diff --git a/index.html b/index.html
new file mode 100644
index 0000000..286c83d
--- /dev/null
+++ b/index.html
@@ -0,0 +1,8566 @@
+
+
+
+
+
+ -
+
+
+Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sultan Almutairi, Yogev Neumann, Khaled Harfoush
+
+
+
+In Proc. of: Consumer Communications & Networking Conference, 2024, IEEE
+
+ -
+
+
+Modeling and Detecting Internet Censorship Events
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi
+
+
+
+In Proc. of: Network and Distributed System Security, 2024, The Internet Society
+
+ -
+
+
+Internet Sanctions on Russian Media: Actions and Effects
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+John Kristoff, Moritz Müller, Arturo Filastò, Max Resing, Chris Kanich, Niels ten Oever
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2024
+
+ -
+
+
+Bleeding Wall: A Hematologic Examination on the Great Firewall
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sakamoto, Elson Wedwards
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2024
+
+ -
+
+
+Just add WATER: WebAssembly-based Circumvention Transports
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Erik Chi, Gaukas Wang, J. Alex Halderman, Eric Wustrow, Jack Wampler
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2024
+
+ -
+
+
+Extended Abstract: Traffic Splitting for Pluggable Transports
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Anna Harbluk Lorimer, Rob Jansen, Nick Feamster
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2024
+
+ -
+
+
+Extended Abstract: Oscur0: One-shot Circumvention without Registration
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Mingye Chen, Jack Wampler, Abdulrahman Alaraj, Gaukas Wang, Eric Wustrow
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2024
+
+ -
+
+
+Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi
+
+
+
+In Proc. of: USENIX Security Symposium, 2024, USENIX
+
+ -
+
+
+NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich
+
+
+
+In Proc. of: Symposium on Security & Privacy, 2024, IEEE
+
+ -
+
+
+On Precisely Detecting Censorship Circumvention in Real-World Networks
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen
+
+
+
+In Proc. of: Network and Distributed System Security, 2024, The Internet Society
+
+
-
+
+
+Website blocking in the European Union: Network interference from the perspective of Open Internet
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vasilis Ververis, Lucas Lasota, Tatiana Ermakova, Benjamin Fabian
+
+
+
+In: Policy & Internet, 2023
+
+ -
+
+
+Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+David Fifield
+
+
+
+2023
+
+ -
+
+
+Destination Unreachable: Characterizing Internet Outages and Shutdowns
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zachary S. Bischof, Kennedy Pitcher, Esteban Carisimo, Amanda Meng, Rafael Bezerra Nunes, Ramakrishna Padmanabhan, Margaret E. Roberts, Alex C. Snoeren, Alberto Dainotti
+
+
+
+In Proc. of: SIGCOMM, 2023, ACM
+
+ -
+
+
+Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran
+
+
+
+In Proc. of: Knowledge Discovery And Data Mining, 2023, ACM
+
+ -
+
+
+A Study of China’s Censorship and Its Evasion Through the Lens of Online Gaming
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar
+
+
+
+In Proc. of: USENIX Security Symposium, 2023, USENIX
+
+ -
+
+
+DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang
+
+
+
+In Proc. of: USENIX Security Symposium, 2023, USENIX
+
+ -
+
+
+TELEPATH: A Minecraft-based Covert Communication System
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zhen Sun, Vitaly Shmatikov
+
+
+
+In Proc. of: Symposium on Security & Privacy, 2023, IEEE
+
+ -
+
+
+A Worldwide View of Nation-state Internet Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Alexander Master, Christina Garman
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+The Use of Push Notification in Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Diwen Xue, Roya Ensafi
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Measuring and Evading Turkmenistan’s Internet Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin
+
+
+
+In Proc. of: The International World Wide Web Conference, 2023, ACM
+
+ -
+
+
+Detecting Network Interference Without Endpoint Participation
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sadia Nourin, Kevin Bock, Nguyen Phong Hoang, Dave Levin
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Running a high-performance pluggable transports Tor bridge
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+David Fifield, Linus Nordberg
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Towards a Comprehensive Understanding of Russian Transit Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Aaron Ortwein, Kevin Bock, Dave Levin
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Proteus: Programmable Protocols for Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ryan Wails, Rob Jansen, Aaron Johnson, Micah Sherr
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Watson Jia, Joseph Eichenhofer, Liang Wang, Prateek Mittal
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Nhi Tran, Kevin Bock, Dave Levin
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi
+
+
+
+In Proc. of: USENIX Security Symposium, 2023, USENIX
+
+ -
+
+
+How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
+
+
+
+In Proc. of: USENIX Security Symposium, 2023, USENIX
+
+ -
+
+
+Lox: Protecting the Social Graph in Bridge Distribution
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Lindsey Tulloch, Ian Goldberg
+
+
+
+In: Privacy Enhancing Technologies, 2023
+
+ -
+
+
+Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty
+
+
+
+In: Privacy Enhancing Technologies, 2023
+
+ -
+
+
+CensorWatch: On the Implementation of Online Censorship in India
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Divyank Katira, Gurshabad Grover, Kushagra Singh, Varun Bansal
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Chasing Shadows: A security analysis of the ShadowTLS proxy
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gaukas Wang, Anonymous, Jackson Sippe, Hai Chi, Eric Wustrow
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Security Notions for Fully Encrypted Protocols
