Add references.

This commit is contained in:
Philipp Winter 2015-05-18 20:09:33 +02:00
parent 6c2fd1f896
commit bbb93eb27f

977
references.bib Normal file
View file

@ -0,0 +1,977 @@
@inproceedings{Backes2009a,
author = {Michael Backes and Marek Hamerlik and Alessandro Linari and Matteo Maffei and Christos Tryfonopoulos and Gerhard Weikum},
title = {Anonymity and Censorship Resistance in Unstructured Overlay Networks},
booktitle = {On the Move to Meaningful Internet Systems},
publisher = {Springer},
year = {2009},
url = {https://sps.cs.uni-saarland.de/maffei/resources/coopis.pdf},
}
@inproceedings{Wang2014a,
author = {Yuzhi Wang and Ping Ji and Borui Ye and Pengjun Wang and Rong Luo and Huazhong Yang},
title = {Go{H}op: Personal {VPN} to Defend from Censorship},
booktitle = {International Conference on Advanced Communication Technology},
publisher = {IEEE},
year = {2014},
url = {http://censorbib.nymity.ch/pdf/Wang2014a.pdf},
}
@article{Gill2015a,
author = {Phillipa Gill and Masashi Crete-Nishihata and Jakub Dalek and Sharon Goldberg and Adam Senft and Greg Wiseman},
title = {Characterizing Web Censorship Worldwide: Another Look at the {O}pen{N}et {I}nitiative Data},
journal = {Transactions on the Web},
publisher = {ACM},
year = {2015},
volume = {9},
number = {1},
url = {http://censorbib.nymity.ch/pdf/Gill2015a.pdf},
}
@inproceedings{Aase2012a,
author = {Nicholas Aase and Jedidiah R. Crandall and \'{A}lvaro D\'{i}az and Jeffrey Knockel and Jorge Oca\~{n}a Molinero and Jared Saia and Dan Wallach and Tao Zhu},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final17.pdf},
}
@article{Aceto2015b,
author = {Giuseppe Aceto and Antonio Pescap\`{e}},
title = {{I}nternet Censorship detection: A survey},
journal = {Computer Networks},
publisher = {Elsevier},
year = {2015},
url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015internet_censorship_detection__a_survey.pdf},
}
@inproceedings{Aceto2015a,
author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and Nick Feamster and M. Faheem Awan and Tahir Ahmad and Saad Qaisar},
title = {Monitoring Internet Censorship with {UBICA}},
booktitle = {Traffic Monitoring and Analysis},
publisher = {Springer},
year = {2015},
url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015monitoring_TMA.pdf},
}
@inproceedings{Anderson1996a,
author = {Ross J. Anderson},
booktitle = {Theory and Applications of Cryptology},
pages = {242--253},
publisher = {CTU Publishing House},
title = {The {E}ternity {S}ervice},
year = {1996},
url = {http://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf},
}
@techreport{Anderson2012a,
author = {Collin Anderson},
title = {The Hidden {I}nternet of {I}ran: Private Address Allocations on a National Network},
institution = {},
year = {2012},
url = {http://arxiv.org/pdf/1209.6398v1},
}
@techreport{Anderson2013a,
author = {Collin Anderson},
title = {Dimming the {I}nternet: Detecting Throttling as a Mechanism of Censorship in {I}ran},
institution = {University of Pennsylvania},
year = {2013},
url = {http://arxiv.org/pdf/1306.4361v1.pdf},
}
@inproceedings{Anderson2014a,
author = {Collin Anderson and Philipp Winter and Roya},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Global Network Interference Detection over the {RIPE} {A}tlas Network},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14-anderson.pdf},
}
@article{Sparks2012a,
author = {Sparks and Neo and Tank and Smith and Dozer},
title = {The Collateral Damage of {I}nternet Censorship by {DNS} Injection},
journal = {SIGCOMM Computer Communication Review},
volume = {42},
number = {3},
pages = {21--27},
publisher = {ACM},
year = {2012},
url = {http://conferences.sigcomm.org/sigcomm/2012/paper/ccr-paper266.pdf},
}
@inproceedings{Anonymous2014a,
author = {Anonymous},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Towards a Comprehensive Picture of the {G}reat {F}irewall's {DNS} Censorship},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf},
}
@inproceedings{Aryan2013a,
