@ -4201,7 +4537,7 @@ Global Measurement of DNS Manipulation Cached download icon - + BibTeX download icon @@ -4229,7 +4565,7 @@ FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URL Cached download icon - + BibTeX download icon @@ -4257,7 +4593,7 @@ Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Cached download icon - + BibTeX download icon @@ -4285,7 +4621,7 @@ The Decline of Social Media Censorship and the Rise of Self-Censorship after the Cached download icon - + BibTeX download icon @@ -4314,7 +4650,7 @@ Autosonda: Discovering Rules and Triggers of Censorship Devices Cached download icon - + BibTeX download icon @@ -4342,7 +4678,7 @@ An ISP-Scale Deployment of TapDance Cached download icon - + BibTeX download icon @@ -4370,7 +4706,7 @@ DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Video Cached download icon - + BibTeX download icon @@ -4398,7 +4734,7 @@ Topics of Controversy: An Empirical Analysis of Web Censorship Lists Cached download icon - + BibTeX download icon @@ -4426,7 +4762,7 @@ A Usability Evaluation of Tor Launcher Cached download icon - + BibTeX download icon @@ -4454,7 +4790,7 @@ Augur: Internet-Wide Detection of Connectivity Disruptions Cached download icon - + BibTeX download icon @@ -4482,7 +4818,7 @@ Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers Cached download icon - + BibTeX download icon @@ -4510,7 +4846,7 @@ Internet Censorship in Thailand: User Practices and Potential Threats Cached download icon - + BibTeX download icon @@ -4538,7 +4874,7 @@ Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infras Cached download icon - + BibTeX download icon @@ -4568,7 +4904,7 @@ Fingerprintability of WebRTC Cached download icon - + BibTeX download icon @@ -4596,7 +4932,7 @@ Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses Cached download icon - + BibTeX download icon @@ -4625,7 +4961,7 @@ Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement Cached download icon - + BibTeX download icon @@ -4653,7 +4989,7 @@ Game of Decoys: Optimal Decoy Routing Through Game Theory Cached download icon - + BibTeX download icon @@ -4681,7 +5017,7 @@ Practical Censorship Evasion Leveraging Content Delivery Networks Cached download icon - + BibTeX download icon @@ -4709,7 +5045,7 @@ DNS-sly: Avoiding Censorship through Network Complexity Cached download icon - + BibTeX download icon @@ -4737,7 +5073,7 @@ Matryoshka: Hiding Secret Communication in Plain Sight Cached download icon - + BibTeX download icon @@ -4765,7 +5101,7 @@ GhostPost: Seamless Restoration of Censored Social Media Posts Cached download icon - + BibTeX download icon @@ -4793,7 +5129,7 @@ Censors’ Delay in Blocking Circumvention Proxies Cached download icon - + BibTeX download icon @@ -4821,7 +5157,7 @@ The Politics of Routing: Investigating the Relationship Between AS Connectivity Cached download icon - + BibTeX download icon @@ -4849,7 +5185,7 @@ A Framework for the Game-theoretic Analysis of Censorship Resistance Cached download icon - + BibTeX download icon @@ -4877,7 +5213,7 @@ SoK: Making Sense of Censorship Resistance Systems Cached download icon - + BibTeX download icon @@ -4906,7 +5242,7 @@ Salmon: Robust Proxy Distribution for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -4934,7 +5270,7 @@ Satellite: Joint Analysis of CDNs and Network-Level Interference Cached download icon - + BibTeX download icon @@ -4962,7 +5298,7 @@ Analyzing Internet Censorship in Pakistan Cached download icon - + BibTeX download icon @@ -4990,7 +5326,7 @@ Leveraging Internet Services to Evade Censorship Cached download icon - + BibTeX download icon @@ -5018,7 +5354,7 @@ Games Without Frontiers: Investigating Video Games as a Covert Channel Cached download icon - + BibTeX download icon @@ -5046,7 +5382,7 @@ Mailet: Instant Social Networking under Censorship Cached download icon - + BibTeX download icon @@ -5074,7 +5410,7 @@ CovertCast: Using Live Streaming to Evade Internet Censorship Cached download icon - + BibTeX download icon @@ -5102,7 +5438,7 @@ SkypeLine: Robust Hidden Data Transmission for VoIP Cached download icon - + BibTeX download icon @@ -5130,7 +5466,7 @@ Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regi Cached download icon - + BibTeX download