diff --git a/index.html b/index.html index c563492..84d03f8 100644 --- a/index.html +++ b/index.html @@ -185,7 +185,7 @@ @@ -221,7 +221,7 @@ Look What’s There! Utilizing the Internet’s Existing Data for Censorship Cir Cached download icon - + BibTeX download icon @@ -249,7 +249,7 @@ Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circu Cached download icon - + BibTeX download icon @@ -277,7 +277,7 @@ SpotProxy: Rediscovering the Cloud for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -305,7 +305,7 @@ Communication Breakdown: Modularizing Application Tunneling for Signaling Around Cached download icon - + BibTeX download icon @@ -333,7 +333,7 @@ Automatic Generation of Web Censorship Probe Lists Cached download icon - + BibTeX download icon @@ -361,7 +361,7 @@ Extended Abstract: The Impact of Online Censorship on LLMs Cached download icon - + BibTeX download icon @@ -389,7 +389,7 @@ Extended Abstract: Leveraging Large Language Models to Identify Internet Censors Cached download icon - + BibTeX download icon @@ -417,7 +417,7 @@ Toward Automated DNS Tampering Detection Using Machine Learning Cached download icon - + BibTeX download icon @@ -445,7 +445,7 @@ Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -473,7 +473,7 @@ Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistan Cached download icon - + BibTeX download icon @@ -501,7 +501,7 @@ Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burd Cached download icon - + BibTeX download icon @@ -529,7 +529,7 @@ Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smugg Cached download icon - + BibTeX download icon @@ -557,7 +557,7 @@ Detecting VPN Traffic through Encapsulated TCP Behavior Cached download icon - + BibTeX download icon @@ -585,7 +585,7 @@ Analyzing Prominent Mobile Apps in Latin America Cached download icon - + BibTeX download icon @@ -613,7 +613,7 @@ Lost in Translation: Characterizing Automated Censorship in Online Translation S Cached download icon - + BibTeX download icon @@ -641,7 +641,7 @@ Identifying VPN Servers through Graph-Represented Behaviors Cached download icon - + BibTeX download icon @@ -669,7 +669,7 @@ GFWeb: Measuring the Great Firewall’s Web Censorship at Scale Cached download icon - + BibTeX download icon @@ -697,7 +697,7 @@ Digital Repression in Palestine Cached download icon - + BibTeX download icon @@ -725,7 +725,7 @@ How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censor Cached download icon - + BibTeX download icon @@ -754,7 +754,7 @@ Snowflake, a censorship circumvention system using temporary WebRTC proxies Cached download icon - + BibTeX download icon @@ -782,7 +782,7 @@ Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against S Cached download icon - + BibTeX download icon @@ -810,7 +810,7 @@ Out in the Open: On the Implementation of Mobile App Filtering in India Cached download icon - + BibTeX download icon @@ -838,7 +838,7 @@ Communication Breakdown: Modularizing Application Tunneling for Signaling Around Cached download icon - + BibTeX download icon @@ -866,7 +866,7 @@ Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model Cached download icon - + BibTeX download icon @@ -894,7 +894,7 @@ Modeling and Detecting Internet Censorship Events Cached download icon - + BibTeX download icon @@ -922,7 +922,7 @@ Internet Sanctions on Russian Media: Actions and Effects Cached download icon - + BibTeX download icon @@ -951,7 +951,7 @@ Bleeding Wall: A Hematologic Examination on the Great Firewall Cached download icon - + BibTeX download icon @@ -979,7 +979,7 @@ Just add WATER: WebAssembly-based Circumvention Transports Cached download icon - + BibTeX download icon @@ -1007,7 +1007,7 @@ Extended Abstract: Traffic Splitting for Pluggable Transports Cached download icon - + BibTeX download icon @@ -1035,7 +1035,7 @@ Extended Abstract: Oscur0: One-shot Circumvention without Registration Cached download icon - + BibTeX download icon @@ -1063,7 +1063,7 @@ Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes Cached