author = {Simurgh Aryan and Homa Aryan and J. Alex Halderman},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{I}nternet Censorship in {I}ran: A First Look},
year = {2013},
url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip},
}
@article{Aycock2008a,
author = {Aycock, John and Maurushat, Alana},
journal = {SIGCAS Computers \& Society},
publisher = {ACM},
number = {1},
pages = {28--39},
title = {``Good'' Worms and Human Rights},
volume = {38},
year = {2008},
url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007},
}
@techreport{Bachrach2011a,
author = {Dustin Bachrach and Christopher Nunu and Dan S. Wallach and Matthew Wright},
title = {\#h00t: Censorship Resistant Microblogging},
institution = {Rice University and University of Texas at Arlington},
year = {2011},
url = {http://arxiv.org/pdf/1109.6874v1.pdf},
}
@inproceedings{Benson2013a,
author = {Karyn Benson and Alberto Dainotti and Kimberly Claffy and Emile Aben},
title = {Gaining Insight into {AS}-level Outages through Analysis of {I}nternet Background Radiation},
booktitle = {Traffic Monitoring and Analysis},
publisher = {IEEE},
year = {2013},
url = {http://cseweb.ucsd.edu/~kbenson/papers/tma13.pdf},
}
@inproceedings{Bonneau2011a,
author = {Joseph Bonneau and Rubin Xu},
title = {Scrambling for lightweight censorship resistance},
booktitle = {Security Protocols},
publisher = {Springer},
year = {2011},
url = {http://www.jbonneau.com/doc/BX11-SPW-scrambling_censorship.pdf},
}
@inproceedings{Brubaker2014a,
author = {Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov},
title = {{C}loud{T}ransport: Using Cloud Storage for Censorship-Resistant Networking},
booktitle = {Privacy Enhancing Technologies Symposium},
publisher = {Springer},
year = {2014},
url = {https://petsymposium.org/2014/papers/paper_68.pdf},
}
@inproceedings{Burnett2010a,
author = {Sam Burnett and Nick Feamster and Santosh Vempala},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
title = {Chipping Away at Censorship Firewalls with User-Generated Content},
year = {2010},
url = {http://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf},
}
@inproceedings{Cao2009a,
author = {Shoufeng Cao and Longtao He and Zhongxian Li and Yixian Yang},
booktitle = {International Conference on Information Engineering},
pages = {350--354},
publisher = {IEEE},
title = {{S}ky{F2F}: Censorship Resistant via {S}kype Overlay Network},
year = {2009},
url = {http://www.cs.kau.se/philwint/censorbib/pdf/Cao2009.pdf},
}
@inproceedings{Chaabane2014a,
author = {Abdelberi Chaabane and Terence Chen and Mathieu Cunche and Emiliano De Cristofaro and Arik Friedman and Mohamed Ali Kaafar},
title = {Censorship in the Wild: Analyzing {I}nternet Filtering in {S}yria},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2014},
url = {http://conferences2.sigcomm.org/imc/2014/papers/p285.pdf},
}
@inproceedings{Chen2013a,
author = {Le Chen and Chi Zhang and Christo Wilson},
title = {Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on {S}ina {W}eibo},
booktitle = {Conference on Online Social Networks},
publisher = {ACM},
year = {2013},
url = {http://www.ccs.neu.edu/home/cbw/pdf/weibo-cosn13.pdf},
}
@inproceedings{Clayton2006a,
author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
booktitle = {Privacy Enhancing Technologies},
pages = {20--35},
publisher = {Springer},
title = {Ignoring the {G}reat {F}irewall of {C}hina},
year = {2006},
url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
}
@inproceedings{Clayton2006b,
author = {Richard Clayton},
booktitle = {Privacy Enhancing Technologies},
pages = {78--92},
publisher = {Springer},
title = {Failures in a Hybrid Content Blocking System},
year = {2006},
url = {http://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf},
}
@inproceedings{Connolly2014a,
author = {Christopher Connolly and Patrick Lincoln and Ian Mason and Vinod Yegneswaran},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{TRIST}: Circumventing Censorship with Transcoding-Resistant Image Steganography},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14-connolly.pdf},
}
@inproceedings{Crandall2007a,