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ellis Fenske, Aaron Johnson
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+ -
+
+
+Advancing the Art of Censorship Data Analysis
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ram Sundara Raman, Apurva Virkud, Sarah Laplante, Vinicius Fortuna, Roya Ensafi
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2023
+
+
-
+
+
+Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Asim Waheed, Sara Qunaibi, Diogo Barradas, Zachary Weinberg
+
+
+
+In Proc. of: Workshop on Privacy in the Electronic Society, 2022, ACM
+
+ -
+
+
+Network Measurement Methods for Locating and Examining Censorship Devices
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan Mayer, Roya Ensafi
+
+
+
+In Proc. of: Emerging Networking Experiments and Technologies, 2022, ACM
+
+ -
+
+
+TSPU: Russia’s Decentralized Censorship System
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi
+
+
+
+In Proc. of: Internet Measurement Conference, 2022, ACM
+
+ -
+
+
+Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Abhishek Bhaskar, Paul Pearce
+
+
+
+In Proc. of: USENIX Security Symposium, 2022, USENIX
+
+ -
+
+
+GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin
+
+
+
+In Proc. of: USENIX Security Symposium, 2022, USENIX
+
+ -
+
+
+OpenVPN is Open to VPN Fingerprinting
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
+
+
+
+In Proc. of: USENIX Security Symposium, 2022, USENIX
+
+ -
+
+
+Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gabriel Figueira, Diogo Barradas, Nuno Santos
+
+
+
+In Proc. of: Asia CCS, 2022, ACM
+
+ -
+
+
+COVID-19 increased censorship circumvention and access to sensitive topics in China
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Keng-Chi Chang, William R. Hobbs, Margaret E. Roberts, Zachary C. Steinert-Threlkeld
+
+
+
+In: PNAS, 2022, National Academy of Sciences
+
+ -
+
+
+Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Nguyen Phong Hoang, Michalis Polychronakis, Phillipa Gill
+
+
+
+In Proc. of: Passive and Active Measurement Conference, 2022, Springer
+
+
-
+
+
+Understanding Internet Censorship in Europe: The Case of Spain
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vasilis Ververis, Tatiana Ermakova, Marios Isaakidis, Simone Basso, Benjamin Fabian, Stefania Milan
+
+
+
+In Proc. of: Web Science Conference, 2021, ACM
+
+ -
+
+
+OUStralopithecus: Overt User Simulation for Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg
+
+
+
+In Proc. of: Workshop on Privacy in the Electronic Society, 2021, ACM
+
+ -
+
+
+Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty
+
+
+
+In Proc. of: Asia CCS, 2021, ACM
+
+ -
+
+
+Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Raymond Rambert, Zachary Weinberg, Diogo Barradas, Nicolas Christin
+
+
+
+In Proc. of: WWW, 2021, ACM
+
+ -
+
+
+Meteor: Cryptographically Secure Steganography for Realistic Distributions
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin
+
+
+
+In Proc. of: Computer and Communications Security, 2021, ACM
+
+ -
+
+
+Throttling Twitter: an emerging censorship technique in Russia
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Diwen Xue, Reethika Ramesh, ValdikSS, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi
+
+
+
+In Proc. of: Internet Measurement Conference, 2021, ACM
+
+ -
+
+
+Web censorship measurements of HTTP/3 over QUIC
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kathrin Elmenhorst, Bertram Schütz, Nils Aschenbruck, Simone Basso
+
+
+
+In Proc. of: Internet Measurement Conference, 2021, ACM
+
+ -
+
+
+Measuring DoT/DoH blocking using OONI Probe: a preliminary study
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Simone Basso
+
+
+
+In Proc. of: DNS Privacy Workshop, 2021, The Internet Society
+
+ -
+
+
+A multi-perspective view of Internet censorship in Myanmar
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ramakrishna Padmanabhan, and Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Doug Madory, Molly Roberts, Alberto Dainotti
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2021, ACM
+
+ -
+
+
+Measuring QQMail’s Automated Email Censorship in China
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jeffrey Knockel, Lotus Ruan
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2021, ACM
+
+ -
+
+
+Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Carmen Kwan, Paul Janiszewski, Shela Qiu, Cathy Wang, Cecylia Bocovich
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2021, ACM
+
+ -
+
+
+Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2021, ACM
+
+ -
+
+
+BlindTLS: Circumventing TLS-Based HTTPS Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sambhav Satija, Rahul Chatterjee
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2021, ACM
+
+ -
+
+
+Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Mingkui Wei
+
+
+
+In Proc. of: USENIX Security Symposium, 2021, USENIX
+
+ -
+
+
+Weaponizing Middleboxes for TCP Reflected Amplification
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
+
+
+
+In Proc. of: USENIX Security Symposium, 2021, USENIX
+
+ -
+
+
+How Great is the Great Firewall? Measuring China’s DNS Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis
+
+
+
+In Proc. of: USENIX Security Symposium, 2021, USENIX
+
+ -
+
+
+Balboa: Bobbing and Weaving around Network Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Marc B. Rosen, James Parker, Alex J. Malozemoff
+
+
+
+In Proc. of: USENIX Security Symposium, 2021, USENIX
+
+ -
+
+
+Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin
+
+
+
+In Proc. of: Workshop on Offensive Technologies, 2021, IEEE
+
+ -
+
+
+Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty
+
+
+
+In: Privacy Enhancing Technologies, 2021, Sciendo
+
+
-
+
+
+Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Diogo Barradas, Nuno Santos
+
+
+
+In Proc. of: Distributed Infrastructure for Common Good, 2020, ACM
+
+ -
+
+
+Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Diogo Barradas, Nuno Santos, Luís Rodrigues, Vítor Nunes
+
+
+
+In Proc. of: Computer and Communications Security, 2020, ACM
+
+ -
+
+
+Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi
+
+
+
+In Proc. of: Computer and Communications Security, 2020, ACM
+
+ -
+
+
+How China Detects and Blocks Shadowsocks
