From 8c3f8ff7e0702366edaf45eca63b0015fc1f07dd Mon Sep 17 00:00:00 2001 From: NullHypothesis Date: Thu, 6 Nov 2025 13:46:43 +0000 Subject: [PATCH] =?UTF-8?q?Deploying=20to=20gh-pages=20from=20@=20NullHypo?= =?UTF-8?q?thesis/censorbib@b915f4f87c555d7be73e216d98d6f26c539ad9aa=20?= =?UTF-8?q?=F0=9F=9A=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- index.html | 716 ++++++++++++++++++++++++++--------------------------- 1 file changed, 358 insertions(+), 358 deletions(-) diff --git a/index.html b/index.html index 9883bcb..4bc7f23 100644 --- a/index.html +++ b/index.html @@ -244,7 +244,7 @@ Steffen Wendzel, Simon Volpert, Sebastian Zillien, Julia Lenz, Philip Rünz, Luc -In: Computers & Security, 2025 +In: Computers & Security, 2025, ScienceDirect
  • @@ -258,7 +258,7 @@ Censorship Evasion with Unidentified Protocol Generation Cached download icon - + BibTeX download icon @@ -286,7 +286,7 @@ IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran Cached download icon - + BibTeX download icon @@ -314,7 +314,7 @@ Extended Abstract: I’ll Shake Your Hand: What Happens After DNS Poisoning Cached download icon - + BibTeX download icon @@ -342,7 +342,7 @@ Evaluating Onion Address Collection Methods Cached download icon - + BibTeX download icon @@ -370,7 +370,7 @@ Hidden Links: Analyzing Secret Families of VPN Apps Cached download icon - + BibTeX download icon @@ -398,7 +398,7 @@ Probing the third-party infrastructure of digital news on the Web Cached download icon - + BibTeX download icon @@ -426,7 +426,7 @@ In Proc. of: Free and Open Communications on the Internet Cached download icon - + BibTeX download icon @@ -454,7 +454,7 @@ Encrypted Client Hello (ECH) in Censorship Circumvention Cached download icon - + BibTeX download icon @@ -482,7 +482,7 @@ Extended Abstract: Nobody’s Fault but Mine: Using Unauthenticated Unidirection Cached download icon - + BibTeX download icon @@ -510,7 +510,7 @@ Extended Abstract: Shaperd: Easily Adoptable Real-Time Traffic Shaper for Fully Cached download icon - + BibTeX download icon @@ -538,7 +538,7 @@ Fingerprint-resistant DTLS for usage in Snowflake Cached download icon - + BibTeX download icon @@ -566,7 +566,7 @@ An Improved BGP Internet Graph for Optimizing Refraction Proxy Placement Cached download icon - + BibTeX download icon @@ -594,7 +594,7 @@ Position Paper: A Case for Machine-Checked Verification of Circumvention Systems Cached download icon - + BibTeX download icon @@ -622,7 +622,7 @@ Extended Abstract: Traffic Shaping for Network Protocols: A Modular and Develope Cached download icon - + BibTeX download icon @@ -650,7 +650,7 @@ A Wall Behind A Wall: Emerging Regional Censorship in China Cached download icon - + BibTeX download icon @@ -678,7 +678,7 @@ Learning from Censored Experiences: Social Media Discussions around Censorship C Cached download icon - + BibTeX download icon @@ -706,7 +706,7 @@ Transport Layer Obscurity: Circumventing SNI Censorship on the TLS Layer Cached download icon - + BibTeX download icon @@ -734,7 +734,7 @@ Is Nobody There? Good! Globally Measuring Connection Tampering without Responsiv Cached download icon - + BibTeX download icon @@ -763,7 +763,7 @@ Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China Cached download icon - + BibTeX download icon @@ -791,7 +791,7 @@ The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic Cached download icon - + BibTeX download icon @@ -819,7 +819,7 @@ Is Custom Congestion Control a Bad Idea for Circumvention Tools? Cached download icon - + BibTeX download icon @@ -847,7 +847,7 @@ I(ra)nconsistencies: Novel Insights into Iran’s Censorship Cached download icon - + BibTeX download icon @@ -875,7 +875,7 @@ Extended Abstract: Using TURN Servers for Censorship Evasion Cached download icon - + BibTeX download icon @@ -903,7 +903,7 @@ Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censo Cached download icon - + BibTeX download icon @@ -931,7 +931,7 @@ Examining Leading Pakistani Mobile Apps Cached download icon - + BibTeX download icon @@ -959,7 +959,7 @@ Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing Cached download icon - + BibTeX download icon @@ -988,7 +988,7 @@ Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of Ch Cached download icon - + BibTeX download icon @@ -1018,7 +1018,7 @@ Look What’s There! Utilizing the Internet’s Existing Data for Censorship Cir Cached download icon - + BibTeX download icon @@ -1046,7 +1046,7 @@ Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circu Cached download icon - + BibTeX download icon @@ -1074,7 +1074,7 @@ SpotProxy: Rediscovering the Cloud for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1102,7 +1102,7 @@ Communication Breakdown: Modularizing Application Tunneling for Signaling Around Cached download icon - + BibTeX download icon @@ -1130,7 +1130,7 @@ Automatic Generation of Web Censorship Probe Lists Cached download icon - + BibTeX download icon @@ -1158,7 +1158,7 @@ Extended Abstract: The Impact of Online Censorship on LLMs Cached download icon - + BibTeX download icon @@ -1186,7 +1186,7 @@ Extended Abstract: Leveraging Large Language Models to Identify Internet Censors Cached download icon - + BibTeX download icon @@ -1214,7 +1214,7 @@ Toward Automated DNS Tampering Detection Using Machine Learning Cached download icon - + BibTeX download icon @@ -1242,7 +1242,7 @@ Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1270,7 +1270,7 @@ Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistan Cached download icon - + BibTeX download icon @@ -1298,7 +1298,7 @@ Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burd Cached download icon - + BibTeX download icon @@ -1326,7 +1326,7 @@ Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smugg Cached download icon - + BibTeX download icon @@ -1354,7 +1354,7 @@ Detecting VPN Traffic through Encapsulated TCP Behavior Cached download icon - + BibTeX download icon @@ -1382,7 +1382,7 @@ Analyzing Prominent Mobile Apps in Latin America Cached download icon - + BibTeX download icon @@ -1410,7 +1410,7 @@ Lost in Translation: Characterizing Automated Censorship in Online Translation S Cached download icon - + BibTeX download icon @@ -1438,7 +1438,7 @@ Identifying VPN Servers through Graph-Represented Behaviors Cached download icon - + BibTeX download icon @@ -1466,7 +1466,7 @@ GFWeb: Measuring the Great Firewall’s Web Censorship at Scale Cached download icon - + BibTeX download icon @@ -1494,7 +1494,7 @@ Digital Repression in Palestine Cached download icon - + BibTeX download icon @@ -1522,7 +1522,7 @@ How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censor Cached download icon - + BibTeX download icon @@ -1551,7 +1551,7 @@ Snowflake, a censorship circumvention system using temporary WebRTC proxies Cached download icon - + BibTeX download icon @@ -1579,7 +1579,7 @@ Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against S Cached download icon - + BibTeX download icon @@ -1607,7 +1607,7 @@ Out in the Open: On the Implementation of Mobile App Filtering in India Cached download icon - + BibTeX download icon @@ -1635,7 +1635,7 @@ Communication Breakdown: Modularizing Application Tunneling for Signaling Around Cached download icon - + BibTeX download icon @@ -1663,7 +1663,7 @@ Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model Cached download icon - + BibTeX download icon @@ -1691,7 +1691,7 @@ Modeling and Detecting Internet Censorship Events Cached download icon - + BibTeX download icon @@ -1719,7 +1719,7 @@ Internet Sanctions on Russian Media: Actions and Effects Cached download icon - + BibTeX download icon @@ -1748,7 +1748,7 @@ Bleeding Wall: A Hematologic Examination on the Great Firewall Cached download icon - + BibTeX download icon @@ -1776,7 +1776,7 @@ Just add WATER: WebAssembly-based Circumvention Transports Cached download icon - + BibTeX download icon @@ -1804,7 +1804,7 @@ Extended Abstract: Traffic Splitting for Pluggable Transports Cached download icon - + BibTeX download icon @@ -1832,7 +1832,7 @@ Extended Abstract: Oscur0: One-shot Circumvention without Registration Cached download icon - + BibTeX download icon @@ -1860,7 +1860,7 @@ Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes Cached download icon - + BibTeX download icon @@ -1888,7 +1888,7 @@ NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge Cached download icon - + BibTeX download icon @@ -1917,7 +1917,7 @@ On Precisely Detecting Censorship Circumvention in Real-World Networks Cached download icon - + BibTeX download icon @@ -1947,7 +1947,7 @@ Discop: Provably secure steganography in practice based on “distribution copie Cached download icon - + BibTeX download icon @@ -1976,7 +1976,7 @@ Poster: Circumventing the GFW with TLS Record Fragmentation Cached download icon - + BibTeX download icon @@ -2004,7 +2004,7 @@ Website blocking in the European Union: Network interference from the perspectiv Cached download icon - + BibTeX download icon @@ -2032,7 +2032,7 @@ Comments on certain past cryptographic flaws affecting fully encrypted censorshi Cached download icon - + BibTeX download icon @@ -2060,7 +2060,7 @@ Destination Unreachable: Characterizing Internet Outages and Shutdowns Cached download icon - + BibTeX download icon @@ -2088,7 +2088,7 @@ Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning Cached download icon - + BibTeX download icon @@ -2116,7 +2116,7 @@ A Study of China’s Censorship and Its Evasion Through the Lens of Online Gamin Cached download icon - + BibTeX download icon @@ -2144,7 +2144,7 @@ DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorshi Cached download icon - + BibTeX download icon @@ -2172,7 +2172,7 @@ TELEPATH: A Minecraft-based Covert Communication System Cached download icon - + BibTeX download icon @@ -2200,7 +2200,7 @@ Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Cached download icon - + BibTeX download icon @@ -2228,7 +2228,7 @@ Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law Cached download icon - + BibTeX download icon @@ -2256,7 +2256,7 @@ A Worldwide View of Nation-state Internet Censorship Cached download icon - + BibTeX download icon @@ -2284,7 +2284,7 @@ The Use of Push Notification in Censorship Circumvention Cached download icon - + BibTeX download icon @@ -2313,7 +2313,7 @@ Measuring and Evading Turkmenistan’s Internet Censorship Cached download icon - + BibTeX download icon @@ -2341,7 +2341,7 @@ Detecting Network Interference Without Endpoint Participation Cached download icon - + BibTeX download icon @@ -2370,7 +2370,7 @@ Running a high-performance pluggable transports Tor bridge Cached download icon - + BibTeX download icon @@ -2398,7 +2398,7 @@ Towards a Comprehensive Understanding of Russian Transit Censorship Cached download icon - + BibTeX download icon @@ -2426,7 +2426,7 @@ Proteus: Programmable Protocols for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -2454,7 +2454,7 @@ Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling Cached download icon - + BibTeX download icon @@ -2482,7 +2482,7 @@ Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -2510,7 +2510,7 @@ Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale f Cached download icon - + BibTeX download icon @@ -2538,7 +2538,7 @@ How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic Cached download icon - + BibTeX download icon @@ -2567,7 +2567,7 @@ Lox: Protecting the Social Graph in Bridge Distribution