From 43cb8240008515ca1b5ab75a362e5aadb1044917 Mon Sep 17 00:00:00 2001 From: NullHypothesis Date: Sun, 26 May 2024 18:47:56 +0000 Subject: [PATCH] =?UTF-8?q?Deploying=20to=20gh-pages=20from=20@=20NullHypo?= =?UTF-8?q?thesis/censorbib@b1ddf2f0ea51ceeec88c35cc1bb83eb658a51375=20?= =?UTF-8?q?=F0=9F=9A=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- index.html | 623 ++++++++++++++++++++++++++++------------------------- 1 file changed, 334 insertions(+), 289 deletions(-) diff --git a/index.html b/index.html index 70a283a..bde97e5 100644 --- a/index.html +++ b/index.html @@ -185,7 +185,7 @@ @@ -637,6 +637,7 @@ In Proc. of: Symposium on Security & Privacy, 202 On Precisely Detecting Censorship Circumvention in Real-World Networks +Discussion icon Download icon @@ -673,7 +674,7 @@ Website blocking in the European Union: Network interference from the perspectiv Cached download icon - + BibTeX download icon @@ -701,7 +702,7 @@ Comments on certain past cryptographic flaws affecting fully encrypted censorshi Cached download icon - + BibTeX download icon @@ -729,7 +730,7 @@ Destination Unreachable: Characterizing Internet Outages and Shutdowns Cached download icon - + BibTeX download icon @@ -757,7 +758,7 @@ Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning Cached download icon - + BibTeX download icon @@ -785,7 +786,7 @@ A Study of China’s Censorship and Its Evasion Through the Lens of Online Gamin Cached download icon - + BibTeX download icon @@ -813,7 +814,7 @@ DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorshi Cached download icon - + BibTeX download icon @@ -841,7 +842,7 @@ TELEPATH: A Minecraft-based Covert Communication System Cached download icon - + BibTeX download icon @@ -869,7 +870,7 @@ A Worldwide View of Nation-state Internet Censorship Cached download icon - + BibTeX download icon @@ -897,7 +898,7 @@ The Use of Push Notification in Censorship Circumvention Cached download icon - + BibTeX download icon @@ -919,13 +920,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -953,7 +955,7 @@ Detecting Network Interference Without Endpoint Participation Cached download icon - + BibTeX download icon @@ -975,13 +977,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1009,7 +1012,7 @@ Towards a Comprehensive Understanding of Russian Transit Censorship Cached download icon - + BibTeX download icon @@ -1037,7 +1040,7 @@ Proteus: Programmable Protocols for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1065,7 +1068,7 @@ Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling Cached download icon - + BibTeX download icon @@ -1093,7 +1096,7 @@ Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -1121,7 +1124,7 @@ Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale f Cached download icon - + BibTeX download icon @@ -1149,7 +1152,7 @@ How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic Cached download icon - + BibTeX download icon @@ -1171,13 +1174,14 @@ In Proc. of: USENIX Security Symposium, 2023, USENIX Lox: Protecting the Social Graph in Bridge Distribution +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1205,7 +1209,7 @@ Dolphin: A Cellular Voice Based Internet Shutdown Resistance System Cached download icon - + BibTeX download icon @@ -1227,13 +1231,14 @@ In: Privacy Enhancing Technologies, 2023 CensorWatch: On the Implementation of Online Censorship in India +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1255,13 +1260,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1289,7 +1295,7 @@ Security Notions for Fully Encrypted Protocols Cached download icon - + BibTeX download icon @@ -1317,7 +1323,7 @@ Advancing the Art of Censorship Data Analysis Cached download icon - + BibTeX download icon @@ -1347,7 +1353,7 @@ Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with Cached download icon - + BibTeX download icon @@ -1375,7 +1381,7 @@ Network Measurement Methods for Locating and Examining Censorship Devices Cached download icon - + BibTeX download icon @@ -1403,7 +1409,7 @@ TSPU: Russia’s Decentralized Censorship System Cached download icon - + BibTeX download icon @@ -1431,7 +1437,7 @@ Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement Cached download icon - + BibTeX download icon @@ -1459,7 +1465,7 @@ GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -1487,7 +1493,7 @@ OpenVPN is Open to VPN Fingerprinting Cached download icon - + BibTeX download icon @@ -1509,13 +1515,14 @@ In Proc. of: USENIX Security Symposium, 2022, USENIX Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1543,7 +1550,7 @@ COVID-19 increased censorship circumvention and access to sensitive topics in Ch Cached download icon - + BibTeX