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr
+
+
+
+In Proc. of: Internet Measurement Conference, 2020, ACM
+
+ -
+
+
+Investigating Large Scale HTTPS Interception in Kazakhstan
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi
+
+
+
+In Proc. of: Internet Measurement Conference, 2020, ACM
+
+ -
+
+
+Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin
+
+
+
+In Proc. of: SIGCOMM, 2020, ACM
+
+ -
+
+
+MIMIQ: Masking IPs with Migration in QUIC
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Yashodhar Govil, Liang Wang, Jennifer Rexford
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
+
+ -
+
+
+Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
+
+ -
+
+
+Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
+
+ -
+
+
+Slitheen++: Stealth TLS-based Decoy Routing
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Benedikt Birtel, Christian Rossow
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
+
+ -
+
+
+Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
+
+ -
+
+
+Turbo Tunnel, a good way to design censorship circumvention protocols
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+David Fifield
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
+
+ -
+
+
+HTTPT: A Probe-Resistant Proxy
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sergey Frolov, Eric Wustrow
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
+
+ -
+
+
+How India Censors the Web
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kushagra Singh, Gurshabad Grover, Varun Bansal
+
+
+
+In Proc. of: Web Science, 2020, ACM
+
+ -
+
+
+Characterizing Transnational Internet Performance and the Great Bottleneck of China
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Haixin Duan
+
+
+
+In: Measurement and Analysis of Computing Systems, 2020, ACM
+
+ -
+
+
+SiegeBreaker: An SDN Based Practical Decoy Routing System
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, H. B. Acharya, Sambuddho Chakravarty
+
+
+
+In: Privacy Enhancing Technologies, 2020, Sciendo
+
+ -
+
+
+Running Refraction Networking for Real
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow
+
+
+
+In: Privacy Enhancing Technologies, 2020, Sciendo
+
+ -
+
+
+MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
+
+
+
+In: Privacy Enhancing Technologies, 2020, Sciendo
+
+ -
+
+
+ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill
+
+
+
+In Proc. of: Symposium on Security & Privacy, 2020, IEEE
+
+ -
+
+
+SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun
+
+
+
+In Proc. of: Network and Distributed System Security, 2020, The Internet Society
+
+ -
+
+
+MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari
+
+
+
+In Proc. of: Network and Distributed System Security, 2020, The Internet Society
+
+ -
+
+
+Detecting Probe-resistant Proxies
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sergey Frolov, Jack Wampler, Eric Wustrow
+
+
+
+In Proc. of: Network and Distributed System Security, 2020, The Internet Society
+
+ -
+
+
+Measuring the Deployment of Network Censorship Filters at Global Scale
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi
+
+
+
+In Proc. of: Network and Distributed System Security, 2020, The Internet Society
+
+ -
+
+
+Decentralized Control: A Case Study of Russia
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi
+
+
+
+In Proc. of: Network and Distributed System Security, 2020, The Internet Society
+
+ -
+
+
+Protocol Proxy: An FTE-based covert channel
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard Brooks
+
+
+
+In: Computers & Security, 2020, Elsevier
+
+
-
+
+
+Conjure: Summoning Proxies from Unused Address Space
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow
+
+
+
+In Proc. of: Computer and Communications Security, 2019, ACM
+
+ -
+
+
+Geneva: Evolving Censorship Evasion Strategies
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kevin Bock, George Hughey, Xiao Qiang, Dave Levin
+
+
+
+In Proc. of: Computer and Communications Security, 2019, ACM
+
+ -
+
+
+Distributed Detection of Tor Directory Authorities Censorship in Mexico
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gunnar Eyal Wolf Iszaevich
+
+
+
+In Proc. of: International Conference on Networks, 2019, IARIA
+
+ -
+
+
+Shedding Light on Mobile App Store Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vasilis Ververis, Marios Isaakidis, Valentin Weber, Benjamin Fabian
+
+
+
+In Proc. of: User Modeling, Adaptation and Personalization, 2019, ACM
+
+ -
+
+
+Improving Meek With Adversarial Techniques
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Steven R. Sheffey, Ferrol Aderholdt
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
+
+ -
+
+
+On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zimo Chai, Amirhossein Ghafari, Amir Houmansadr
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
+
+ -
+
+
+An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ruohan Xiong, Jeffrey Knockel
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
+
+ -
+
+
+Measuring I2P Censorship at a Global Scale
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
+
+ -
+
+
+Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags
+
+
+
+In Proc. of: Network and Distributed System Security, 2019, The Internet Society
+
+ -
+
+
+The use of TLS in Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sergey Frolov, Eric Wustrow
+
+
+
+In Proc. of: Network and Distributed System Security, 2019, The Internet Society
+
+
-
+
+
+On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Joss Wright, Alexander Darer, Oliver Farnan
+
+
+
+In Proc. of: Web Science, 2018, ACM
+
+ -
+
+
+Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty
+
+
+
+In Proc. of: Internet Measurement Conference, 2018, ACM
+
+ -
+
+
+403 Forbidden: A Global View of CDN Geoblocking
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi
+
+
+
+In Proc. of: Internet Measurement Conference, 2018, ACM
+
+ -
+
+
+An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis
+
+
+
+In Proc. of: Internet Measurement Conference, 2018, ACM
+
+ -
+
+
+Secure asymmetry and deployability for decoy routing systems
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cecylia Bocovich, Ian Goldberg
+
+
+
+In: Privacy Enhancing Technologies, 2018, De Gruyter Open