Cached download icon - + BibTeX download icon @@ -2595,7 +2595,7 @@ Dolphin: A Cellular Voice Based Internet Shutdown Resistance System Cached download icon - + BibTeX download icon @@ -2624,7 +2624,7 @@ CensorWatch: On the Implementation of Online Censorship in India Cached download icon - + BibTeX download icon @@ -2653,7 +2653,7 @@ Chasing Shadows: A security analysis of the ShadowTLS proxy Cached download icon - + BibTeX download icon @@ -2682,7 +2682,7 @@ Security Notions for Fully Encrypted Protocols Cached download icon - + BibTeX download icon @@ -2710,7 +2710,7 @@ Advancing the Art of Censorship Data Analysis Cached download icon - + BibTeX download icon @@ -2738,7 +2738,7 @@ Global, Passive Detection of Connection Tampering Cached download icon - + BibTeX download icon @@ -2768,7 +2768,7 @@ In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolve Cached download icon - + BibTeX download icon @@ -2796,7 +2796,7 @@ Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with Cached download icon - + BibTeX download icon @@ -2824,7 +2824,7 @@ Network Measurement Methods for Locating and Examining Censorship Devices Cached download icon - + BibTeX download icon @@ -2852,7 +2852,7 @@ TSPU: Russia’s Decentralized Censorship System Cached download icon - + BibTeX download icon @@ -2880,7 +2880,7 @@ Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement Cached download icon - + BibTeX download icon @@ -2908,7 +2908,7 @@ GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -2936,7 +2936,7 @@ OpenVPN is Open to VPN Fingerprinting Cached download icon - + BibTeX download icon @@ -2965,7 +2965,7 @@ Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Cached download icon - + BibTeX download icon @@ -2993,7 +2993,7 @@ COVID-19 increased censorship circumvention and access to sensitive topics in Ch Cached download icon - + BibTeX download icon @@ -3021,7 +3021,7 @@ Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Cached download icon - + BibTeX download icon @@ -3051,7 +3051,7 @@ Understanding Internet Censorship in Europe: The Case of Spain Cached download icon - + BibTeX download icon @@ -3079,7 +3079,7 @@ OUStralopithecus: Overt User Simulation for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -3107,7 +3107,7 @@ Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels Cached download icon - + BibTeX download icon @@ -3135,7 +3135,7 @@ Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China Cached download icon - + BibTeX download icon @@ -3164,7 +3164,7 @@ Meteor: Cryptographically Secure Steganography for Realistic Distributions Cached download icon - + BibTeX download icon @@ -3192,7 +3192,7 @@ Throttling Twitter: an emerging censorship technique in Russia Cached download icon - + BibTeX download icon @@ -3221,7 +3221,7 @@ Web censorship measurements of HTTP/3 over QUIC Cached download icon - + BibTeX download icon @@ -3249,7 +3249,7 @@ Measuring DoT/DoH blocking using OONI Probe: a preliminary study Cached download icon - + BibTeX download icon @@ -3277,7 +3277,7 @@ A multi-perspective view of Internet censorship in Myanmar Cached download icon - + BibTeX download icon @@ -3305,7 +3305,7 @@ Measuring QQMail’s Automated Email Censorship in China Cached download icon - + BibTeX download icon @@ -3334,7 +3334,7 @@ Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels Cached download icon - + BibTeX download icon @@ -3362,7 +3362,7 @@ Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middlebo Cached download icon - + BibTeX download icon @@ -3391,7 +3391,7 @@ BlindTLS: Circumventing TLS-Based HTTPS Censorship Cached download icon - + BibTeX download icon @@ -3420,7 +3420,7 @@ Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resis Cached download icon - + BibTeX download icon @@ -3448,7 +3448,7 @@ Weaponizing Middleboxes for TCP Reflected Amplification Cached download icon - + BibTeX download icon @@ -3476,7 +3476,7 @@ How Great is the Great Firewall? Measuring China’s DNS Censorship Cached download icon - + BibTeX download icon @@ -3505,7 +3505,7 @@ Balboa: Bobbing and Weaving around Network Censorship Cached download icon - + BibTeX download icon @@ -3533,7 +3533,7 @@ Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Cached download icon - + BibTeX download icon @@ -3562,7 +3562,7 @@ Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs Cached download icon - + BibTeX download icon @@ -3593,7 +3593,7 @@ Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert C Cached download icon - + BibTeX download icon @@ -3622,7 +3622,7 @@ Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communication Cached download icon - + BibTeX download icon @@ -3651,7 +3651,7 @@ Censored Planet: An Internet-wide, Longitudinal Censorship Observatory Cached download icon - + BibTeX download icon @@ -3679,7 +3679,7 @@ How China Detects and Blocks Shadowsocks Cached download icon - + BibTeX download icon @@ -3708,7 +3708,7 @@ Investigating Large Scale HTTPS Interception in Kazakhstan Cached download icon - + BibTeX download icon @@ -3736,7 +3736,7 @@ Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side E Cached download icon - + BibTeX download icon @@ -3764,7 +3764,7 @@ MIMIQ: Masking IPs with Migration in QUIC Cached download icon - + BibTeX download icon @@ -3793,7 +3793,7 @@ Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Ar Cached download icon - + BibTeX download icon @@ -3822,7 +3822,7 @@ Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior Cached download icon - + BibTeX download icon @@ -3851,7 +3851,7 @@ Slitheen++: Stealth TLS-based Decoy Routing Cached download icon - + BibTeX download icon @@ -3880,7 +3880,7 @@ Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Fil