author = {Jedidiah R. Crandall and Daniel Zinn and Michael Byrd and Earl Barr and Rich East},
booktitle = {Computer and Communications Security},
pages = {352--365},
publisher = {ACM},
title = {{C}oncept{D}oppler: A Weather Tracker for {I}nternet Censorship},
year = {2007},
url = {http://www.csd.uoc.gr/~hy558/papers/conceptdoppler.pdf},
}
@inproceedings{Dainotti2011a,
author = {Alberto Dainotti and Claudio Squarcella and Emile Aben and Kimberly C. Claffy and Marco Chiesa and Michele Russo and Antonio Pescap\'{e}},
booktitle = {Internet Measurement Conference},
pages = {1--18},
publisher = {ACM},
title = {Analysis of Country-wide {I}nternet Outages Caused by Censorship},
year = {2011},
url = {http://conferences.sigcomm.org/imc/2011/docs/p1.pdf},
}
@inproceedings{Dalek2013a,
author = {Jakub Dalek and Bennett Haselton and Helmi Noman and Adam Senft and Masashi Crete-Nishihata and Phillipa Gill and Ronald J. Deibert},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
title = {A Method for Identifying and Confirming the Use of {URL} Filtering Products for Censorship},
year = {2013},
url = {http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf},
}
@inproceedings{Danezis2004a,
author = {George Danezis and Ross Anderson},
booktitle = {Economics and Information Security},
title = {The Economics of Censorship Resistance},
year = {2004},
url = {http://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf},
}
@techreport{Danezis2011a,
author = {Danezis, George},
title = {An anomaly-based censorship-detection system for {T}or},
institution = {The Tor Project},
year = {2011},
url = {https://research.torproject.org/techreports/detector-2011-09-09.pdf}
}
@inproceedings{Detal2013a,
author = {Gregory Detal and Benjamin Hesmans and Olivier Bonaventure and Yves Vanaubel and Benoit Donnet},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
title = {Revealing Middlebox Interference with {T}racebox},
year = {2013},
url = {http://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf},
}
@techreport{Dingledine2006a,
author = {Roger Dingledine and Nick Mathewson},
institution = {The Tor Project},
title = {Design of a blocking-resistant anonymity system},
year = {2006},
url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf},
}
@inproceedings{Duan2012a,
author = {Haixin Duan and Nicholas Weaver and Zongxu Zhao and Meng Hu and Jinjin Liang and Jian Jiang and Kang Li and Vern Paxson},
title = {Hold-On: Protecting Against On-Path {DNS} Poisoning},
booktitle = {Securing and Trusting Internet Names},
year = {2012},
publisher = {National Physical Laboratory},
url = {http://conferences.npl.co.uk/satin/papers/satin2012-Duan.pdf},
}
@inproceedings{Dyer2013a,
author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
title = {Protocol Misidentification Made Easy with {F}ormat-{T}ransforming {E}ncryption},
booktitle = {Computer and Communications Security},
year = {2013},
publisher = {ACM},
url = {http://eprint.iacr.org/2012/494.pdf},
}
@inproceedings{Ensafi2014a,
author = {Roya Ensafi and Jeffrey Knockel and Geoffrey Alexander and Jedidiah R. Crandall},
title = {Detecting Intentional Packet Drops on the {I}nternet via {TCP}/{IP} Side Channels},
booktitle = {Passive and Active Measurement Conference},
publisher = {Springer},
year = {2014},
url = {http://arxiv.org/pdf/1312.5739.pdf},
}
@inproceedings{Espinoza2011a,
author = {Antonio M. Espinoza and Jedidiah R. Crandall},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Automated Named Entity Extraction for Tracking Censorship of Current Events},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Espinoza.pdf},
}
@inproceedings{Feamster2002a,
author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
title = {{I}nfranet: Circumventing Web Censorship and Surveillance},
year = {2002},
url = {http://wind.lcs.mit.edu/papers/usenixsec2002.pdf},
}
@inproceedings{Feamster2003a,
author = {Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan and David Karger},
booktitle = {Privacy Enhancing Technologies},
pages = {125--140},
publisher = {Springer},