icon @@ -5158,7 +5494,7 @@ SoK: Towards Grounding Censorship Circumvention in Empiricism Cached download icon - + BibTeX download icon @@ -5188,7 +5524,7 @@ Alibi Routing Cached download icon - + BibTeX download icon @@ -5216,7 +5552,7 @@ No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement Cached download icon - + BibTeX download icon @@ -5244,7 +5580,7 @@ Rebound: Decoy Routing on Asymmetric Routes Via Error Messages Cached download icon - + BibTeX download icon @@ -5272,7 +5608,7 @@ Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homopho Cached download icon - + BibTeX download icon @@ -5300,7 +5636,7 @@ A Case for Marrying Censorship Measurements with Circumvention Cached download icon - + BibTeX download icon @@ -5328,7 +5664,7 @@ Can Censorship Measurements Be Safe(r)? Cached download icon - + BibTeX download icon @@ -5356,7 +5692,7 @@ Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Pl Cached download icon - + BibTeX download icon @@ -5384,7 +5720,7 @@ Known Unknowns: An Analysis of Twitter Censorship in Turkey Cached download icon - + BibTeX download icon @@ -5413,7 +5749,7 @@ Examining How the Great Firewall Discovers Hidden Circumvention Servers Cached download icon - + BibTeX download icon @@ -5441,7 +5777,7 @@ CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content Cached download icon - + BibTeX download icon @@ -5469,7 +5805,7 @@ Seeing through Network-Protocol Obfuscation Cached download icon - + BibTeX download icon @@ -5497,7 +5833,7 @@ Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Cached download icon - + BibTeX download icon @@ -5525,7 +5861,7 @@ Understanding Internet Censorship Policy: The Case of Greece Cached download icon - + BibTeX download icon @@ -5553,7 +5889,7 @@ Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms Cached download icon - + BibTeX download icon @@ -5581,7 +5917,7 @@ An Analysis of China’s “Great Cannon” Cached download icon - + BibTeX download icon @@ -5609,7 +5945,7 @@ Marionette: A Programmable Network-Traffic Obfuscation System Cached download icon - + BibTeX download icon @@ -5637,7 +5973,7 @@ Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests Cached download icon - + BibTeX download icon @@ -5665,7 +6001,7 @@ Ethical Concerns for Censorship Measurement Cached download icon - + BibTeX download icon @@ -5693,7 +6029,7 @@ Analyzing the Great Firewall of China Over Space and Time Cached download icon - + BibTeX download icon @@ -5721,7 +6057,7 @@ Blocking-resistant communication through domain fronting Cached download icon - + BibTeX download icon @@ -5749,7 +6085,7 @@ Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Cached download icon - + BibTeX download icon @@ -5777,7 +6113,7 @@ Internet Censorship detection: A survey Cached download icon - + BibTeX download icon @@ -5805,7 +6141,7 @@ Monitoring Internet Censorship with UBICA Cached download icon - + BibTeX download icon @@ -5835,7 +6171,7 @@ GoHop: Personal VPN to Defend from Censorship Cached download icon - + BibTeX download icon @@ -5863,7 +6199,7 @@ Global Network Interference Detection over the RIPE Atlas Network Cached download icon - + BibTeX download icon @@ -5891,7 +6227,7 @@ Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship Cached download icon - + BibTeX download icon @@ -5919,7 +6255,7 @@ CloudTransport: Using Cloud Storage for Censorship-Resistant Networking Cached download icon - + BibTeX download icon @@ -5947,7 +6283,7 @@ Censorship in the Wild: Analyzing Internet Filtering in Syria Cached download icon - + BibTeX download icon @@ -5975,7 +6311,7 @@ TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography Cached download icon - + BibTeX download icon @@ -6003,7 +6339,7 @@ Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels Cached download icon - + BibTeX download icon @@ -6031,7 +6367,7 @@ No Direction Home: The True Cost of Routing Around Decoys Cached download icon - + BibTeX download icon @@ -6059,7 +6395,7 @@ Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Cached download icon - + BibTeX download icon @@ -6087,7 +6423,7 @@ Automated Detection and Fingerprinting of Censorship Block Pages Cached download icon - + BibTeX download icon @@ -6115,7 +6451,7 @@ A Look at the Consequences