download icon @@ -1571,7 +1578,7 @@ Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Cached download icon - + BibTeX download icon @@ -1601,7 +1608,7 @@ Understanding Internet Censorship in Europe: The Case of Spain Cached download icon - + BibTeX download icon @@ -1629,7 +1636,7 @@ OUStralopithecus: Overt User Simulation for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1657,7 +1664,7 @@ Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels Cached download icon - + BibTeX download icon @@ -1685,7 +1692,7 @@ Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China Cached download icon - + BibTeX download icon @@ -1707,13 +1714,14 @@ In Proc. of: WWW, 2021, ACM Meteor: Cryptographically Secure Steganography for Realistic Distributions +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1741,7 +1749,7 @@ Throttling Twitter: an emerging censorship technique in Russia Cached download icon - + BibTeX download icon @@ -1763,13 +1771,14 @@ In Proc. of: Internet Measurement Conference, 2021, A Web censorship measurements of HTTP/3 over QUIC +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1797,7 +1806,7 @@ Measuring DoT/DoH blocking using OONI Probe: a preliminary study Cached download icon - + BibTeX download icon @@ -1825,7 +1834,7 @@ A multi-perspective view of Internet censorship in Myanmar Cached download icon - + BibTeX download icon @@ -1853,7 +1862,7 @@ Measuring QQMail’s Automated Email Censorship in China Cached download icon - + BibTeX download icon @@ -1875,13 +1884,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1909,7 +1919,7 @@ Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middlebo Cached download icon - + BibTeX download icon @@ -1931,13 +1941,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1959,13 +1970,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -1993,7 +2005,7 @@ Weaponizing Middleboxes for TCP Reflected Amplification Cached download icon - + BibTeX download icon @@ -2021,7 +2033,7 @@ How Great is the Great Firewall? Measuring China’s DNS Censorship Cached download icon - + BibTeX download icon @@ -2043,13 +2055,14 @@ In Proc. of: USENIX Security Symposium, 2021, USENIX Balboa: Bobbing and Weaving around Network Censorship +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2077,7 +2090,7 @@ Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Cached download icon - + BibTeX download icon @@ -2099,13 +2112,14 @@ In Proc. of: Workshop on Offensive Technologies, 2021 Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2129,13 +2143,14 @@ In: Privacy Enhancing Technologies, 2021, Sciendo Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2157,13 +2172,14 @@ In Proc. of: Distributed Infrastructure for Common Good +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2185,13 +2201,14 @@ In Proc. of: Computer and Communications Security, 20 Censored Planet: An Internet-wide, Longitudinal Censorship Observatory +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2219,7 +2236,7 @@ How China Detects and Blocks Shadowsocks Cached download icon - + BibTeX download icon @@ -2241,13 +2258,14 @@ In Proc. of: Internet Measurement Conference, 2020, A Investigating Large Scale HTTPS Interception in Kazakhstan +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2275,7 +2293,7 @@ Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side E Cached download icon - + BibTeX download icon @@ -2303,7 +2321,7 @@ MIMIQ: Masking IPs with Migration in QUIC Cached download icon - + BibTeX download icon @@ -2325,13 +2343,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2353,13 +2372,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2387,7 +2407,7 @@ Slitheen++: Stealth TLS-based Decoy Routing Cached download icon - + BibTeX download icon @@ -2409,13 +2429,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2443,7 +2464,7 @@ Turbo Tunnel, a good way to design censorship circumvention protocols Cached download icon - + BibTeX download icon @@ -2465,13 +2486,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2499,7 +2521,7 @@ How India Censors the Web Cached download icon - + BibTeX download icon @@ -2521,13 +2543,14 @@ In Proc. of: Web Science, 2020, ACM Characterizing Transnational Internet Performance and the Great Bottleneck of China +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2549,13 +2572,14 @@ In: Measurement and Analysis of Computing Systems, 20 SiegeBreaker: An SDN Based Practical Decoy Routing System +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2577,13 +2601,14 @@ In: Privacy Enhancing Technologies, 2020, Sciendo Running Refraction Networking for Real +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2605,13 +2630,14 @@ In: Privacy Enhancing Technologies, 2020, Sciendo MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2633,13 +2659,14 @@ In: Privacy Enhancing Technologies, 2020, Sciendo ICLab: A Global, Longitudinal Internet Censorship Measurement Platform +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2661,13 +2688,14 @@ In Proc. of: Symposium on Security & Privacy, 202 SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2689,13 +2717,14 @@ In Proc. of: Network and Distributed System Security, MassBrowser: Unblocking the Censored Web for the Masses, by the Masses +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2717,13 +2746,14 @@ In Proc. of: Network and Distributed System Security, Detecting Probe-resistant Proxies +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2745,13 +2775,14 @@ In Proc. of: Network and Distributed System Security, Measuring the Deployment of Network Censorship Filters at Global Scale +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2773,13 +2804,14 @@ In Proc. of: Network and Distributed System Security, Decentralized Control: A Case Study of Russia +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2807,7 +2839,7 @@ Protocol Proxy: An FTE-based covert channel Cached download icon - + BibTeX download icon @@ -2831,13 +2863,14 @@ In: Computers & Security, 2020, Elsevier Conjure: Summoning Proxies from Unused Address Space +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2859,13 +2892,14 @@ In Proc. of: Computer and Communications Security, 20 Geneva: Evolving Censorship Evasion Strategies +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2893,7 +2927,7 @@ Distributed Detection of Tor Directory Authorities Censorship in Mexico Cached download icon - + BibTeX download icon @@ -2921,7 +2955,7 @@ Shedding Light on Mobile App Store Censorship Cached download icon - + BibTeX download icon @@ -2943,13 +2977,14 @@ In Proc. of: User Modeling, Adaptation and Personalization +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -2971,13 +3006,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -3005,7 +3041,7 @@ An Efficient Method to Determine which Combination of Keywords Triggered Automat Cached download icon - + BibTeX download icon @@ -3027,13 +3063,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -3061,7 +3098,7 @@ Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory Cached download icon - + BibTeX download icon @@ -3083,13 +3120,14 @@ In Proc. of: Network and Distributed System Security, The use of TLS in Censorship Circumvention +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -3119,7 +3157,7 @@ On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Ce Cached download icon - + BibTeX download icon @@ -3147,7 +3185,7 @@ Where The Light Gets In: Analyzing Web Censorship Mechanisms in India Cached download icon - + BibTeX download icon @@ -3175,7 +3213,7 @@ In Proc. of: Internet Measurement Conference, 2018, A Cached download icon - + BibTeX download icon @@ -3203,7 +3241,7 @@ An Empirical Study of the I2P Anonymity Network and its Censorship Resistance Cached download icon - + BibTeX download icon @@ -3231,7 +3269,7 @@ Secure asymmetry and deployability for decoy routing systems Cached download icon - + BibTeX download icon @@ -3259,7 +3297,7 @@ Effective Detection of Multimedia Protocol Tunneling using Machine Learning Cached download icon - + BibTeX download icon @@ -3281,13 +3319,14 @@ In Proc. of: USENIX Security Symposium, 2018, USENIX Quack: Scalable Remote Measurement of Application-Layer Censorship +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -3315,7 +3354,7 @@ Incentivizing Censorship Measurements via Circumvention Cached download icon - + BibTeX download icon @@ -3337,13 +3376,14 @@ In Proc. of: SIGCOMM, 2018, ACM Analyzing China’s Blocking of Unpublished Tor Bridges +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -3371,7 +3411,7 @@ MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption Cached download icon - + BibTeX download icon @@ -3399,7 +3439,7 @@ An analysis of automatic image filtering on WeChat Moments Cached download icon - + BibTeX download icon @@ -3427,7 +3467,7 @@ A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability Cached download icon - + BibTeX download icon @@ -3455,7 +3495,7 @@ Automatically Generating a Large, Culture-Specific Blocklist for China Cached download icon - + BibTeX download icon @@ -3483,7 +3523,7 @@ How Sudden Censorship Can Increase Access to Information Cached download icon - + BibTeX download icon @@ -3511,7 +3551,7 @@ Detecting Censorable Content on Sina Weibo: A Pilot Study Cached download icon - + BibTeX download