Cached download icon - + BibTeX download icon @@ -3908,7 +3908,7 @@ Turbo Tunnel, a good way to design censorship circumvention protocols Cached download icon - + BibTeX download icon @@ -3937,7 +3937,7 @@ HTTPT: A Probe-Resistant Proxy Cached download icon - + BibTeX download icon @@ -3965,7 +3965,7 @@ How India Censors the Web Cached download icon - + BibTeX download icon @@ -3994,7 +3994,7 @@ Characterizing Transnational Internet Performance and the Great Bottleneck of Ch Cached download icon - + BibTeX download icon @@ -4023,7 +4023,7 @@ SiegeBreaker: An SDN Based Practical Decoy Routing System Cached download icon - + BibTeX download icon @@ -4052,7 +4052,7 @@ Running Refraction Networking for Real Cached download icon - + BibTeX download icon @@ -4081,7 +4081,7 @@ MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencie Cached download icon - + BibTeX download icon @@ -4110,7 +4110,7 @@ ICLab: A Global, Longitudinal Internet Censorship Measurement Platform Cached download icon - + BibTeX download icon @@ -4139,7 +4139,7 @@ SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Disco Cached download icon - + BibTeX download icon @@ -4168,7 +4168,7 @@ MassBrowser: Unblocking the Censored Web for the Masses, by the Masses Cached download icon - + BibTeX download icon @@ -4197,7 +4197,7 @@ Detecting Probe-resistant Proxies Cached download icon - + BibTeX download icon @@ -4226,7 +4226,7 @@ Measuring the Deployment of Network Censorship Filters at Global Scale Cached download icon - + BibTeX download icon @@ -4255,7 +4255,7 @@ Decentralized Control: A Case Study of Russia Cached download icon - + BibTeX download icon @@ -4283,7 +4283,7 @@ Protocol Proxy: An FTE-based covert channel Cached download icon - + BibTeX download icon @@ -4313,7 +4313,7 @@ The Impact of Media Censorship: 1984 or Brave New World? Cached download icon - + BibTeX download icon @@ -4342,7 +4342,7 @@ Conjure: Summoning Proxies from Unused Address Space Cached download icon - + BibTeX download icon @@ -4371,7 +4371,7 @@ Geneva: Evolving Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -4399,7 +4399,7 @@ Distributed Detection of Tor Directory Authorities Censorship in Mexico Cached download icon - + BibTeX download icon @@ -4427,7 +4427,7 @@ Shedding Light on Mobile App Store Censorship Cached download icon - + BibTeX download icon @@ -4456,7 +4456,7 @@ Improving Meek With Adversarial Techniques Cached download icon - + BibTeX download icon @@ -4485,7 +4485,7 @@ On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention Cached download icon - + BibTeX download icon @@ -4513,7 +4513,7 @@ An Efficient Method to Determine which Combination of Keywords Triggered Automat Cached download icon - + BibTeX download icon @@ -4542,7 +4542,7 @@ Measuring I2P Censorship at a Global Scale Cached download icon - + BibTeX download icon @@ -4570,7 +4570,7 @@ Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory Cached download icon - + BibTeX download icon @@ -4599,7 +4599,7 @@ The use of TLS in Censorship Circumvention Cached download icon - + BibTeX download icon @@ -4629,7 +4629,7 @@ On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Ce Cached download icon - + BibTeX download icon @@ -4657,7 +4657,7 @@ Where The Light Gets In: Analyzing Web Censorship Mechanisms in India Cached download icon - + BibTeX download icon @@ -4685,7 +4685,7 @@ In Proc. of: Internet Measurement Conference, 2018, A Cached download icon - + BibTeX download icon @@ -4713,7 +4713,7 @@ An Empirical Study of the I2P Anonymity Network and its Censorship Resistance Cached download icon - + BibTeX download icon @@ -4742,7 +4742,7 @@ Secure asymmetry and deployability for decoy routing systems Cached download icon - + BibTeX download icon @@ -4771,7 +4771,7 @@ Effective Detection of Multimedia Protocol Tunneling using Machine Learning Cached download icon - + BibTeX download icon @@ -4800,7 +4800,7 @@ Quack: Scalable Remote Measurement of Application-Layer Censorship Cached download icon - + BibTeX download icon @@ -4828,7 +4828,7 @@ Incentivizing Censorship Measurements via Circumvention Cached download icon - + BibTeX download icon @@ -4857,7 +4857,7 @@ Analyzing China’s Blocking of Unpublished Tor Bridges Cached download icon - + BibTeX download icon @@ -4886,7 +4886,7 @@ MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption Cached download icon - + BibTeX download icon @@ -4914,7 +4914,7 @@ An analysis of automatic image filtering on WeChat Moments Cached download icon - + BibTeX download icon @@ -4942,7 +4942,7 @@ A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability Cached download icon - + BibTeX download icon @@ -4970,7 +4970,7 @@ Automatically Generating a Large, Culture-Specific Blocklist for China Cached download icon - + BibTeX download icon @@ -4998,7 +4998,7 @@ How Sudden Censorship Can Increase Access to Information Cached download icon - + BibTeX download icon @@ -5026,7 +5026,7 @@ Detecting Censorable Content on Sina Weibo: A Pilot Study Cached download icon - + BibTeX download icon @@ -5054,7 +5054,7 @@ Proof-of-Censorship: Enabling centralized censorship-resistant content providers Cached download icon - + BibTeX download icon @@ -5084,7 +5084,7 @@ The Devil’s in The Details: Placing Decoy Routers in the Internet Cached download icon - + BibTeX download icon @@ -5112,7 +5112,7 @@ Lavinia: An audit-payment protocol for censorship-resistant storage Cached download icon - + BibTeX download icon @@ -5140,7 +5140,7 @@ The Random Forest based Detection of Shadowsock’s Traffic Cached download icon - + BibTeX download icon @@ -5168,7 +5168,7 @@ DeTor: Provably Avoiding Geographic Regions in Tor Cached