title = {Thwarting Web Censorship with Untrusted Messenger Discovery},
year = {2003},
url = {http://nms.csail.mit.edu/papers/disc-pet2003.pdf},
}
@inproceedings{Fifield2012a,
author = {David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh},
booktitle = {Privacy Enhancing Technologies Symposium},
pages = {239--258},
publisher = {Springer},
title = {Evading Censorship with Browser-Based Proxies},
year = {2012},
url = {http://crypto.stanford.edu/flashproxy/flashproxy.pdf},
}
@inproceedings{Fifield2013a,
author = {David Fifield and Gabi Nakibly and Dan Boneh},
booktitle = {Privacy Enhancing Technologies Symposium},
publisher = {Springer},
title = {{OSS}: Using Online Scanning Services for Censorship Circumvention},
year = {2013},
url = {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf},
}
@inproceedings{Filasto2012a,
author = {Arturo Filast\`{o} and Jacob Appelbaum},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{OONI}: Open Observatory of Network Interference},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final12.pdf},
}
@inproceedings{Geddes2013a,
author = {John Geddes and Max Schuchard and Nicholas Hopper},
title = {Cover Your {ACK}s: Pitfalls of Covert Channel Censorship Circumvention},
booktitle = {Computer and Communications Security},
year = {2013},
publisher = {ACM},
url = {http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf},
}
@inproceedings{Hasan2013a,
author = {Shaddi Hasan and Yahel Ben-David and Giulia Fanti and Eric Brewer and Scott Shenker},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts},
year = {2013},
url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip},
}
@inproceedings{Houmansadr2011a,
author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov},
booktitle = {Computer and Communications Security},
pages = {187--200},
publisher = {ACM},
title = {{C}irripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability},
year = {2011},
url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf},
}
@inproceedings{Houmansadr2013a,
author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
title = {I want my voice to be heard: {IP} over {V}oice-over-{IP} for unobservable censorship circumvention},
year = {2013},
url = {http://people.cs.umass.edu/~amir/papers/FreeWave.pdf},
}
@inproceedings{Houmansadr2013b,
author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov},
booktitle = {Symposium on Security \& Privacy},
publisher = {IEEE},
title = {The Parrot is Dead: Observing Unobservable Network Communications},
year = {2013},
url = {http://people.cs.umass.edu/~amir/papers/parrot.pdf},
}
@inproceedings{Houmansadr2014a,
author = {Amir Houmansadr and Edmund L. Wong and Vitaly Shmatikov},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
title = {No Direction Home: The True Cost of Routing Around Decoys},
year = {2014},
url = {http://dedis.cs.yale.edu/dissent/papers/nodirection.pdf},
}
@inproceedings{Invernizzi2013a,
author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna},
booktitle = {Annual Computer Security Applications Conference},
title = {{M}essage {I}n {A} {B}ottle: Sailing Past Censorship},
publisher = {ACM},
year = {2013},
url = {http://seclab.cs.ucsb.edu/media/uploads/papers/invernizzi_miab_acsac_2013.pdf},
}
@inproceedings{Jones2014a,
author = {Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover and Sathya Gunasekaran and Karim Habak},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{F}acade: High-Throughput, Deniable Censorship Circumvention Using Web Search},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf},
}
@inproceedings{Jones2014b,
author = {Ben Jones and Tzu-Wen Lee and Nick Feamster and Phillipa Gill},
title = {Automated Detection and Fingerprinting of Censorship Block Pages},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2014},
url = {http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf},
}
@inproceedings{Karlin2011a,
author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Decoy Routing: Toward Unblockable {I}nternet Communication},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Karlin.pdf},