icon @@ -3539,7 +3579,7 @@ Proof-of-Censorship: Enabling centralized censorship-resistant content providers Cached download icon - + BibTeX download icon @@ -3569,7 +3609,7 @@ The Devil’s in The Details: Placing Decoy Routers in the Internet Cached download icon - + BibTeX download icon @@ -3597,7 +3637,7 @@ Lavinia: An audit-payment protocol for censorship-resistant storage Cached download icon - + BibTeX download icon @@ -3625,7 +3665,7 @@ The Random Forest based Detection of Shadowsock’s Traffic Cached download icon - + BibTeX download icon @@ -3653,7 +3693,7 @@ DeTor: Provably Avoiding Geographic Regions in Tor Cached download icon - + BibTeX download icon @@ -3681,7 +3721,7 @@ Mending Wall: On the Implementation of Censorship in India Cached download icon - + BibTeX download icon @@ -3709,7 +3749,7 @@ Online Advertising under Internet Censorship Cached download icon - + BibTeX download icon @@ -3737,7 +3777,7 @@ Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Cached download icon - + BibTeX download icon @@ -3765,7 +3805,7 @@ Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Cached download icon - + BibTeX download icon @@ -3793,7 +3833,7 @@ A Churn for the Better: Localizing Censorship using Network-level Path Churn and Cached download icon - + BibTeX download icon @@ -3821,7 +3861,7 @@ The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attac Cached download icon - + BibTeX download icon @@ -3849,7 +3889,7 @@ Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship Cached download icon - + BibTeX download icon @@ -3877,7 +3917,7 @@ lib·erate, (n): A library for exposing (traffic-classification) rules and avoid Cached download icon - + BibTeX download icon @@ -3905,7 +3945,7 @@ When the Internet Goes Down in Bangladesh Cached download icon - + BibTeX download icon @@ -3933,7 +3973,7 @@ Characterizing the Nature and Dynamics of Tor Exit Blocking Cached download icon - + BibTeX download icon @@ -3961,7 +4001,7 @@ Global Measurement of DNS Manipulation Cached download icon - + BibTeX download icon @@ -3989,7 +4029,7 @@ FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URL Cached download icon - + BibTeX download icon @@ -4017,7 +4057,7 @@ Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Cached download icon - + BibTeX download icon @@ -4045,7 +4085,7 @@ The Decline of Social Media Censorship and the Rise of Self-Censorship after the Cached download icon - + BibTeX download icon @@ -4073,7 +4113,7 @@ Autosonda: Discovering Rules and Triggers of Censorship Devices Cached download icon - + BibTeX download icon @@ -4101,7 +4141,7 @@ An ISP-Scale Deployment of TapDance Cached download icon - + BibTeX download icon @@ -4129,7 +4169,7 @@ DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Video Cached download icon - + BibTeX download icon @@ -4157,7 +4197,7 @@ Topics of Controversy: An Empirical Analysis of Web Censorship Lists Cached download icon - + BibTeX download icon @@ -4185,7 +4225,7 @@ A Usability Evaluation of Tor Launcher Cached download icon - + BibTeX download icon @@ -4213,7 +4253,7 @@ Augur: Internet-Wide Detection of Connectivity Disruptions Cached download icon - + BibTeX download icon @@ -4241,7 +4281,7 @@ Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers Cached download icon - + BibTeX download icon @@ -4269,7 +4309,7 @@ Internet Censorship in Thailand: User Practices and Potential Threats Cached download icon - + BibTeX download icon @@ -4297,7 +4337,7 @@ Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infras Cached download icon - + BibTeX download icon @@ -4327,7 +4367,7 @@ Fingerprintability of WebRTC Cached download icon - + BibTeX download icon @@ -4355,7 +4395,7 @@ Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses Cached download icon - + BibTeX download icon @@ -4377,13 +4417,14 @@ In Proc. of: Workshop on Privacy in the Electronic Society +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -4411,7 +4452,7 @@ Game of Decoys: Optimal Decoy Routing Through Game Theory Cached download icon - + BibTeX download icon @@ -4439,7 +4480,7 @@ Practical Censorship Evasion Leveraging Content Delivery Networks Cached download icon - + BibTeX download icon @@ -4467,7 +4508,7 @@ DNS-sly: Avoiding Censorship through Network Complexity Cached download icon - + BibTeX download icon @@ -4495,7 +4536,7 @@ Matryoshka: Hiding Secret Communication in Plain Sight Cached download icon - + BibTeX download icon @@ -4523,7 +4564,7 @@ GhostPost: Seamless Restoration of Censored Social Media Posts Cached download icon - + BibTeX download icon @@ -4551,7 +4592,7 @@ Censors’ Delay in Blocking Circumvention Proxies Cached download icon - + BibTeX download icon @@ -4579,7 +4620,7 @@ The Politics of Routing: Investigating the Relationship Between AS Connectivity Cached download icon - + BibTeX download icon @@ -4607,7 +4648,7 @@ A Framework for the Game-theoretic Analysis of Censorship Resistance Cached download icon - + BibTeX download icon @@ -4635,7 +4676,7 @@ SoK: Making Sense of Censorship Resistance Systems Cached download icon - + BibTeX download icon @@ -4657,13 +4698,14 @@ In: Privacy Enhancing Technologies, 2016, De Gruyter Salmon: Robust Proxy Distribution for Censorship Circumvention +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -4691,7 +4733,7 @@ Satellite: Joint Analysis of CDNs and Network-Level Interference Cached download icon - + BibTeX download icon @@ -4719,7 +4761,7 @@ Analyzing Internet Censorship in Pakistan Cached download icon - + BibTeX download icon @@ -4747,7 +4789,7 @@ Leveraging Internet Services to Evade Censorship Cached download icon - + BibTeX download icon @@ -4775,7 +4817,7 @@ Games Without Frontiers: Investigating Video Games as a Covert Channel Cached download icon - + BibTeX download icon @@ -4803,7 +4845,7 @@ Mailet: Instant Social Networking under Censorship Cached download icon - + BibTeX download icon @@ -4831,7 +4873,7 @@ CovertCast: Using Live Streaming to Evade Internet Censorship Cached download icon - + BibTeX download icon @@ -4859,7 +4901,7 @@ SkypeLine: Robust Hidden Data Transmission for VoIP Cached download icon - + BibTeX download icon @@ -4887,7 +4929,7 @@ Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regi Cached download icon - + BibTeX download icon @@ -4915,7 +4957,7 @@ SoK: Towards Grounding Censorship Circumvention in Empiricism Cached download icon - + BibTeX download icon @@ -4945,7 +4987,7 @@ Alibi Routing Cached download icon - + BibTeX download icon @@ -4973,7 +5015,7 @@ No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement Cached download icon - + BibTeX download icon @@ -5001,7 +5043,7 @@ Rebound: Decoy Routing on Asymmetric Routes Via Error Messages Cached download icon - + BibTeX download icon @@ -5029,7 +5071,7 @@ Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homopho Cached download icon - + BibTeX download icon @@ -5057,7 +5099,7 @@ A Case for Marrying Censorship Measurements with Circumvention Cached download icon - + BibTeX download icon @@ -5085,7 +5127,7 @@ Can Censorship Measurements Be Safe(r)? Cached download icon - + BibTeX download icon @@ -5113,7 +5155,7 @@ Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Pl Cached download icon - + BibTeX download icon @@ -5141,7 +5183,7 @@ Known Unknowns: An Analysis of Twitter Censorship in Turkey Cached download icon - + BibTeX download icon @@ -5163,13 +5205,14 @@ In Proc. of: Workshop on Privacy in the Electronic Society +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -5197,7 +5240,7 @@ CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content Cached download icon - + BibTeX download icon @@ -5225,7 +5268,7 @@ Seeing through Network-Protocol Obfuscation Cached download icon - + BibTeX download icon @@ -5253,7 +5296,7 @@ Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Cached download icon - + BibTeX download icon @@ -5281,7 +5324,7 @@ Understanding Internet Censorship Policy: The Case of Greece Cached download icon - + BibTeX download icon @@ -5309,7 +5352,7 @@ Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms Cached download icon - + BibTeX download icon @@ -5337,7 +5380,7 @@ An Analysis of China’s “Great Cannon” Cached download icon - + BibTeX download icon @@ -5365,7 +5408,7 @@ Marionette: A Programmable Network-Traffic Obfuscation System Cached download icon - + BibTeX download icon @@ -5393,7 +5436,7 @@ Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests Cached download icon - + BibTeX download icon @@ -5421,7 +5464,7 @@ Ethical Concerns for Censorship Measurement Cached download icon - + BibTeX download icon @@ -5449,7 +5492,7 @@ Analyzing the Great Firewall of China Over Space and Time Cached download icon - + BibTeX download icon @@ -5477,7 +5520,7 @@ Blocking-resistant communication through domain fronting Cached download icon - + BibTeX download icon @@ -5505,7 +5548,7 @@ Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Cached download icon - + BibTeX download icon @@ -5533,7 +5576,7 @@ Internet Censorship detection: A survey Cached download icon - + BibTeX download icon @@ -5561,7 +5604,7 @@ Monitoring Internet Censorship with UBICA Cached download icon - + BibTeX download icon @@ -5591,7 +5634,7 @@ GoHop: Personal VPN to Defend from Censorship Cached download icon - + BibTeX download icon @@ -5619,7 +5662,7 @@ Global Network Interference Detection over the RIPE Atlas Network Cached download icon - + BibTeX download icon @@ -5647,7 +5690,7 @@ Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship Cached download icon - + BibTeX download icon @@ -5675,7 +5718,7 @@ CloudTransport: Using Cloud Storage for Censorship-Resistant Networking Cached download icon - + BibTeX download icon @@ -5703,7 +5746,7 @@ Censorship in the Wild: Analyzing Internet Filtering in Syria Cached download icon - + BibTeX download icon @@ -5731,7 +5774,7 @@ TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography Cached download icon - + BibTeX download icon @@ -5759,7 +5802,7 @@ Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels Cached download icon - + BibTeX download icon @@ -5787,7 +5830,7 @@ No Direction Home: The True Cost of Routing Around Decoys Cached download icon - + BibTeX download icon @@ -5815,7 +5858,7 @@ Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Cached download icon - + BibTeX download icon @@ -5843,7 +5886,7 @@ Automated Detection and Fingerprinting of Censorship Block Pages Cached download icon - + BibTeX download icon @@ -5871,7 +5914,7 @@ A Look at the Consequences of Internet Censorship Through an ISP Lens Cached download icon - + BibTeX download icon @@ -5899,7 +5942,7 @@ Reverse-engineering censorship in China: Randomized experimentation and particip Cached download icon - + BibTeX download icon @@ -5927,7 +5970,7 @@ Facet: Streaming over Videoconferencing for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -5955,7 +5998,7 @@ LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Cached download icon - + BibTeX download icon @@ -5983,7 +6026,7 @@ Toward automatic censorship detection in microblogs Cached download icon - + BibTeX download icon @@ -6011,7 +6054,7 @@ VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance Cached download icon - + BibTeX download icon @@ -6039,7 +6082,7 @@ Measuring Freenet in the Wild: Censorship-resilience under Observation Cached download icon - + BibTeX download icon @@ -6067,7 +6110,7 @@ Censorship Resistance as a Side-Effect Cached download icon - + BibTeX download icon @@ -6095,7 +6138,7 @@ A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System Cached download icon - + BibTeX download icon @@ -6123,7 +6166,7 @@ TapDance: End-to-Middle Anticensorship without Flow Blocking Cached download icon - + BibTeX download icon @@ -6153,7 +6196,7 @@ Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorshi Cached download icon - + BibTeX download icon @@ -6181,7 +6224,7 @@ Self-Censorship on Facebook Cached download icon - + BibTeX download icon @@ -6209,7 +6252,7 @@ Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran Cached download icon - + BibTeX download icon @@ -6231,13 +6274,14 @@ Collin Anderson Internet Censorship in Iran: A First Look +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -6265,7 +6309,7 @@ Gaining Insight into AS-level Outages through Analysis of Internet Background Ra Cached download icon - + BibTeX download icon @@ -6293,7 +6337,7 @@ Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on S Cached download icon - + BibTeX download icon @@ -6321,7 +6365,7 @@ A Method for Identifying and Confirming the Use of URL Filtering Products for Ce Cached download icon - + BibTeX download icon @@ -6349,7 +6393,7 @@ Revealing Middlebox Interference with Tracebox Cached download icon - + BibTeX download icon @@ -6377,7 +6421,7 @@ Protocol Misidentification Made Easy with Format-Transforming Encryption Cached download icon - + BibTeX download icon @@ -6405,7 +6449,7 @@ OSS: Using Online Scanning Services for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -6433,7 +6477,7 @@ Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention Cached download icon - + BibTeX download icon @@ -6461,7 +6505,7 @@ Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Cached download icon - + BibTeX download icon @@ -6489,7 +6533,7 @@ I want my voice to be heard: IP over Voice-over-IP for unobservable censorship c Cached download icon - + BibTeX download icon @@ -6511,13 +6555,14 @@ In Proc. of: Network and Distributed System Security, The Parrot is Dead: Observing Unobservable Network Communications +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -6545,7 +6590,7 @@ Message In A Bottle: Sailing Past Censorship Cached download icon - + BibTeX download icon @@ -6573,7 +6618,7 @@ Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Cached download icon - + BibTeX download icon @@ -6601,7 +6646,7 @@ The Anatomy of Web Censorship in Pakistan Cached download icon - + BibTeX download icon @@ -6629,7 +6674,7 @@ Identity-Based