+
+ -
+
+
+Effective Detection of Multimedia Protocol Tunneling using Machine Learning
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Diogo Barradas, Nuno Santos, Luís Rodrigues
+
+
+
+In Proc. of: USENIX Security Symposium, 2018, USENIX
+
+ -
+
+
+Quack: Scalable Remote Measurement of Application-Layer Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
+
+
+
+In Proc. of: USENIX Security Symposium, 2018, USENIX
+
+ -
+
+
+Incentivizing Censorship Measurements via Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Aqib Nisar, Aqsa Kashaf, Ihsan Ayyub Qazi, Zartash Afzal Uzmi
+
+
+
+In Proc. of: SIGCOMM, 2018, ACM
+
+ -
+
+
+Analyzing China’s Blocking of Unpublished Tor Bridges
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Arun Dunna, Ciarán O’Brien, Phillipa Gill
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
+
+ -
+
+
+MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Victoria Manfredi, Pi Songkuntham
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
+
+ -
+
+
+An analysis of automatic image filtering on WeChat Moments
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
+
+ -
+
+
+A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
+
+ -
+
+
+Automatically Generating a Large, Culture-Specific Blocklist for China
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Austin Hounsel, Prateek Mittal, Nick Feamster
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
+
+ -
+
+
+How Sudden Censorship Can Increase Access to Information
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+William R. Hobbs, Margaret E. Roberts
+
+
+
+In: American Political Science Review, 2018, Cambridge University Press
+
+ -
+
+
+Detecting Censorable Content on Sina Weibo: A Pilot Study
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kei Yin Ng, Anna Feldman, Chris Leberknight
+
+
+
+In Proc. of: Hellenic Conference on Artificial Intelligence, 2018, ACM
+
+ -
+
+
+Proof-of-Censorship: Enabling centralized censorship-resistant content providers
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ian Martiny, Ian Miers, Eric Wustrow
+
+
+
+In Proc. of: Financial Cryptography and Data Security, 2018, Springer
+
+
-
+
+
+The Devil’s in The Details: Placing Decoy Routers in the Internet
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, H. B. Acharya
+
+
+
+In Proc. of: ACSAC, 2017, ACM
+
+ -
+
+
+Lavinia: An audit-payment protocol for censorship-resistant storage
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cecylia Bocovich, John A. Doucette, Ian Goldberg
+
+
+
+In Proc. of: Financial Cryptography and Data Security, 2017, Springer
+
+ -
+
+
+The Random Forest based Detection of Shadowsock’s Traffic
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ziye Deng, Zihan Liu, Zhouguo Chen, Yubin Guo
+
+
+
+In Proc. of: Intelligent Human-Machine Systems and Cybernetics, 2017, IEEE
+
+ -
+
+
+DeTor: Provably Avoiding Geographic Regions in Tor
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zhihao Li, Stephen Herwig, Dave Levin
+
+
+
+In Proc. of: USENIX Security Symposium, 2017, USENIX
+
+ -
+
+
+Mending Wall: On the Implementation of Censorship in India
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty
+
+
+
+In Proc. of: SecureComm, 2017, Springer
+
+ -
+
+
+Online Advertising under Internet Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hira Javaid, Hafiz Kamran Khalil, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
+
+
+
+In Proc. of: Hot Topics in Networks, 2017, ACM
+
+ -
+
+
+Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Blocklisting
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vasilis Ververis, Marios Isaakidis, Chrystalleni Loizidou, Benjamin Fabian
+
+
+
+In Proc. of: E-Democracy, 2017, Springer
+
+ -
+
+
+Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zhen Lu, Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson
+
+
+
+In Proc. of: Middleware, 2017, ACM
+
+ -
+
+
+A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill
+
+
+
+In Proc. of: Emerging Networking Experiments and Technologies, 2017, ACM
+
+ -
+
+
+The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Milad Nasr, Hadi Zolfaghari, Amir Houmansadr
+
+
+
+In Proc. of: Computer and Communications Security, 2017, ACM
+
+ -
+
+
+Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy
+
+
+
+In Proc. of: Internet Measurement Conference, 2017, ACM
+
+ -
+
+
+lib·erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David Choffnes, Phillipa Gill, Alan Mislove
+
+
+
+In Proc. of: Internet Measurement Conference, 2017, ACM
+
+ -
+
+
+When the Internet Goes Down in Bangladesh
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, Neha Kumar
+
+
+
+In Proc. of: Computer-Supported Cooperative Work and Social Computing, 2017, ACM
+
+ -
+
+
+Characterizing the Nature and Dynamics of Tor Exit Blocking
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
+
+
+
+In Proc. of: USENIX Security Symposium, 2017, USENIX
+
+ -
+
+
+Global Measurement of DNS Manipulation
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
+
+
+
+In Proc. of: USENIX Security Symposium, 2017, USENIX
+
+ -
+
+
+FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Alexander Darer, Oliver Farnan, Joss Wright
+
+
+
+In Proc. of: Network Traffic Measurement and Analysis, 2017, IFIP
+
+ -
+
+
+Measuring Decentralization of Chinese Keyword Censorship via Mobile Games
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
+
+ -
+
+
+The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
+
+ -
+
+
+Autosonda: Discovering Rules and Triggers of Censorship Devices
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jill Jermyn, Nicholas Weaver
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
+
+ -
+
+
+An ISP-Scale Deployment of TapDance
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
+
+ -
+
+
+DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Diogo Barradas, Nuno Santos, Luís Rodrigues
+
+
+
+In: Privacy Enhancing Technologies, 2017, De Gruyter Open
+
+ -
+
+
+Topics of Controversy: An Empirical Analysis of Web Censorship Lists
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin
+
+
+
+In: Privacy Enhancing Technologies, 2017, De Gruyter Open
+
+ -
+
+
+A Usability Evaluation of Tor Launcher