}
@inproceedings{Kathuria2011a,
author = {Karl Kathuria},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Bypassing {I}nternet Censorship for News Broadcasters},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Kathuria.pdf},
}
@inproceedings{Khattak2013a,
author = {Sheharbano Khattak and Mobin Javed and Philip D. Anderson and Vern Paxson},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion},
year = {2013},
url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip},
}
@inproceedings{Khattak2014a,
author = {Sheharbano Khattak and Mobin Javed and Syed Ali Khayam and Zartash Afzal Uzmi and Vern Paxson},
title = {A Look at the Consequences of {I}nternet Censorship Through an {ISP} Lens},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2014},
url = {http://conferences2.sigcomm.org/imc/2014/papers/p271.pdf},
}
@article{King2014a,
author = {Gary King and Jennifer Pan and Margaret E. Roberts},
title = {Reverse-engineering censorship in {C}hina: Randomized experimentation and participant observation},
journal = {Science},
publisher = {AAAS},
year = {2014},
volume = {345},
number = {6199},
url = {http://cryptome.org/2014/08/reverse-eng-cn-censorship.pdf},
}
@article{King2012a,
author = {Gary King and Jennifer Pan and Margaret E. Roberts},
journal = {American Political Science Review},
title = {How Censorship in {C}hina Allows Government Criticism but Silences Collective Expression},
year = {2012},
url = {http://gking.harvard.edu/gking/files/censored.pdf},
}
@inproceedings{Knockel2011a,
author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Three Researchers, Five Conjectures: An Empirical Analysis of {TOM}-{S}kype Censorship and Surveillance},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Knockel.pdf},
}
@inproceedings{Koepsell2004a,
author = {Stefan K\"{o}psell and Ulf Hillig},
booktitle = {Workshop on Privacy in the Electronic Society},
title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
publisher = {ACM},
year = {2004},
pages = {47--58},
url = {http://www.cs.kau.se/philwint/censorbib/pdf/Koepsell2004.pdf},
}
@inproceedings{Li2014a,
author = {Shuai Li and Mike Schliep and Nick Hopper},
booktitle = {Workshop on Privacy in the Electronic Society},
title = {{F}acet: Streaming over Videoconferencing for Censorship Circumvention},
publisher = {ACM},
year = {2014},
url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf},
}
@inproceedings{Lincoln2012a,
author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Simpson and Paul Vixie and Dan Boneh},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Bootstrapping Communications into an Anti-Censorship System},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf},
}
@inproceedings{Ling2012a,
author = {Zhen Ling and Xinwen Fu and Wei Yu and Junzhou Luo and Ming Yang},
booktitle = {INFOCOM},
publisher = {IEEE},
title = {Extensive Analysis and Large-Scale Empirical Evaluation of {T}or Bridge Discovery},
year = {2012},
url = {http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf},
}
@inproceedings{Liu2011a,
author = {Vincent Liu and Seungyeop Han and Arvind Krishnamurthy and Thomas Anderson},
booktitle = {Hot Topics in Networks},
publisher = {ACM},
title = {{T}or Instead of {IP}},
year = {2011},
url = {http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf},
}
@techreport{Lowe2007a,
author = {Graham Lowe and Patrick Winters and Michael L. Marcus},
title = {The Great {DNS} Wall of {C}hina},
institution = {New York University},
year = {2007},
url = {http://cs.nyu.edu/~pcw216/work/nds/final.pdf},
}
@inproceedings{Luchaup2014a,
author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
title = {{L}ib{FTE}: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes},
year = {2014},
url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-luchaup.pdf},
}
@inproceedings{Mahdian2010a,
author = {Mohammad Mahdian},
booktitle = {International Conference on Fun with Algorithms},
pages = {296--306},
publisher = {Springer},
title = {Fighting Censorship with Algorithms},