download icon - + BibTeX download icon @@ -5196,7 +5196,7 @@ Mending Wall: On the Implementation of Censorship in India Cached download icon - + BibTeX download icon @@ -5224,7 +5224,7 @@ Online Advertising under Internet Censorship Cached download icon - + BibTeX download icon @@ -5252,7 +5252,7 @@ Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Cached download icon - + BibTeX download icon @@ -5280,7 +5280,7 @@ Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Cached download icon - + BibTeX download icon @@ -5308,7 +5308,7 @@ A Churn for the Better: Localizing Censorship using Network-level Path Churn and Cached download icon - + BibTeX download icon @@ -5336,7 +5336,7 @@ The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attac Cached download icon - + BibTeX download icon @@ -5364,7 +5364,7 @@ Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship Cached download icon - + BibTeX download icon @@ -5392,7 +5392,7 @@ lib·erate, (n): A library for exposing (traffic-classification) rules and avoid Cached download icon - + BibTeX download icon @@ -5420,7 +5420,7 @@ When the Internet Goes Down in Bangladesh Cached download icon - + BibTeX download icon @@ -5448,7 +5448,7 @@ Characterizing the Nature and Dynamics of Tor Exit Blocking Cached download icon - + BibTeX download icon @@ -5476,7 +5476,7 @@ Global Measurement of DNS Manipulation Cached download icon - + BibTeX download icon @@ -5504,7 +5504,7 @@ FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URL Cached download icon - + BibTeX download icon @@ -5532,7 +5532,7 @@ Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Cached download icon - + BibTeX download icon @@ -5560,7 +5560,7 @@ The Decline of Social Media Censorship and the Rise of Self-Censorship after the Cached download icon - + BibTeX download icon @@ -5589,7 +5589,7 @@ Autosonda: Discovering Rules and Triggers of Censorship Devices Cached download icon - + BibTeX download icon @@ -5617,7 +5617,7 @@ An ISP-Scale Deployment of TapDance Cached download icon - + BibTeX download icon @@ -5645,7 +5645,7 @@ DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Video Cached download icon - + BibTeX download icon @@ -5673,7 +5673,7 @@ Topics of Controversy: An Empirical Analysis of Web Censorship Lists Cached download icon - + BibTeX download icon @@ -5701,7 +5701,7 @@ A Usability Evaluation of Tor Launcher Cached download icon - + BibTeX download icon @@ -5729,7 +5729,7 @@ Augur: Internet-Wide Detection of Connectivity Disruptions Cached download icon - + BibTeX download icon @@ -5757,7 +5757,7 @@ Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers Cached download icon - + BibTeX download icon @@ -5785,7 +5785,7 @@ Internet Censorship in Thailand: User Practices and Potential Threats Cached download icon - + BibTeX download icon @@ -5813,7 +5813,7 @@ Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infras Cached download icon - + BibTeX download icon @@ -5843,7 +5843,7 @@ Fingerprintability of WebRTC Cached download icon - + BibTeX download icon @@ -5871,7 +5871,7 @@ Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses Cached download icon - + BibTeX download icon @@ -5899,7 +5899,7 @@ Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement Cached download icon - + BibTeX download icon @@ -5927,7 +5927,7 @@ Game of Decoys: Optimal Decoy Routing Through Game Theory Cached download icon - + BibTeX download icon @@ -5955,7 +5955,7 @@ Practical Censorship Evasion Leveraging Content Delivery Networks Cached download icon - + BibTeX download icon @@ -5983,7 +5983,7 @@ DNS-sly: Avoiding Censorship through Network Complexity Cached download icon - + BibTeX download icon @@ -6011,7 +6011,7 @@ Matryoshka: Hiding Secret Communication in Plain Sight Cached download icon - + BibTeX download icon @@ -6039,7 +6039,7 @@ GhostPost: Seamless Restoration of Censored Social Media Posts Cached download icon - + BibTeX download icon @@ -6067,7 +6067,7 @@ Censors’ Delay in Blocking Circumvention Proxies Cached download icon - + BibTeX download icon @@ -6095,7 +6095,7 @@ The Politics of Routing: Investigating the Relationship Between AS Connectivity Cached download icon - + BibTeX download icon @@ -6123,7 +6123,7 @@ A Framework for the Game-theoretic Analysis of Censorship Resistance Cached download icon - + BibTeX download icon @@ -6151,7 +6151,7 @@ SoK: Making Sense of Censorship Resistance Systems Cached download icon - + BibTeX download icon @@ -6180,7 +6180,7 @@ Salmon: Robust Proxy Distribution for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -6208,7 +6208,7 @@ Satellite: Joint Analysis of CDNs and Network-Level Interference Cached download icon - + BibTeX download icon @@ -6236,7 +6236,7 @@ Analyzing Internet Censorship in Pakistan Cached download icon - + BibTeX download icon @@ -6264,7 +6264,7 @@ Leveraging Internet Services to Evade Censorship Cached download icon - + BibTeX download icon @@ -6292,7 +6292,7 @@ Games Without Frontiers: Investigating Video Games as a Covert Channel Cached download icon - + BibTeX download icon @@ -6320,7 +6320,7 @@ Mailet: Instant Social Networking under Censorship Cached download icon - + BibTeX download icon @@ -6348,7 +6348,7 @@ CovertCast: Using Live Streaming to Evade Internet Censorship Cached download icon - + BibTeX download icon @@ -6376,7 +6376,7 @@ SkypeLine: Robust Hidden Data Transmission for VoIP Cached download icon - + BibTeX download icon @@ -6404,7 +6404,7 @@ Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regi Cached download icon - + BibTeX download icon @@ -6432,7 +6432,7 @@ SoK: Towards Grounding Censorship Circumvention in Empiricism Cached download icon - + BibTeX download icon @@ -6462,7 +6462,7 @@ Alibi Routing Cached download icon - + BibTeX download icon @@ -6490,7 +6490,7 @@ No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement Cached download icon - + BibTeX download icon @@ -6518,7 +6518,7 @@ Rebound: Decoy Routing on Asymmetric Routes Via Error Messages Cached download icon - + BibTeX download icon @@ -6546,7 +6546,7 @@ Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homopho Cached download icon - + BibTeX download icon @@ -6574,7 +6574,7 @@ A Case for Marrying Censorship Measurements with Circumvention Cached download icon - + BibTeX download icon @@ -6602,7 +6602,7 @@ Can Censorship Measurements Be Safe(r)? Cached download icon - + BibTeX download icon @@ -6630,7 +6630,7 @@ Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Pl Cached download icon - + BibTeX download icon @@ -6658,7 +6658,7 @@ Known Unknowns: An Analysis of Twitter Censorship in Turkey Cached download icon - + BibTeX download icon @@ -6687,7 +6687,7 @@ Examining How the Great Firewall Discovers Hidden Circumvention Servers Cached download icon - + BibTeX download icon @@ -6715,7 +6715,7 @@ CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content Cached download icon - + BibTeX download icon @@ -6743,7 +6743,7 @@ Seeing through Network-Protocol Obfuscation Cached download icon - + BibTeX download icon @@ -6771,7 +6771,7 @@ Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Cached download icon - + BibTeX download icon @@ -6799,7 +6799,7 @@ Understanding Internet Censorship Policy: The Case of Greece Cached download icon - + BibTeX download icon @@ -6827,7 +6827,7 @@ Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms Cached download icon - + BibTeX download icon @@ -6855,7 +6855,7 @@ An Analysis of China’s “Great Cannon” Cached download icon - + BibTeX download icon @@ -6883,7 +6883,7 @@ Marionette: A Programmable Network-Traffic Obfuscation System Cached download icon - + BibTeX download icon @@ -6911,7 +6911,7 @@ Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests Cached download icon - + BibTeX download icon @@ -6939,7 +6939,7 @@ Ethical Concerns for Censorship Measurement Cached download icon - + BibTeX download icon @@ -6967,7 +6967,7 @@ Analyzing the Great Firewall of China Over Space and Time Cached download icon - + BibTeX download icon @@ -6995,7 +6995,7 @@ Blocking-resistant communication through domain fronting Cached download icon - + BibTeX download icon @@ -7023,7 +7023,7 @@ Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Cached download icon - + BibTeX download icon @@ -7051,7 +7051,7 @@ Internet Censorship detection: A survey Cached download icon - + BibTeX download icon @@ -7079,7 +7079,7 @@ Monitoring Internet Censorship with UBICA Cached download icon - + BibTeX download icon @@ -7109,7 +7109,7 @@ GoHop: Personal VPN to Defend from Censorship Cached download icon - + BibTeX download icon @@ -7137,7 +7137,7 @@ Global Network Interference Detection over the RIPE Atlas Network Cached download icon - + BibTeX download icon @@ -7165,7 +7165,7 @@ Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship Cached download icon - + BibTeX download icon @@ -7193,7 +7193,7 @@ CloudTransport: Using Cloud Storage for Censorship-Resistant Networking Cached download icon - + BibTeX download icon @@ -7221,7 +7221,7 @@ Censorship in the Wild: Analyzing Internet Filtering in Syria Cached download icon - + BibTeX download icon @@ -7249,7 +7249,7 @@ TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography Cached download icon - + BibTeX download icon @@ -7277,7 +7277,7 @@ Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels Cached download icon - + BibTeX download icon @@ -7305,7 +7305,7 @@ No Direction Home: The True Cost of Routing Around Decoys Cached download icon - + BibTeX download icon @@ -7333,7 +7333,7 @@ Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Cached download icon - + BibTeX download icon @@ -7361,7 +7361,7 @@ Automated Detection and Fingerprinting of Censorship Block Pages Cached download icon - + BibTeX download icon @@ -7389,7 +7389,7 @@ A Look at the Consequences of Internet Censorship Through an ISP Lens Cached download icon - + BibTeX download icon @@ -7417,7 +7417,7 @@ Reverse-engineering censorship in China: Randomized experimentation and particip Cached download icon - + BibTeX download icon @@ -7445,7 +7445,7 @@ Facet: Streaming over Videoconferencing for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -7473,7 +7473,7 @@ LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Cached download icon - + BibTeX download icon @@ -7501,7 +7501,7 @@ Toward automatic censorship detection in microblogs Cached download icon - + BibTeX download icon @@ -7529,7 +7529,7 @@ VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance Cached download icon - + BibTeX download icon @@ -7557,7 +7557,7 @@ Measuring Freenet in the Wild: Censorship-resilience under Observation Cached download icon - + BibTeX download icon @@ -7585,7 +7585,7 @@ Censorship Resistance as a Side-Effect Cached download icon - + BibTeX download icon @@ -7613,7 +7613,7 @@ A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System Cached download icon - + BibTeX download icon @@ -7641,7 +7641,7 @@ TapDance: End-to-Middle Anticensorship without Flow Blocking Cached download icon - + BibTeX download icon @@ -7671,7 +7671,7 @@ Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorshi Cached download icon - + BibTeX download icon @@ -7699,7 +7699,7 @@ Self-Censorship on Facebook Cached download icon - + BibTeX download icon @@ -7727,7 +7727,7 @@ Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran Cached download icon - + BibTeX download icon @@ -7756,7 +7756,7 @@ Internet Censorship in Iran: A First Look Cached download icon - + BibTeX download icon @@ -7784,7 +7784,7 @@ Gaining Insight into AS-level Outages through Analysis of Internet Background Ra Cached download icon - + BibTeX download icon @@ -7812,7 +7812,7 @@ Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on S Cached download icon - + BibTeX download icon @@ -7840,7 +7840,7 @@ A Method for Identifying and Confirming the Use of URL Filtering Products for Ce Cached download icon - + BibTeX download icon @@ -7868,7 +7868,7 @@ Revealing Middlebox Interference with Tracebox Cached download icon - + BibTeX download icon @@ -7896,7 +7896,7 @@ Protocol Misidentification Made Easy with Format-Transforming Encryption Cached download icon - + BibTeX download icon @@ -7924,7 +7924,7 @@ OSS: Using Online Scanning Services for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -7952,7 +7952,7 @@ Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention Cached download icon - + BibTeX download icon @@ -7980,7 +7980,7 @@ Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Cached download icon - + BibTeX download icon @@ -8008,7 +8008,7 @@ I want my voice to be heard: IP over Voice-over-IP for unobservable censorship c Cached download icon - + BibTeX download icon @@ -8037,7 +8037,7 @@ The Parrot is Dead: Observing Unobservable Network Communications Cached download icon - + BibTeX download icon @@ -8065,7 +8065,7 @@ Message In A Bottle: Sailing Past Censorship Cached download icon - + BibTeX download icon @@ -8093,7 +8093,7 @@ Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Cached download icon - + BibTeX download icon @@ -8121,7 +8121,7 @@ The Anatomy of Web Censorship in Pakistan Cached download icon - + BibTeX download icon @@ -8149,7 +8149,7 @@ Identity-Based Steganography and Its Applications to Censorship Resistance Cached download icon - + BibTeX download icon @@ -8177,7 +8177,7 @@ Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest Cached download icon - + BibTeX download icon @@ -8205,7 +8205,7 @@ On the Feasibility of a Censorship Resistant Decentralized Name System Cached download icon - + BibTeX download icon @@ -8233,7 +8233,7 @@ rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Cached download icon - + BibTeX download icon @@ -8261,7 +8261,7 @@ Towards a Censorship Analyser for Tor Cached download icon - + BibTeX download icon @@ -8289,7 +8289,7 @@ ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship Cached download icon - + BibTeX download icon @@ -8317,7 +8317,7 @@ SWEET: Serving the Web by Exploiting Email Tunnels Cached download icon - + BibTeX download icon @@ -8345,7 +8345,7 @@ The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Cached download icon - + BibTeX download icon @@ -8375,7 +8375,7 @@ Technical analysis of the Ultrasurf proxying software Cached download icon - + BibTeX download icon @@ -8403,7 +8403,7 @@ Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resource Cached download icon - + BibTeX download icon @@ -8431,7 +8431,7 @@ The Hidden Internet of Iran: Private Address Allocations on a National Network Cached download icon - + BibTeX download icon @@ -8459,7 +8459,7 @@ The Collateral Damage of Internet Censorship by DNS Injection Cached download icon - + BibTeX download icon @@ -8487,7 +8487,7 @@ Hold-On: Protecting Against On-Path DNS Poisoning Cached download icon - + BibTeX download icon @@ -8515,7 +8515,7 @@ Evading Censorship with Browser-Based Proxies Cached download icon - + BibTeX download icon @@ -8543,7 +8543,7 @@ OONI: Open Observatory of Network Interference Cached download icon - + BibTeX download icon @@ -8571,7 +8571,7 @@ How Censorship in China Allows Government Criticism but Silences Collective Expr Cached download icon - + BibTeX download icon @@ -8599,7 +8599,7 @@ Bootstrapping Communications into an Anti-Censorship System Cached download icon - + BibTeX download icon @@ -8627,7 +8627,7 @@ Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery Cached download icon - + BibTeX download icon @@ -8655,7 +8655,7 @@ SkypeMorph: Protocol Obfuscation for Tor Bridges Cached download icon - + BibTeX download icon @@ -8683,7 +8683,7 @@ Secure Communication over Diverse Transports Cached download icon - + BibTeX download icon @@ -8711,7 +8711,7 @@ Routing Around Decoys Cached download icon - + BibTeX download icon @@ -8739,7 +8739,7 @@ Adapting Social Spam Infrastructure for Political Censorship Cached download icon - + BibTeX download icon @@ -8767,7 +8767,7 @@ One-way indexing for plausible deniability in censorship resistant storage Cached download icon - + BibTeX download icon @@ -8795,7 +8795,7 @@ Inferring Mechanics of Web Censorship Around the World Cached download icon - + BibTeX download icon @@ -8823,7 +8823,7 @@ CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resista Cached download icon - + BibTeX download icon @@ -8851,7 +8851,7 @@ StegoTorus: A Camouflage Proxy for the Tor Anonymity System Cached download icon - + BibTeX download icon @@ -8879,7 +8879,7 @@ How the Great Firewall of China is Blocking Tor Cached download icon - + BibTeX download icon @@ -8907,7 +8907,7 @@ Regional Variation in Chinese Internet Filtering Cached download icon - + BibTeX download icon @@ -8937,7 +8937,7 @@ BridgeSPA: Improving Tor Bridges with Single Packet Authorization Cached download icon - + BibTeX download icon @@ -8965,7 +8965,7 @@ Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing Cached download icon - + BibTeX download icon @@ -8993,7 +8993,7 @@ In Proc. of: Free and Open Communications on the Internet Cached download icon - + BibTeX download icon @@ -9021,7 +9021,7 @@ Scrambling for lightweight censorship