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Linda Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David Wagner
+
+
+
+In: Privacy Enhancing Technologies, 2017, De Gruyter Open
+
+ -
+
+
+Augur: Internet-Wide Detection of Connectivity Disruptions
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson
+
+
+
+In Proc. of: Symposium on Security & Privacy, 2017, IEEE
+
+ -
+
+
+Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vahid Heydari, Sun-il Kim, Seong-Moo Yoo
+
+
+
+In: Transactions on Information Forensics and Security, 2017, IEEE
+
+ -
+
+
+Internet Censorship in Thailand: User Practices and Potential Threats
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Genevieve Gebhart, Anonymous Author, Tadayoshi Kohno
+
+
+
+In Proc. of: European Symposium on Security & Privacy, 2017, IEEE
+
+ -
+
+
+Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Srdjan Matic, Carmela Troncoso, Juan Caballero
+
+
+
+In Proc. of: Network and Distributed System Security, 2017, The Internet Society
+
+
-
+
+
+Fingerprintability of WebRTC
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+David Fifield, Mia Gil Epner
+
+
+
+2016
+
+ -
+
+
+Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Oliver Farnan, Alexander Darer, Joss Wright
+
+
+
+In Proc. of: Workshop on Privacy in the Electronic Society, 2016, ACM
+
+ -
+
+
+Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cecylia Bocovich, Ian Goldberg
+
+
+
+In Proc. of: Computer and Communications Security, 2016, ACM
+
+ -
+
+
+Game of Decoys: Optimal Decoy Routing Through Game Theory
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Milad Nasr, Amir Houmansadr
+
+
+
+In Proc. of: Computer and Communications Security, 2016, ACM
+
+ -
+
+
+Practical Censorship Evasion Leveraging Content Delivery Networks
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hadi Zolfaghari, Amir Houmansadr
+
+
+
+In Proc. of: Computer and Communications Security, 2016, ACM
+
+ -
+
+
+DNS-sly: Avoiding Censorship through Network Complexity
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Qurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
+
+ -
+
+
+Matryoshka: Hiding Secret Communication in Plain Sight
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Iris Safaka, Christina Fragouli, Katerina Argyraki
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
+
+ -
+
+
+GhostPost: Seamless Restoration of Censored Social Media Posts
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Frederick Douglas, Matthew Caesar
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
+
+ -
+
+
+Censors’ Delay in Blocking Circumvention Proxies
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+David Fifield, Lynn Tsai
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
+
+ -
+
+
+The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
+
+ -
+
+
+A Framework for the Game-theoretic Analysis of Censorship Resistance
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg
+
+
+
+In: Privacy Enhancing Technologies, 2016, De Gruyter Open
+
+ -
+
+
+SoK: Making Sense of Censorship Resistance Systems
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg
+
+
+
+In: Privacy Enhancing Technologies, 2016, De Gruyter Open
+
+ -
+
+
+Salmon: Robust Proxy Distribution for Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar
+
+
+
+In: Privacy Enhancing Technologies, 2016, De Gruyter Open
+
+ -
+
+
+Satellite: Joint Analysis of CDNs and Network-Level Interference
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Will Scott, Thomas Anderson, Tadayoshi Kohno, Arvind Krishnamurthy
+
+
+
+In Proc. of: USENIX Annual Technical Conference, 2016, USENIX
+
+ -
+
+
+Analyzing Internet Censorship in Pakistan
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Giuseppe Aceto, Alessio Botta, Antonio Pescapè, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
+
+
+
+In Proc. of: Research and Technologies for Society and Industry, 2016, IEEE
+
+ -
+
+
+Leveraging Internet Services to Evade Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Apostolis Zarras
+
+
+
+In Proc. of: Information Security Conference, 2016, Springer
+
+ -
+
+
+Games Without Frontiers: Investigating Video Games as a Covert Channel
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
+
+
+
+In Proc. of: European Symposium on Security & Privacy, 2016, IEEE
+
+ -
+
+
+Mailet: Instant Social Networking under Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Shuai Li, Nicholas Hopper
+
+
+
+In: Privacy Enhancing Technologies, 2016, De Gruyter Open
+
+ -
+
+
+CovertCast: Using Live Streaming to Evade Internet Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Richard McPherson, Amir Houmansadr, Vitaly Shmatikov
+
+
+
+In: Privacy Enhancing Technologies, 2016, De Gruyter Open
+
+ -
+
+
+SkypeLine: Robust Hidden Data Transmission for VoIP
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
+
+
+
+In Proc. of: ASIA Computer and Communications Security, 2016, ACM
+
+ -
+
+
+Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Walid Al-Saqaf
+
+
+
+In: Media and Communication, 2016, Cogitatio
+
+ -
+
+
+SoK: Towards Grounding Censorship Circumvention in Empiricism
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Michael Carl Tschantz, Sadia Afroz, Anonymous, Vern Paxson
+
+
+
+In Proc. of: Symposium on Security & Privacy, 2016, IEEE
+
+
-
+
+
+
+Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee
+
+
+
+In Proc. of: SIGCOMM, 2015, ACM
+
+ -
+
+
+No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Arvind Narayanan, Bendert Zevenbergen
+
+
+
+In: Technology Science, 2015
+
+ -
+
+
+Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Daniel Ellard, Alden Jackson, Christine Jones, Victoria Ursula Manfredi, Timothy Strayer, Bishal Thapa, Megan Van Welie
+
+
+
+In Proc. of: Local Computer Networks, 2015, IEEE
+
+ -
+
+
+Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Chaya Hiruncharoenvate, Zhiyuan Lin, Eric Gilbert
+
+
+
+In Proc. of: International Conference on Web and Social Media, 2015, AAAI
+
+ -
+
+
+A Case for Marrying Censorship Measurements with Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
+
+
+
+In Proc. of: Hot Topics in Networks, 2015, ACM
+
+ -
+
+
+Can Censorship Measurements Be Safe(r)?