year = {2010},
url = {http://mahdian.org/censorship.pdf},
}
@inproceedings{McCoy2011a,
author = {Damon McCoy and Jose Andre Morales and Kirill Levchenko},
booktitle = {Financial Cryptography and Data Security},
publisher = {Springer},
title = {{P}roximax: A Measurement Based System for Proxies Dissemination},
year = {2011},
url = {http://cseweb.ucsd.edu/~klevchen/mml-fc11.pdf},
}
@inproceedings{Moghaddam2012a,
author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg},
title = {{S}kype{M}orph: Protocol Obfuscation for {T}or Bridges},
booktitle = {Computer and Communications Security},
year = {2012},
publisher = {ACM},
url = {http://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf},
}
@inproceedings{Morrison2014a,
author = {Donn Morrison},
title = {Toward automatic censorship detection in microblogs},
booktitle = {Data Mining in Social Networks},
year = {2014},
url = {http://arxiv.org/pdf/1402.5310.pdf},
}
@inproceedings{Nabi2013a,
author = {Zubair Nabi},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {The Anatomy of Web Censorship in {P}akistan},
year = {2013},
url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip},
}
@inproceedings{Nobori2014a,
author = {Daiyuu Nobori and Yasushi Shinjo},
booktitle = {Networked Systems Design and Implementation},
publisher = {USENIX},
title = {{VPN} {G}ate: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls},
year = {2014},
url = {https://www.usenix.org/system/files/conference/nsdi14/nsdi14-paper-nobori.pdf},
}
@inproceedings{Park2010a,
author = {Jong Chun Park and Jedidiah R. Crandall},
booktitle = {Distributed Computing Systems},
pages = {315--326},
publisher = {IEEE},
title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {C}hina},
year = {2010},
url = {http://www.cs.unm.edu/~crandall/icdcs2010.pdf},
}
@inproceedings{Perng2005a,
author = {Ginger Perng and Michael K. Reiter and Chenxi Wang},
booktitle = {International Conference on Information Hiding},
pages = {62--76},
publisher = {Springer},
title = {Censorship Resistance Revisited},
year = {2005},
url = {http://www.cs.kau.se/philwint/censorbib/pdf/Perng2005.pdf},
}
@inproceedings{Roberts2011a,
author = {Hal Roberts and David Larochelle and Rob Faris and John Palfrey},
booktitle = {Computer Communications Workshop},
publisher = {IEEE},
title = {Mapping Local {I}nternet Control},
year = {2011},
url = {https://cyber.law.harvard.edu/netmaps/mlic_20110513.pdf},
}
@inproceedings{Rogers2012a,
author = {Michael Rogers and Eleanor Saitta},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
title = {Secure Communication over Diverse Transports},
year = {2012},
pages = {75--80},
url = {https://fulpool.org/btp.pdf},
}
@inproceedings{Roos2014a,
author = {Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe},
title = {Measuring {F}reenet in the Wild: Censorship-resilience under Observation},
booktitle = {Privacy Enhancing Technologies Symposium},
publisher = {Springer},
year = {2014},
url = {https://petsymposium.org/2014/papers/paper_71.pdf},
}
@inproceedings{Ruffing2013a,
author = {Tim Ruffing and Jonas Schneider and Aniket Kate},
booktitle = {Hot Topics in Privacy Enhancing Technologies},
title = {Identity-Based Steganography and Its Applications to Censorship Resistance},
publisher = {Springer},
year = {2013},
url = {http://petsymposium.org/2013/papers/ruffing-censorship.pdf},
}
@inproceedings{Schuchard2012a,
author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper},
title = {Routing Around Decoys},
booktitle = {Computer and Communications Security},
year = {2012},
publisher = {ACM},
url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf},
}
@inproceedings{Seltzer2011a,
author = {Wendy Seltzer},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Infrastructures of Censorship and Lessons from Copyright Resistance},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Seltzer.pdf},
}
@inproceedings{Serjantov2002a,
author = {Andrei Serjantov},
booktitle = {International Workshop on Peer-To-Peer Systems},
publisher = {Springer},