of Internet Censorship Through an ISP Lens Cached download icon - + BibTeX download icon @@ -6143,7 +6479,7 @@ Reverse-engineering censorship in China: Randomized experimentation and particip Cached download icon - + BibTeX download icon @@ -6171,7 +6507,7 @@ Facet: Streaming over Videoconferencing for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -6199,7 +6535,7 @@ LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Cached download icon - + BibTeX download icon @@ -6227,7 +6563,7 @@ Toward automatic censorship detection in microblogs Cached download icon - + BibTeX download icon @@ -6255,7 +6591,7 @@ VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance Cached download icon - + BibTeX download icon @@ -6283,7 +6619,7 @@ Measuring Freenet in the Wild: Censorship-resilience under Observation Cached download icon - + BibTeX download icon @@ -6311,7 +6647,7 @@ Censorship Resistance as a Side-Effect Cached download icon - + BibTeX download icon @@ -6339,7 +6675,7 @@ A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System Cached download icon - + BibTeX download icon @@ -6367,7 +6703,7 @@ TapDance: End-to-Middle Anticensorship without Flow Blocking Cached download icon - + BibTeX download icon @@ -6397,7 +6733,7 @@ Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorshi Cached download icon - + BibTeX download icon @@ -6425,7 +6761,7 @@ Self-Censorship on Facebook Cached download icon - + BibTeX download icon @@ -6453,7 +6789,7 @@ Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran Cached download icon - + BibTeX download icon @@ -6482,7 +6818,7 @@ Internet Censorship in Iran: A First Look Cached download icon - + BibTeX download icon @@ -6510,7 +6846,7 @@ Gaining Insight into AS-level Outages through Analysis of Internet Background Ra Cached download icon - + BibTeX download icon @@ -6538,7 +6874,7 @@ Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on S Cached download icon - + BibTeX download icon @@ -6566,7 +6902,7 @@ A Method for Identifying and Confirming the Use of URL Filtering Products for Ce Cached download icon - + BibTeX download icon @@ -6594,7 +6930,7 @@ Revealing Middlebox Interference with Tracebox Cached download icon - + BibTeX download icon @@ -6622,7 +6958,7 @@ Protocol Misidentification Made Easy with Format-Transforming Encryption Cached download icon - + BibTeX download icon @@ -6650,7 +6986,7 @@ OSS: Using Online Scanning Services for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -6678,7 +7014,7 @@ Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention Cached download icon - + BibTeX download icon @@ -6706,7 +7042,7 @@ Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Cached download icon - + BibTeX download icon @@ -6734,7 +7070,7 @@ I want my voice to be heard: IP over Voice-over-IP for unobservable censorship c Cached download icon - + BibTeX download icon @@ -6763,7 +7099,7 @@ The Parrot is Dead: Observing Unobservable Network Communications Cached download icon - + BibTeX download icon @@ -6791,7 +7127,7 @@ Message In A Bottle: Sailing Past Censorship Cached download icon - + BibTeX download icon @@ -6819,7 +7155,7 @@ Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Cached download icon - + BibTeX download icon @@ -6847,7 +7183,7 @@ The Anatomy of Web Censorship in Pakistan Cached download icon - + BibTeX download icon @@ -6875,7 +7211,7 @@ Identity-Based Steganography and Its Applications to Censorship Resistance Cached download icon - + BibTeX download icon @@ -6903,7 +7239,7 @@ Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest Cached download icon - + BibTeX download icon @@ -6931,7 +7267,7 @@ On the Feasibility of a Censorship Resistant Decentralized Name System Cached download icon - + BibTeX download icon @@ -6959,7 +7295,7 @@ rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Cached download icon - + BibTeX download icon @@ -6987,7 +7323,7 @@ Towards a Censorship Analyser for Tor Cached download icon - + BibTeX download icon @@ -7015,7 +7351,7 @@ ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship Cached download icon - + BibTeX download icon @@ -7043,7 +7379,7 @@ SWEET: Serving the Web by Exploiting Email Tunnels Cached download icon - + BibTeX download icon @@ -7071,7 +7407,7 @@ The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Cached download icon - + BibTeX download icon @@ -7101,7 +7437,7 @@ Technical analysis of the Ultrasurf proxying software Cached download icon - + BibTeX download icon @@ -7129,7 +7465,7 @@ Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resource Cached download icon - + BibTeX download icon @@ -7157,7 +7493,7 @@ The Hidden Internet of Iran: Private Address Allocations on a National Network Cached download icon - + BibTeX download icon @@ -7185,7 +7521,7 @@ The Collateral Damage of Internet Censorship by DNS Injection Cached download icon - + BibTeX download icon @@ -7213,7 +7549,7 @@ Hold-On: Protecting Against On-Path DNS Poisoning Cached download icon - + BibTeX download icon @@ -7241,7 +7577,7 @@ Evading Censorship with Browser-Based Proxies Cached download icon - + BibTeX download icon @@ -7269,7 +7605,7 @@ OONI: Open Observatory of Network Interference Cached download icon - + BibTeX download icon @@ -7297,7 +7633,7 @@ How Censorship in China Allows Government Criticism but Silences Collective Expr Cached download icon - + BibTeX download icon @@ -7325,7 +7661,7 @@ Bootstrapping Communications into an Anti-Censorship System Cached download icon - + BibTeX download icon @@ -7353,7 +7689,7 @@ Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery Cached download icon - + BibTeX download icon @@ -7381,7 +7717,7 @@ SkypeMorph: Protocol Obfuscation for Tor Bridges Cached download icon - + BibTeX download icon @@ -7409,7 +7745,7 @@ Secure Communication over Diverse Transports Cached download icon - + BibTeX download icon @@ -7437,7 +7773,7 @@ Routing Around Decoys Cached download icon - + BibTeX download icon @@ -7465,7 +7801,7 @@ Adapting Social Spam Infrastructure for Political Censorship Cached download icon - + BibTeX download icon @@ -7493,7 +7829,7 @@ One-way indexing for plausible deniability in censorship resistant storage Cached download icon - + BibTeX download icon @@ -7521,7 +7857,7 @@ Inferring Mechanics of Web Censorship Around the World Cached download icon - + BibTeX download icon @@ -7549,7 +7885,7 @@ CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resista Cached download icon - + BibTeX download icon @@ -7577,7 +7913,7 @@ StegoTorus: A Camouflage Proxy for the Tor Anonymity System Cached download icon - + BibTeX download icon @@ -7605,7 +7941,7 @@ How the Great Firewall of China is Blocking Tor Cached download icon - + BibTeX download icon @@ -7633,7 +7969,7 @@ Regional Variation in Chinese Internet Filtering Cached download icon - + BibTeX download icon @@ -7663,7 +7999,7 @@ BridgeSPA: Improving Tor Bridges with Single Packet Authorization Cached download icon - + BibTeX download icon @@ -7691,7 +8027,7 @@ Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing Cached download icon - + BibTeX download icon @@ -7719,7 +8055,7 @@ In Proc. of: Free and Open Communications on the Internet Cached download icon - + BibTeX download icon @@ -7747,7 +8083,7 @@ Scrambling for lightweight censorship resistance Cached download icon - + BibTeX download icon @@ -7775,7 +8111,7 @@ Analysis of Country-wide Internet Outages Caused by Censorship Cached download icon - + BibTeX download icon @@ -7803,7 +8139,7 @@ An anomaly-based censorship-detection system for Tor Cached download icon - + BibTeX download icon @@ -7831,7 +8167,7 @@ Automated Named Entity Extraction for Tracking Censorship of Current Events Cached download icon - + BibTeX download icon @@ -7859,7 +8195,7 @@ Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Cached download icon - + BibTeX download icon @@ -7887,7 +8223,7 @@ Decoy Routing: Toward Unblockable Internet Communication Cached download icon - + BibTeX download icon @@ -7915,7 +8251,7 @@ Bypassing Internet Censorship for News Broadcasters Cached download icon - + BibTeX download icon @@ -7943,7 +8279,7 @@ Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorsh Cached download icon - + BibTeX download icon @@ -7971,7 +8307,7 @@ Tor Instead of IP Cached download icon - + BibTeX download icon @@ -7999,7 +8335,7 @@ Proximax: A Measurement Based System for Proxies Dissemination Cached download icon - + BibTeX download icon @@ -8027,7 +8363,7 @@ Mapping Local Internet Control Cached download icon - + BibTeX download icon @@ -8055,7 +8391,7 @@ Infrastructures of Censorship and Lessons from Copyright Resistance Cached download icon - + BibTeX download icon @@ -8083,7 +8419,7 @@ CensMon: A Web Censorship Monitor Cached download icon - + BibTeX download icon @@ -8111,7 +8447,7 @@ Online Contribution Practices in Countries that Engage in Internet Blocking and Cached download icon - + BibTeX download icon @@ -8139,7 +8475,7 @@ Dust: A Blocking-Resistant Internet Transport Protocol Cached download icon - + BibTeX download icon @@ -8167,7 +8503,7 @@ Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics Cached download icon - + BibTeX download icon @@ -8195,7 +8531,7 @@ Telex: Anticensorship in the Network Infrastructure Cached download icon - + BibTeX download icon @@ -8223,7 +8559,7 @@ Internet Censorship in China: Where Does the Filtering Occur? Cached download icon - + BibTeX download icon @@ -8253,7 +8589,7 @@ A terminology for talking about privacy by data minimization: Anonymity, Unlinka Cached download icon - + BibTeX download icon @@ -8281,7 +8617,7 @@ Chipping Away at Censorship Firewalls with User-Generated Content Cached download icon - + BibTeX download icon @@ -8309,7 +8645,7 @@ Fighting Censorship with Algorithms Cached download icon - + BibTeX download icon @@ -8337,7 +8673,7 @@ Empirical Study of a National-Scale Distributed Intrusion Detection System: Back Cached download icon - + BibTeX download icon @@ -8367,7 +8703,7 @@ On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking r Cached download icon - + BibTeX download icon @@ -8395,7 +8731,7 @@ Anonymity and Censorship Resistance in Unstructured Overlay Networks Cached download icon - + BibTeX download icon @@ -8423,7 +8759,7 @@ SkyF2F: Censorship Resistant via Skype Overlay Network Cached download icon - + BibTeX download icon @@ -8451,7 +8787,7 @@ Detecting Forged TCP Reset Packets Cached download icon - + BibTeX download icon @@ -8481,7 +8817,7 @@ In Proc. of: Network and Distributed System Security, Cached download icon - + BibTeX download icon @@ -8509,7 +8845,7 @@ Pass it on: Social Networks Stymie Censors Cached download icon - + BibTeX download icon @@ -8539,7 +8875,7 @@ ConceptDoppler: A Weather Tracker for Internet Censorship Cached download icon - + BibTeX download icon @@ -8567,7 +8903,7 @@ The Great DNS Wall of China Cached download icon - + BibTeX download icon @@ -8597,7 +8933,7 @@ Investigating large-scale Internet content filtering Cached download icon - + BibTeX download icon @@ -8625,7 +8961,7 @@ Ignoring the Great Firewall of China Cached download icon - + BibTeX download icon @@ -8653,7 +8989,7 @@ Failures in a Hybrid Content Blocking System Cached download icon - + BibTeX download icon @@ -8681,7 +9017,7 @@ Design of a blocking-resistant anonymity system Cached download icon - + BibTeX download icon @@ -8711,7 +9047,7 @@ Censorship Resistance Revisited Cached download icon - + BibTeX download icon @@ -8741,7 +9077,7 @@ The Economics of Censorship Resistance Cached download icon - + BibTeX download icon @@ -8769,7 +9105,7 @@ How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web S Cached download icon - + BibTeX download icon @@ -8799,7 +9135,7 @@ Government mandated blocking of foreign Web content Cached download icon - + BibTeX download icon @@ -8827,7 +9163,7 @@ Thwarting Web Censorship with Untrusted Messenger Discovery Cached download icon - + BibTeX download icon @@ -8857,7 +9193,7 @@ Infranet: Circumventing Web Censorship and Surveillance Cached download icon - + BibTeX download icon @@ -8885,7 +9221,7 @@ Anonymizing Censorship Resistant Systems Cached download icon - + BibTeX download icon @@ -8915,7 +9251,7 @@ Dagster: Censorship-Resistant Publishing Without Replication Cached download icon - + BibTeX download icon @@ -8943,7 +9279,7 @@ Tangler: A Censorship-Resistant Publishing System Based On Document Entanglement Cached download icon - + BibTeX download icon @@ -8973,7 +9309,7 @@ Publius: A robust, tamper-evident, censorship-resistant web publishing system Cached download icon - + BibTeX download icon @@ -9003,7 +9339,7 @@ The Eternity Service Cached download icon - + BibTeX download icon