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ben Jones, Nick Feamster
+
+
+
+In Proc. of: Hot Topics in Networks, 2015, ACM
+
+ -
+
+
+Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Paul Vines, Tadayoshi Kohno
+
+
+
+In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
+
+ -
+
+
+Known Unknowns: An Analysis of Twitter Censorship in Turkey
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rima S. Tanash, Zhouhan Chen, Tanmay Thakur, Dan S. Wallach, Devika Subramanian
+
+
+
+In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
+
+ -
+
+
+Examining How the Great Firewall Discovers Hidden Circumvention Servers
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson
+
+
+
+In Proc. of: Internet Measurement Conference, 2015, ACM
+
+ -
+
+
+CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+John Holowczak, Amir Houmansadr
+
+
+
+In Proc. of: Computer and Communications Security, 2015, ACM
+
+ -
+
+
+Seeing through Network-Protocol Obfuscation
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton
+
+
+
+In Proc. of: Computer and Communications Security, 2015, ACM
+
+ -
+
+
+Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel
+
+
+
+In Proc. of: Ethics in Networked Systems Research, 2015, ACM
+
+ -
+
+
+Understanding Internet Censorship Policy: The Case of Greece
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Vasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
+
+ -
+
+
+Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
+
+ -
+
+
+An Analysis of China’s “Great Cannon”
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
+
+ -
+
+
+Marionette: A Programmable Network-Traffic Obfuscation System
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton
+
+
+
+In Proc. of: USENIX Security Symposium, 2015, USENIX
+
+ -
+
+
+Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sam Burnett, Nick Feamster
+
+
+
+In Proc. of: SIGCOMM, 2015, ACM
+
+ -
+
+
+Ethical Concerns for Censorship Measurement
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver
+
+
+
+In Proc. of: Ethics in Networked Systems Research, 2015, ACM
+
+ -
+
+
+Analyzing the Great Firewall of China Over Space and Time
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
+
+
+
+In: Privacy Enhancing Technologies, 2015, De Gruyter Open
+
+ -
+
+
+Blocking-resistant communication through domain fronting
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
+
+
+
+In: Privacy Enhancing Technologies, 2015, De Gruyter Open
+
+ -
+
+
+Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Phillipa Gill, Masashi Crete-Nishihata, Jakub Dalek, Sharon Goldberg, Adam Senft, Greg Wiseman
+
+
+
+In: Transactions on the Web, 2015, ACM
+
+ -
+
+
+Internet Censorship detection: A survey
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Giuseppe Aceto, Antonio Pescapè
+
+
+
+In: Computer Networks, 2015, Elsevier
+
+ -
+
+
+Monitoring Internet Censorship with UBICA
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
+
+
+
+In Proc. of: Traffic Monitoring and Analysis, 2015, Springer
+
+
-
+
+
+GoHop: Personal VPN to Defend from Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Yuzhi Wang, Ping Ji, Borui Ye, Pengjun Wang, Rong Luo, Huazhong Yang
+
+
+
+In Proc. of: International Conference on Advanced Communication Technology, 2014, IEEE
+
+ -
+
+
+Global Network Interference Detection over the RIPE Atlas Network
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Collin Anderson, Philipp Winter, Roya
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
+
+ -
+
+
+Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Anonymous
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
+
+ -
+
+
+CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
+
+
+
+In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
+
+ -
+
+
+Censorship in the Wild: Analyzing Internet Filtering in Syria
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar
+
+
+
+In Proc. of: Internet Measurement Conference, 2014, ACM
+
+ -
+
+
+TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
+
+ -
+
+
+Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall
+
+
+
+In Proc. of: Passive and Active Measurement Conference, 2014, Springer
+
+ -
+
+
+No Direction Home: The True Cost of Routing Around Decoys
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov
+
+
+
+In Proc. of: Network and Distributed System Security, 2014, The Internet Society
+
+ -
+
+
+Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
+
+ -
+
+
+Automated Detection and Fingerprinting of Censorship Block Pages
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill
+
+
+
+In Proc. of: Internet Measurement Conference, 2014, ACM
+
+ -
+
+
+A Look at the Consequences of Internet Censorship Through an ISP Lens
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson
+
+
+
+In Proc. of: Internet Measurement Conference, 2014, ACM
+
+ -
+
+
+Reverse-engineering censorship in China: Randomized experimentation and participant observation
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gary King, Jennifer Pan, Margaret E. Roberts
+
+
+
+In: Science, 2014, AAAS
+
+ -
+
+
+Facet: Streaming over Videoconferencing for Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Shuai Li, Mike Schliep, Nick Hopper
+
+
+
+In Proc. of: Workshop on Privacy in the Electronic Society, 2014, ACM
+
+ -
+
+
+LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
+
+
+
+In Proc. of: USENIX Security Symposium, 2014, USENIX
+
+ -
+
+
+Toward automatic censorship detection in microblogs
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Donn Morrison
+
+
+
+In Proc. of: Data Mining in Social Networks, 2014
+
+ -
+
+
+VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Daiyuu Nobori, Yasushi Shinjo
+
+
+
+In Proc. of: Networked Systems Design and Implementation, 2014, USENIX
+
+ -
+
+
+Measuring Freenet in the Wild: Censorship-resilience under Observation
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
+
+
+
+In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
+
+ -
+
+
+Censorship Resistance as a Side-Effect
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Henry Tan, Micah Sherr
+
+
+
+In Proc. of: Security Protocols, 2014, Springer
+
+ -
+
+
+A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Matthias Wachs, Martin Schanzenbach, Christian Grothoff