title = {Anonymizing Censorship Resistant Systems},
year = {2002},
pages = {111--120},
url = {http://www.iptps.org/papers-2002/120.pdf},
}
@inproceedings{Sfakianakis2011a,
author = {Andreas Sfakianakis and Elias Athanasopoulos and Sotiris Ioannidis},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{C}ens{M}on: A Web Censorship Monitor},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Sfakianakis.pdf},
}
@inproceedings{Shklovski2011a,
author = {Irina Shklovski and Nalini P. Kotamraju},
title = {Online Contribution Practices in Countries that Engage in {I}nternet Blocking and Censorship},
booktitle = {CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
year = {2011},
url = {http://www.cs.kau.se/philwint/censorbib/pdf_mirror/Shklovski2011.pdf},
}
@inproceedings{Sovran2008a,
author = {Yair Sovran and Alana Libonati and Jinyang Li},
booktitle = {International Workshop on Peer-to-Peer Systems},
publisher = {USENIX},
title = {Pass it on: Social Networks Stymie Censors},
year = {2008},
url = {http://www.news.cs.nyu.edu/~jinyang/pub/kalei_iptps08.pdf},
}
@techreport{Stubblefield2001a,
author = {Adam Stubblefield and Dan S. Wallach},
title = {{D}agster: Censorship-Resistant Publishing Without Replication},
institution = {Rice University},
year = {2001},
url = {http://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf},
}
@inproceedings{Tan2014a,
author = {Henry Tan and Micah Sherr},
title = {Censorship Resistance as a Side-Effect},
booktitle = {Security Protocols},
publisher = {Springer},
year = {2014},
url = {https://security.cs.georgetown.edu/~msherr/papers/censorship-as-sideeffect.pdf},
}
@inproceedings{Thomas2012a,
author = {Kurt Thomas and Chris Grier and Vern Paxson},
title = {Adapting Social Spam Infrastructure for Political Censorship},
booktitle = {Large-Scale Exploits and Emergent Threats},
publisher = {USENIX},
year = {2012},
url = {https://www.usenix.org/system/files/conference/leet12/leet12-final13_0.pdf},
}
@inproceedings{Vasserman2012a,
author = {Eugene Y. Vasserman and Victor Heorhiadi and Nicholas Hopper and Yongdae Kim},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {One-way indexing for plausible deniability in censorship resistant storage},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final5.pdf},
}
@inproceedings{Verkamp2012a,
author = {John-Paul Verkamp and Minaxi Gupta},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Inferring Mechanics of Web Censorship Around the World},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final1.pdf},
}
@inproceedings{Verkamp2013a,
author = {John-Paul Verkamp and Minaxi Gupta},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Five Incidents, One Theme: {T}witter Spam as a Weapon to Drown Voices of Protest},
year = {2013},
url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip},
}
@inproceedings{Wachs2013a,
author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff},
title = {On the Feasibility of a Censorship Resistant Decentralized Name System},
booktitle = {Foundations \& Practice of Security},
publisher = {Springer},
year = {2013},
url = {http://grothoff.org/christian/fps2013wachs.pdf},
}
@inproceedings{Wachs2014a,
author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff},
title = {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System},
booktitle = {Cryptology and Network Security},
publisher = {Springer},
year = {2014},
url = {https://gnunet.org/sites/default/files/paper_cans2014_camera_ready.pdf},
}
@inproceedings{Waldman2000a,
author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor},
title = {{P}ublius: A robust, tamper-evident, censorship-resistant web publishing system},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2000},
url = {http://www.eecs.harvard.edu/~mema/courses/cs264/papers/waldman00publius.pdf},
}
@inproceedings{Waldman2001a,
author = {Marc Waldman and David Mazi\`{e}res},
title = {{T}angler: A Censorship-Resistant Publishing System Based On Document Entanglements},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2001},
pages = {126--135},