Steganography and Its Applications to Censorship Resistance Cached download icon - + BibTeX download icon @@ -6657,7 +6702,7 @@ Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest Cached download icon - + BibTeX download icon @@ -6685,7 +6730,7 @@ On the Feasibility of a Censorship Resistant Decentralized Name System Cached download icon - + BibTeX download icon @@ -6713,7 +6758,7 @@ rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Cached download icon - + BibTeX download icon @@ -6741,7 +6786,7 @@ Towards a Censorship Analyser for Tor Cached download icon - + BibTeX download icon @@ -6769,7 +6814,7 @@ ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship Cached download icon - + BibTeX download icon @@ -6797,7 +6842,7 @@ SWEET: Serving the Web by Exploiting Email Tunnels Cached download icon - + BibTeX download icon @@ -6825,7 +6870,7 @@ The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Cached download icon - + BibTeX download icon @@ -6855,7 +6900,7 @@ Technical analysis of the Ultrasurf proxying software Cached download icon - + BibTeX download icon @@ -6883,7 +6928,7 @@ Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resource Cached download icon - + BibTeX download icon @@ -6911,7 +6956,7 @@ The Hidden Internet of Iran: Private Address Allocations on a National Network Cached download icon - + BibTeX download icon @@ -6939,7 +6984,7 @@ The Collateral Damage of Internet Censorship by DNS Injection Cached download icon - + BibTeX download icon @@ -6967,7 +7012,7 @@ Hold-On: Protecting Against On-Path DNS Poisoning Cached download icon - + BibTeX download icon @@ -6995,7 +7040,7 @@ Evading Censorship with Browser-Based Proxies Cached download icon - + BibTeX download icon @@ -7023,7 +7068,7 @@ OONI: Open Observatory of Network Interference Cached download icon - + BibTeX download icon @@ -7051,7 +7096,7 @@ How Censorship in China Allows Government Criticism but Silences Collective Expr Cached download icon - + BibTeX download icon @@ -7079,7 +7124,7 @@ Bootstrapping Communications into an Anti-Censorship System Cached download icon - + BibTeX download icon @@ -7107,7 +7152,7 @@ Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery Cached download icon - + BibTeX download icon @@ -7135,7 +7180,7 @@ SkypeMorph: Protocol Obfuscation for Tor Bridges Cached download icon - + BibTeX download icon @@ -7163,7 +7208,7 @@ Secure Communication over Diverse Transports Cached download icon - + BibTeX download icon @@ -7191,7 +7236,7 @@ Routing Around Decoys Cached download icon - + BibTeX download icon @@ -7219,7 +7264,7 @@ Adapting Social Spam Infrastructure for Political Censorship Cached download icon - + BibTeX download icon @@ -7247,7 +7292,7 @@ One-way indexing for plausible deniability in censorship resistant storage Cached download icon - + BibTeX download icon @@ -7275,7 +7320,7 @@ Inferring Mechanics of Web Censorship Around the World Cached download icon - + BibTeX download icon @@ -7303,7 +7348,7 @@ CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resista Cached download icon - + BibTeX download icon @@ -7331,7 +7376,7 @@ StegoTorus: A Camouflage Proxy for the Tor Anonymity System Cached download icon - + BibTeX download icon @@ -7359,7 +7404,7 @@ How the Great Firewall of China is Blocking Tor Cached download icon - + BibTeX download icon @@ -7387,7 +7432,7 @@ Regional Variation in Chinese Internet Filtering Cached download icon - + BibTeX download icon @@ -7417,7 +7462,7 @@ BridgeSPA: Improving Tor Bridges with Single Packet Authorization Cached download icon - + BibTeX download icon @@ -7445,7 +7490,7 @@ Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing Cached download icon - + BibTeX download icon @@ -7473,7 +7518,7 @@ In Proc. of: Free and Open Communications on the Internet Cached download icon - + BibTeX download icon @@ -7501,7 +7546,7 @@ Scrambling for lightweight censorship resistance Cached download icon - + BibTeX download icon @@ -7529,7 +7574,7 @@ Analysis of Country-wide Internet Outages Caused by Censorship Cached download icon - + BibTeX download icon @@ -7557,7 +7602,7 @@ An anomaly-based censorship-detection system for Tor Cached download icon - + BibTeX download icon @@ -7585,7 +7630,7 @@ Automated Named Entity Extraction for Tracking Censorship of Current Events Cached download icon - + BibTeX download icon @@ -7613,7 +7658,7 @@ Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Cached download icon - + BibTeX download icon @@ -7641,7 +7686,7 @@ Decoy Routing: Toward Unblockable Internet Communication Cached download icon - + BibTeX download icon @@ -7669,7 +7714,7 @@ Bypassing Internet Censorship for News