+
+
+
+In Proc. of: Cryptology and Network Security, 2014, Springer
+
+ -
+
+
+TapDance: End-to-Middle Anticensorship without Flow Blocking
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
+
+
+
+In Proc. of: USENIX Security Symposium, 2014, USENIX
+
+
-
+
+
+Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+David Robinson, Harlan Yu, Anne An
+
+
+
+2013
+
+ -
+
+
+Self-Censorship on Facebook
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sauvik Das, Adam Kramer
+
+
+
+In Proc. of: Conference on Weblogs and Social Media, 2013, AAAI
+
+ -
+
+
+Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Collin Anderson
+
+
+
+2013
+
+ -
+
+
+Internet Censorship in Iran: A First Look
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Simurgh Aryan, Homa Aryan, J. Alex Halderman
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
+
+ -
+
+
+Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Karyn Benson, Alberto Dainotti, KC Claffy, Emile Aben
+
+
+
+In Proc. of: Traffic Monitoring and Analysis, 2013, IEEE
+
+ -
+
+
+Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Le Chen, Chi Zhang, Christo Wilson
+
+
+
+In Proc. of: Conference on Online Social Networks, 2013, ACM
+
+ -
+
+
+A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jakub Dalek, Bennett Haselton, Helmi Noman, Adam Senft, Masashi Crete-Nishihata, Phillipa Gill, Ronald J. Deibert
+
+
+
+In Proc. of: Internet Measurement Conference, 2013, ACM
+
+ -
+
+
+Revealing Middlebox Interference with Tracebox
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet
+
+
+
+In Proc. of: Internet Measurement Conference, 2013, ACM
+
+ -
+
+
+Protocol Misidentification Made Easy with Format-Transforming Encryption
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
+
+
+
+In Proc. of: Computer and Communications Security, 2013, ACM
+
+ -
+
+
+OSS: Using Online Scanning Services for Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+David Fifield, Gabi Nakibly, Dan Boneh
+
+
+
+In Proc. of: Privacy Enhancing Technologies Symposium, 2013, Springer
+
+ -
+
+
+Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+John Geddes, Max Schuchard, Nicholas Hopper
+
+
+
+In Proc. of: Computer and Communications Security, 2013, ACM
+
+ -
+
+
+Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Shaddi Hasan, Yahel Ben-David, Giulia Fanti, Eric Brewer, Scott Shenker
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
+
+ -
+
+
+I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer
+
+
+
+In Proc. of: Network and Distributed System Security, 2013, The Internet Society
+
+ -
+
+
+The Parrot is Dead: Observing Unobservable Network Communications
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov
+
+
+
+In Proc. of: Symposium on Security & Privacy, 2013, IEEE
+
+ -
+
+
+Message In A Bottle: Sailing Past Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
+
+
+
+In Proc. of: Annual Computer Security Applications Conference, 2013, ACM
+
+ -
+
+
+Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
+
+ -
+
+
+The Anatomy of Web Censorship in Pakistan
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zubair Nabi
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
+
+ -
+
+
+Identity-Based Steganography and Its Applications to Censorship Resistance
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Tim Ruffing, Jonas Schneider, Aniket Kate
+
+
+
+In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
+
+ -
+
+
+Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+John-Paul Verkamp, Minaxi Gupta
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
+
+ -
+
+
+On the Feasibility of a Censorship Resistant Decentralized Name System
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Matthias Wachs, Martin Schanzenbach, Christian Grothoff
+
+
+
+In Proc. of: Foundations & Practice of Security, 2013, Springer
+
+ -
+
+
+rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas J. Hopper
+
+
+
+In Proc. of: Network and Distributed System Security, 2013, The Internet Society
+
+ -
+
+
+Towards a Censorship Analyser for Tor
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Philipp Winter
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
+
+ -
+
+
+ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Philipp Winter, Tobias Pulls, Juergen Fuss
+
+
+
+In Proc. of: Workshop on Privacy in the Electronic Society, 2013, ACM
+
+ -
+
+
+SWEET: Serving the Web by Exploiting Email Tunnels
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, Nikita Borisov
+
+
+
+In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
+
+ -
+
+
+The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
+
+
+
+In Proc. of: USENIX Security Symposium, 2013, USENIX
+
+
-
+
+
+Technical analysis of the Ultrasurf proxying software
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jacob Appelbaum
+
+
+
+2012
+
+ -
+
+
+Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resources and Motivations
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Nicholas Aase, Jedidiah R. Crandall, Álvaro Díaz, Jeffrey Knockel, Jorge Ocaña Molinero, Jared Saia, Dan Wallach, Tao Zhu
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
+
+ -
+
+
+The Hidden Internet of Iran: Private Address Allocations on a National Network
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Collin Anderson
+
+
+
+2012
+
+ -
+
+
+The Collateral Damage of Internet Censorship by DNS Injection
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Sparks, Neo, Tank, Smith, Dozer
+
+
+
+In: SIGCOMM Computer Communication Review, 2012, ACM
+
+ -
+
+
+Hold-On: Protecting Against On-Path DNS Poisoning
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li, Vern Paxson
+
+
+
+In Proc. of: Securing and Trusting Internet Names, 2012, National Physical Laboratory
+
+ -
+
+
+Evading Censorship with Browser-Based Proxies
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Roger Dingledine, Phil Porras, Dan Boneh
+
+
+
+In Proc. of: Privacy Enhancing Technologies Symposium, 2012, Springer
+
+ -
+
+
+OONI: Open Observatory of Network Interference
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Arturo Filastò, Jacob Appelbaum
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
+
+ -
+
+
+How Censorship in China Allows Government Criticism but Silences Collective Expression
