This commit is contained in:
gfw-report 2021-09-13 22:57:05 +00:00
commit 23cdb78747
No known key found for this signature in database
GPG key ID: B0C6EB19DA7CEAA3
2 changed files with 109 additions and 1 deletions

View file

@ -180,7 +180,7 @@
<div class="menu-item">
<img class="top-icon" src="img/update-icon.svg" alt="update icon"/>
<a
href="https://github.com/NullHypothesis/censorbib/commits/master">Last update: 2020-07-20</a>
href="https://github.com/NullHypothesis/censorbib/commits/master">Last update: 2020-11-19</a>
</div>
<div class="menu-item">
<img class="top-icon" src="img/donate-icon.svg" alt="donate icon"/>

View file

@ -1,3 +1,111 @@
@inproceedings{Barradas2020b,
author = {Diogo Barradas and Nuno Santos},
title = {Towards a Scalable Censorship-Resistant Overlay Network based on {WebRTC} Covert Channels},
booktitle = {Distributed Infrastructure for Common Good},
publisher = {ACM},
year = {2020},
url = {https://www.gsd.inesc-id.pt/~nsantos/papers/barradas_dicg20.pdf},
}
@inproceedings{Barradas2020a,
author = {Diogo Barradas and Nuno Santos and Lu\'{i}s Rodrigues and V\'{i}tor Nunes},
title = {Poking a Hole in the Wall: Efficient Censorship-Resistant {Internet} Communications by Parasitizing on {WebRTC}},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2020},
url = {https://www.gsd.inesc-id.pt/~nsantos/papers/barradas_ccs20.pdf},
}
@inproceedings{Raman2020c,
author = {Ram Sundara Raman and Prerana Shenoy and Katharina Kohls and Roya Ensafi},
title = {{Censored} {Planet}: An {Internet}-wide, Longitudinal Censorship Observatory},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2020},
url = {https://www.ramakrishnansr.com/assets/censoredplanet.pdf},
}
@inproceedings{Alice2020a,
author = {Alice and Bob and Carol and Jan Beznazwy and Amir Houmansadr},
title = {How {China} Detects and Blocks {Shadowsocks}},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2020},
url = {https://dl.acm.org/doi/pdf/10.1145/3419394.3423644},
}
@inproceedings{Raman2020b,
author = {Ram Sundara Raman and Leonid Evdokimov and Eric Wustrow and J. Alex Halderman and Roya Ensafi},
title = {Investigating Large Scale {HTTPS} Interception in {Kazakhstan}},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2020},
url = {https://dl.acm.org/doi/pdf/10.1145/3419394.3423665},
}
@inproceedings{Bock2020b,
author = {Kevin Bock and George Hughey and Louis-Henri Merino and Tania Arya and Daniel Liscinsky and Regina Pogosian and Dave Levin},
title = {Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion},
booktitle = {SIGCOMM},
publisher = {ACM},
year = {2020},
url = {https://geneva.cs.umd.edu/papers/come-as-you-are.pdf},
}
@inproceedings{Alharbi2020a,
author = {Fatemah Alharbi and Michalis Faloutsos and Nael Abu-Ghazaleh},
title = {Opening Digital Borders Cautiously yet Decisively: Digital Filtering in {Saudi Arabia}},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2020},
url = {https://www.usenix.org/system/files/foci20-paper-alharbi_0.pdf},
}
@inproceedings{Anonymous2020a,
author = {Anonymous and Arian Akhavan Niaki and Nguyen Phong Hoang and Phillipa Gill and Amir Houmansadr},
title = {Triplet Censors: Demystifying {Great Firewall}'s {DNS} Censorship Behavior},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2020},
url = {https://www.usenix.org/system/files/foci20-paper-anonymous_0.pdf},
}
@inproceedings{Birtel2020a,
author = {Benedikt Birtel and Christian Rossow},
title = {{Slitheen++}: Stealth {TLS}-based Decoy Routing},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2020},
url = {https://www.usenix.org/system/files/foci20-paper-birtel_0.pdf},
}
@inproceedings{Bock2020a,
author = {Kevin Bock and Yair Fax and Kyle Reese and Jasraj Singh and Dave Levin},
title = {Detecting and Evading Censorship-in-Depth: A Case Study of {Iran}'s Protocol Filter},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2020},
url = {https://www.usenix.org/system/files/foci20-paper-bock.pdf},
}
@inproceedings{Fifield2020a,
author = {David Fifield},
title = {{Turbo Tunnel}, a good way to design censorship circumvention protocols},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2020},
url = {https://www.usenix.org/system/files/foci20-paper-fifield.pdf},
}
@inproceedings{Frolov2020b,
author = {Sergey Frolov and Eric Wustrow},
title = {{HTTPT}: A Probe-Resistant Proxy},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2020},
url = {https://www.usenix.org/system/files/foci20-paper-frolov.pdf},
}
@inproceedings{Singh2020a,
author = {Kushagra Singh and Gurshabad Grover and Varun Bansal},
title = {How {India} Censors the Web},