url = {http://www.cs.nyu.edu/~waldman/tangler.ps},
}
@inproceedings{Wang2012a,
author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov},
title = {{C}ensor{S}poofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2012},
url = {http://hatswitch.org/~nikita/papers/censorspoofer.pdf},
}
@inproceedings{Wang2013a,
author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper},
title = {r{B}ridge: User Reputation based {T}or Bridge Distribution with Privacy Preservation},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
year = {2013},
url = {http://www-users.cs.umn.edu/~hopper/rbridge_ndss13.pdf},
}
@inproceedings{Weaver2009a,
author = {Nicholas Weaver and Robin Sommer and Vern Paxson},
title = {Detecting Forged {TCP} Reset Packets},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
year = {2009},
url = {http://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf},
}
@inproceedings{Weinberg2012a,
author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh},
title = {{S}tego{T}orus: A Camouflage Proxy for the {T}or Anonymity System},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2012},
url = {http://web.mit.edu/frankw/www/papers/ccs2012.pdf},
}
@techreport{Wiley2011a,
author = {Brandon Wiley},
title = {{D}ust: A Blocking-Resistant {I}nternet Transport Protocol},
institution = {University of Texas at Austin},
year = {2011},
url = {http://blanu.net/Dust.pdf},
}
@inproceedings{Winter2012a,
author = {Philipp Winter and Stefan Lindskog},
title = {How the {G}reat {F}irewall of {C}hina is Blocking {T}or},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf},
}
@inproceedings{Winter2013a,
author = {Philipp Winter},
title = {Towards a Censorship Analyser for {T}or},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2013},
url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip},
}
@inproceedings{Winter2013b,
author = {Philipp Winter and Tobias Pulls and Juergen Fuss},
title = {{S}cramble{S}uit: A Polymorphic Network Protocol to Circumvent Censorship},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2013},
url = {http://www.cs.kau.se/philwint/pdf/wpes2013.pdf},
}
@inproceedings{Wright2011a,
author = {Joss Wright and Tulio de Souza and Ian Brown},
title = {Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Wright.pdf},
}
@techreport{Wright2012a,
author = {Joss Wright},
title = {Regional Variation in {C}hinese Internet Filtering},
institution = {University of Oxford},
year = {2012},
url = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3},
}
@inproceedings{Wustrow2011a,
author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman},
title = {{T}elex: Anticensorship in the Network Infrastructure},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2011},
url = {http://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf},
}
@inproceedings{Wustrow2014a,
author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman},
title = {{T}ap{D}ance: End-to-Middle Anticensorship without Flow Blocking},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2014},
url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-wustrow.pdf},
}
@inproceedings{Xu2011a,
author = {Xueyang Xu and Z. Morley Mao and J. Alex Halderman},
title = {Internet Censorship in {C}hina: Where Does the Filtering Occur?},
booktitle = {Passive and Active Measurement Conference},
publisher = {Springer},
year = {2011},
pages = {133--142},
url = {http://www.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf},
}
@inproceedings{Zhou2013a,
author = {Wenxuan Zhou and Amir Houmansadr and Matthew Caesar and Nikita Borisov},
title = {{SWEET}: Serving the Web by Exploiting Email Tunnels},
booktitle = {Hot Topics in Privacy Enhancing Technologies},
publisher = {Springer},
year = {2013},
url = {http://petsymposium.org/2013/papers/zhou-censorship.pdf},
}
@inproceedings{Zhu2013a,
author = {Tao Zhu and David Phipps and Adam Pridgen and Jedidiah R. Crandall and Dan S. Wallach},
title = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2013},
url = {https://www.cs.unm.edu/~crandall/usenix13.pdf},
}