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gary King, Jennifer Pan, Margaret E. Roberts
+
+
+
+In: American Political Science Review, 2012
+
+ -
+
+
+Bootstrapping Communications into an Anti-Censorship System
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Patrick Lincoln, Ian Mason, Phillip Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Simpson, Paul Vixie, Dan Boneh
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
+
+ -
+
+
+Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zhen Ling, Xinwen Fu, Wei Yu, Junzhou Luo, Ming Yang
+
+
+
+In Proc. of: INFOCOM, 2012, IEEE
+
+ -
+
+
+SkypeMorph: Protocol Obfuscation for Tor Bridges
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hooman {Mohajeri Moghaddam}, Baiyu Li, Mohammad Derakhshani, Ian Goldberg
+
+
+
+In Proc. of: Computer and Communications Security, 2012, ACM
+
+ -
+
+
+Secure Communication over Diverse Transports
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Michael Rogers, Eleanor Saitta
+
+
+
+In Proc. of: Workshop on Privacy in the Electronic Society, 2012, ACM
+
+ -
+
+
+
+Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper
+
+
+
+In Proc. of: Computer and Communications Security, 2012, ACM
+
+ -
+
+
+Adapting Social Spam Infrastructure for Political Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kurt Thomas, Chris Grier, Vern Paxson
+
+
+
+In Proc. of: Large-Scale Exploits and Emergent Threats, 2012, USENIX
+
+ -
+
+
+One-way indexing for plausible deniability in censorship resistant storage
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
+
+ -
+
+
+Inferring Mechanics of Web Censorship Around the World
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+John-Paul Verkamp, Minaxi Gupta
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
+
+ -
+
+
+CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov
+
+
+
+In Proc. of: Computer and Communications Security, 2012, ACM
+
+ -
+
+
+StegoTorus: A Camouflage Proxy for the Tor Anonymity System
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh
+
+
+
+In Proc. of: Computer and Communications Security, 2012, ACM
+
+ -
+
+
+How the Great Firewall of China is Blocking Tor
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Philipp Winter, Stefan Lindskog
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
+
+ -
+
+
+Regional Variation in Chinese Internet Filtering
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Joss Wright
+
+
+
+2012
+
+
-
+
+
+BridgeSPA: Improving Tor Bridges with Single Packet Authorization
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner
+
+
+
+In Proc. of: Workshop on Privacy in the Electronic Society, 2011, ACM
+
+ -
+
+
+Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Nicholas Jones, Matvey Arye, Jacopo Cesareo, Michael J. Freedman
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
+
+ -
+
+
+#h00t: Censorship Resistant Microblogging
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright
+
+
+
+2011
+
+ -
+
+
+Scrambling for lightweight censorship resistance
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Joseph Bonneau, Rubin Xu
+
+
+
+In Proc. of: Security Protocols, 2011, Springer
+
+ -
+
+
+Analysis of Country-wide Internet Outages Caused by Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapè
+
+
+
+In Proc. of: Internet Measurement Conference, 2011, ACM
+
+ -
+
+
+An anomaly-based censorship-detection system for Tor
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+George Danezis
+
+
+
+2011
+
+ -
+
+
+Automated Named Entity Extraction for Tracking Censorship of Current Events
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Antonio M. Espinoza, Jedidiah R. Crandall
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
+
+ -
+
+
+Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
+
+
+
+In Proc. of: Computer and Communications Security, 2011, ACM
+
+ -
+
+
+Decoy Routing: Toward Unblockable Internet Communication
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, W. Timothy Strayer
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
+
+ -
+
+
+Bypassing Internet Censorship for News Broadcasters
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Karl Kathuria
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
+
+ -
+
+
+Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
+
+ -
+
+
+
+Vincent Liu, Seungyeop Han, Arvind Krishnamurthy, Thomas Anderson
+
+
+
+In Proc. of: Hot Topics in Networks, 2011, ACM
+
+ -
+
+
+Proximax: A Measurement Based System for Proxies Dissemination
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Damon McCoy, Jose Andre Morales, Kirill Levchenko
+
+
+
+In Proc. of: Financial Cryptography and Data Security, 2011, Springer
+
+ -
+
+
+Mapping Local Internet Control
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hal Roberts, David Larochelle, Rob Faris, John Palfrey
+
+
+
+In Proc. of: Computer Communications Workshop, 2011, IEEE
+
+ -
+
+
+Infrastructures of Censorship and Lessons from Copyright Resistance
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Wendy Seltzer
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
+
+ -
+
+
+CensMon: A Web Censorship Monitor
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Andreas Sfakianakis, Elias Athanasopoulos, Sotiris Ioannidis
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
+
+ -
+
+
+Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Irina Shklovski, Nalini P. Kotamraju
+
+
+
+In Proc. of: CHI Conference on Human Factors in Computing Systems, 2011, ACM
+
+ -
+
+
+Dust: A Blocking-Resistant Internet Transport Protocol
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Brandon Wiley
+
+
+
+2011
+
+ -
+
+
+Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Joss Wright, Tulio de Souza, Ian Brown
+
+
+
+In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
+
+ -
+
+
+Telex: Anticensorship in the Network Infrastructure
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
+
+
+
+In Proc. of: USENIX Security Symposium, 2011, USENIX
+
+ -
+
+
+Internet Censorship in China: Where Does the Filtering Occur?
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Xueyang Xu, Z. Morley Mao, J. Alex Halderman
+
+
+
+In Proc. of: Passive and Active Measurement Conference, 2011, Springer
+
+