Broadcasters Cached download icon - + BibTeX download icon @@ -7697,7 +7742,7 @@ Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorsh Cached download icon - + BibTeX download icon @@ -7725,7 +7770,7 @@ Tor Instead of IP Cached download icon - + BibTeX download icon @@ -7753,7 +7798,7 @@ Proximax: A Measurement Based System for Proxies Dissemination Cached download icon - + BibTeX download icon @@ -7781,7 +7826,7 @@ Mapping Local Internet Control Cached download icon - + BibTeX download icon @@ -7809,7 +7854,7 @@ Infrastructures of Censorship and Lessons from Copyright Resistance Cached download icon - + BibTeX download icon @@ -7837,7 +7882,7 @@ CensMon: A Web Censorship Monitor Cached download icon - + BibTeX download icon @@ -7865,7 +7910,7 @@ Online Contribution Practices in Countries that Engage in Internet Blocking and Cached download icon - + BibTeX download icon @@ -7893,7 +7938,7 @@ Dust: A Blocking-Resistant Internet Transport Protocol Cached download icon - + BibTeX download icon @@ -7921,7 +7966,7 @@ Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics Cached download icon - + BibTeX download icon @@ -7949,7 +7994,7 @@ Telex: Anticensorship in the Network Infrastructure Cached download icon - + BibTeX download icon @@ -7977,7 +8022,7 @@ Internet Censorship in China: Where Does the Filtering Occur? Cached download icon - + BibTeX download icon @@ -8007,7 +8052,7 @@ A terminology for talking about privacy by data minimization: Anonymity, Unlinka Cached download icon - + BibTeX download icon @@ -8035,7 +8080,7 @@ Chipping Away at Censorship Firewalls with User-Generated Content Cached download icon - + BibTeX download icon @@ -8063,7 +8108,7 @@ Fighting Censorship with Algorithms Cached download icon - + BibTeX download icon @@ -8091,7 +8136,7 @@ Empirical Study of a National-Scale Distributed Intrusion Detection System: Back Cached download icon - + BibTeX download icon @@ -8121,7 +8166,7 @@ On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking r Cached download icon - + BibTeX download icon @@ -8149,7 +8194,7 @@ Anonymity and Censorship Resistance in Unstructured Overlay Networks Cached download icon - + BibTeX download icon @@ -8177,7 +8222,7 @@ SkyF2F: Censorship Resistant via Skype Overlay Network Cached download icon - + BibTeX download icon @@ -8205,7 +8250,7 @@ Detecting Forged TCP Reset Packets Cached download icon - + BibTeX download icon @@ -8235,7 +8280,7 @@ In Proc. of: Network and Distributed System Security, Cached download icon - + BibTeX download icon @@ -8263,7 +8308,7 @@ Pass it on: Social Networks Stymie Censors Cached download icon - + BibTeX download icon @@ -8293,7 +8338,7 @@ ConceptDoppler: A Weather Tracker for Internet Censorship Cached download icon - + BibTeX download icon @@ -8321,7 +8366,7 @@ The Great DNS Wall of China Cached download icon - + BibTeX download icon @@ -8351,7 +8396,7 @@ Investigating large-scale Internet content filtering Cached download icon - + BibTeX download icon @@ -8379,7 +8424,7 @@ Ignoring the Great Firewall of China Cached download icon - + BibTeX download icon @@ -8407,7 +8452,7 @@ Failures in a Hybrid Content Blocking System Cached download icon - + BibTeX download icon @@ -8435,7 +8480,7 @@ Design of a blocking-resistant anonymity system Cached download icon - + BibTeX download icon @@ -8465,7 +8510,7 @@ Censorship Resistance Revisited Cached download icon - + BibTeX download icon @@ -8495,7 +8540,7 @@ The Economics of Censorship Resistance Cached download icon - + BibTeX download icon @@ -8523,7 +8568,7 @@ How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web S Cached download icon - + BibTeX download icon @@ -8553,7 +8598,7 @@ Government mandated blocking of foreign Web content Cached download icon - + BibTeX download icon @@ -8581,7 +8626,7 @@ Thwarting Web Censorship with Untrusted Messenger Discovery Cached download icon - + BibTeX download icon @@ -8611,7 +8656,7 @@ Infranet: Circumventing Web Censorship and Surveillance Cached download icon - + BibTeX download icon @@ -8639,7 +8684,7 @@ Anonymizing Censorship Resistant Systems Cached download icon - + BibTeX download icon @@ -8669,7 +8714,7 @@ Dagster: Censorship-Resistant Publishing Without Replication Cached download icon - + BibTeX download icon @@ -8697,7 +8742,7 @@ Tangler: A Censorship-Resistant Publishing System Based On Document Entanglement Cached download icon - + BibTeX download icon @@ -8727,7 +8772,7 @@ Publius: A robust, tamper-evident, censorship-resistant web publishing system Cached download icon - + BibTeX download icon @@ -8757,7 +8802,7 @@ The Eternity Service Cached download icon - + BibTeX download icon