resistance Cached download icon - + BibTeX download icon @@ -9049,7 +9049,7 @@ Analysis of Country-wide Internet Outages Caused by Censorship Cached download icon - + BibTeX download icon @@ -9077,7 +9077,7 @@ An anomaly-based censorship-detection system for Tor Cached download icon - + BibTeX download icon @@ -9105,7 +9105,7 @@ Automated Named Entity Extraction for Tracking Censorship of Current Events Cached download icon - + BibTeX download icon @@ -9133,7 +9133,7 @@ Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Cached download icon - + BibTeX download icon @@ -9161,7 +9161,7 @@ Decoy Routing: Toward Unblockable Internet Communication Cached download icon - + BibTeX download icon @@ -9189,7 +9189,7 @@ Bypassing Internet Censorship for News Broadcasters Cached download icon - + BibTeX download icon @@ -9217,7 +9217,7 @@ Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorsh Cached download icon - + BibTeX download icon @@ -9245,7 +9245,7 @@ Tor Instead of IP Cached download icon - + BibTeX download icon @@ -9273,7 +9273,7 @@ Proximax: A Measurement Based System for Proxies Dissemination Cached download icon - + BibTeX download icon @@ -9301,7 +9301,7 @@ Mapping Local Internet Control Cached download icon - + BibTeX download icon @@ -9329,7 +9329,7 @@ Infrastructures of Censorship and Lessons from Copyright Resistance Cached download icon - + BibTeX download icon @@ -9357,7 +9357,7 @@ CensMon: A Web Censorship Monitor Cached download icon - + BibTeX download icon @@ -9385,7 +9385,7 @@ Online Contribution Practices in Countries that Engage in Internet Blocking and Cached download icon - + BibTeX download icon @@ -9413,7 +9413,7 @@ Dust: A Blocking-Resistant Internet Transport Protocol Cached download icon - + BibTeX download icon @@ -9441,7 +9441,7 @@ Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics Cached download icon - + BibTeX download icon @@ -9469,7 +9469,7 @@ Telex: Anticensorship in the Network Infrastructure Cached download icon - + BibTeX download icon @@ -9497,7 +9497,7 @@ Internet Censorship in China: Where Does the Filtering Occur? Cached download icon - + BibTeX download icon @@ -9527,7 +9527,7 @@ A terminology for talking about privacy by data minimization: Anonymity, Unlinka Cached download icon - + BibTeX download icon @@ -9555,7 +9555,7 @@ Chipping Away at Censorship Firewalls with User-Generated Content Cached download icon - + BibTeX download icon @@ -9583,7 +9583,7 @@ Fighting Censorship with Algorithms Cached download icon - + BibTeX download icon @@ -9611,7 +9611,7 @@ Empirical Study of a National-Scale Distributed Intrusion Detection System: Back Cached download icon - + BibTeX download icon @@ -9641,7 +9641,7 @@ On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking r Cached download icon - + BibTeX download icon @@ -9669,7 +9669,7 @@ Anonymity and Censorship Resistance in Unstructured Overlay Networks Cached download icon - + BibTeX download icon @@ -9697,7 +9697,7 @@ SkyF2F: Censorship Resistant via Skype Overlay Network Cached download icon - + BibTeX download icon @@ -9725,7 +9725,7 @@ Detecting Forged TCP Reset Packets Cached download icon - + BibTeX download icon @@ -9755,7 +9755,7 @@ In Proc. of: Network and Distributed System Security, Cached download icon - + BibTeX download icon @@ -9783,7 +9783,7 @@ Pass it on: Social Networks Stymie Censors Cached download icon - + BibTeX download icon @@ -9813,7 +9813,7 @@ ConceptDoppler: A Weather Tracker for Internet Censorship Cached download icon - + BibTeX download icon @@ -9841,7 +9841,7 @@ The Great DNS Wall of China Cached download icon - + BibTeX download icon @@ -9871,7 +9871,7 @@ Investigating large-scale Internet content filtering Cached download icon - + BibTeX download icon @@ -9899,7 +9899,7 @@ Ignoring the Great Firewall of China Cached download icon - + BibTeX download icon @@ -9927,7 +9927,7 @@ Failures in a Hybrid Content Blocking System Cached download icon - + BibTeX download icon @@ -9955,7 +9955,7 @@ Design of a blocking-resistant anonymity system Cached download icon - + BibTeX download icon @@ -9985,7 +9985,7 @@ Censorship Resistance Revisited Cached download icon - + BibTeX download icon @@ -10015,7 +10015,7 @@ The Economics of Censorship Resistance Cached download icon - + BibTeX download icon @@ -10043,7 +10043,7 @@ How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web S Cached download icon - + BibTeX download icon @@ -10073,7 +10073,7 @@ Government mandated blocking of foreign Web content Cached download icon - + BibTeX download icon @@ -10101,7 +10101,7 @@ Thwarting Web Censorship with Untrusted Messenger Discovery Cached download icon - + BibTeX download icon @@ -10131,7 +10131,7 @@ Infranet: Circumventing Web Censorship and Surveillance Cached download icon - + BibTeX download icon @@ -10159,7 +10159,7 @@ Anonymizing Censorship Resistant Systems Cached download icon - + BibTeX download icon @@ -10189,7 +10189,7 @@ Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Prot Cached download icon - + BibTeX download icon @@ -10217,7 +10217,7 @@ Dagster: Censorship-Resistant Publishing Without Replication Cached download icon - + BibTeX download icon @@ -10245,7 +10245,7 @@ Tangler: A Censorship-Resistant Publishing System Based On Document Entanglement Cached download icon - + BibTeX download icon @@ -10275,7 +10275,7 @@ Publius: A robust, tamper-evident, censorship-resistant web publishing system Cached download icon - + BibTeX download icon @@ -10305,7 +10305,7 @@ Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection Cached download icon - + BibTeX download icon @@ -10335,7 +10335,7 @@ The Eternity Service Cached download icon - + BibTeX download icon