download icon - + BibTeX download icon @@ -1091,7 +1091,7 @@ NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge Cached download icon - + BibTeX download icon @@ -1120,7 +1120,7 @@ On Precisely Detecting Censorship Circumvention in Real-World Networks Cached download icon - + BibTeX download icon @@ -1150,7 +1150,7 @@ Discop: Provably secure steganography in practice based on “distribution copie Cached download icon - + BibTeX download icon @@ -1179,7 +1179,7 @@ Poster: Circumventing the GFW with TLS Record Fragmentation Cached download icon - + BibTeX download icon @@ -1207,7 +1207,7 @@ Website blocking in the European Union: Network interference from the perspectiv Cached download icon - + BibTeX download icon @@ -1235,7 +1235,7 @@ Comments on certain past cryptographic flaws affecting fully encrypted censorshi Cached download icon - + BibTeX download icon @@ -1263,7 +1263,7 @@ Destination Unreachable: Characterizing Internet Outages and Shutdowns Cached download icon - + BibTeX download icon @@ -1291,7 +1291,7 @@ Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning Cached download icon - + BibTeX download icon @@ -1319,7 +1319,7 @@ A Study of China’s Censorship and Its Evasion Through the Lens of Online Gamin Cached download icon - + BibTeX download icon @@ -1347,7 +1347,7 @@ DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorshi Cached download icon - + BibTeX download icon @@ -1375,7 +1375,7 @@ TELEPATH: A Minecraft-based Covert Communication System Cached download icon - + BibTeX download icon @@ -1403,7 +1403,7 @@ Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Cached download icon - + BibTeX download icon @@ -1431,7 +1431,7 @@ Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law Cached download icon - + BibTeX download icon @@ -1459,7 +1459,7 @@ A Worldwide View of Nation-state Internet Censorship Cached download icon - + BibTeX download icon @@ -1487,7 +1487,7 @@ The Use of Push Notification in Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1516,7 +1516,7 @@ Measuring and Evading Turkmenistan’s Internet Censorship Cached download icon - + BibTeX download icon @@ -1544,7 +1544,7 @@ Detecting Network Interference Without Endpoint Participation Cached download icon - + BibTeX download icon @@ -1573,7 +1573,7 @@ Running a high-performance pluggable transports Tor bridge Cached download icon - + BibTeX download icon @@ -1601,7 +1601,7 @@ Towards a Comprehensive Understanding of Russian Transit Censorship Cached download icon - + BibTeX download icon @@ -1629,7 +1629,7 @@ Proteus: Programmable Protocols for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1657,7 +1657,7 @@ Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling Cached download icon - + BibTeX download icon @@ -1685,7 +1685,7 @@ Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -1713,7 +1713,7 @@ Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale f Cached download icon - + BibTeX download icon @@ -1741,7 +1741,7 @@ How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic Cached download icon - + BibTeX download icon @@ -1770,7 +1770,7 @@ Lox: Protecting the Social Graph in Bridge Distribution Cached download icon - + BibTeX download icon @@ -1798,7 +1798,7 @@ Dolphin: A Cellular Voice Based Internet Shutdown Resistance System Cached download icon - + BibTeX download icon @@ -1827,7 +1827,7 @@ CensorWatch: On the Implementation of Online Censorship in India Cached download icon - + BibTeX download icon @@ -1856,7 +1856,7 @@ Chasing Shadows: A security analysis of the ShadowTLS proxy Cached download icon - + BibTeX download icon @@ -1885,7 +1885,7 @@ Security Notions for Fully Encrypted Protocols Cached download icon - + BibTeX download icon @@ -1913,7 +1913,7 @@ Advancing the Art of Censorship Data Analysis Cached download icon - + BibTeX download icon @@ -1941,7 +1941,7 @@ Global, Passive Detection of Connection Tampering Cached download icon - + BibTeX download icon @@ -1959,7 +1959,35 @@ In Proc. of: SIGCOMM, 2023, ACM