From bbb93eb27f564efeb78fd02731be46d7682852cf Mon Sep 17 00:00:00 2001 From: Philipp Winter Date: Mon, 18 May 2015 20:09:33 +0200 Subject: [PATCH] Add references. --- references.bib | 977 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 977 insertions(+) create mode 100644 references.bib diff --git a/references.bib b/references.bib new file mode 100644 index 0000000..f35da14 --- /dev/null +++ b/references.bib @@ -0,0 +1,977 @@ +@inproceedings{Backes2009a, + author = {Michael Backes and Marek Hamerlik and Alessandro Linari and Matteo Maffei and Christos Tryfonopoulos and Gerhard Weikum}, + title = {Anonymity and Censorship Resistance in Unstructured Overlay Networks}, + booktitle = {On the Move to Meaningful Internet Systems}, + publisher = {Springer}, + year = {2009}, + url = {https://sps.cs.uni-saarland.de/maffei/resources/coopis.pdf}, +} + +@inproceedings{Wang2014a, + author = {Yuzhi Wang and Ping Ji and Borui Ye and Pengjun Wang and Rong Luo and Huazhong Yang}, + title = {Go{H}op: Personal {VPN} to Defend from Censorship}, + booktitle = {International Conference on Advanced Communication Technology}, + publisher = {IEEE}, + year = {2014}, + url = {http://censorbib.nymity.ch/pdf/Wang2014a.pdf}, +} + +@article{Gill2015a, + author = {Phillipa Gill and Masashi Crete-Nishihata and Jakub Dalek and Sharon Goldberg and Adam Senft and Greg Wiseman}, + title = {Characterizing Web Censorship Worldwide: Another Look at the {O}pen{N}et {I}nitiative Data}, + journal = {Transactions on the Web}, + publisher = {ACM}, + year = {2015}, + volume = {9}, + number = {1}, + url = {http://censorbib.nymity.ch/pdf/Gill2015a.pdf}, +} + +@inproceedings{Aase2012a, + author = {Nicholas Aase and Jedidiah R. Crandall and \'{A}lvaro D\'{i}az and Jeffrey Knockel and Jorge Oca\~{n}a Molinero and Jared Saia and Dan Wallach and Tao Zhu}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations}, + year = {2012}, + url = {https://www.usenix.org/system/files/conference/foci12/foci12-final17.pdf}, +} + +@article{Aceto2015b, + author = {Giuseppe Aceto and Antonio Pescap\`{e}}, + title = {{I}nternet Censorship detection: A survey}, + journal = {Computer Networks}, + publisher = {Elsevier}, + year = {2015}, + url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015internet_censorship_detection__a_survey.pdf}, +} + +@inproceedings{Aceto2015a, + author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and Nick Feamster and M. Faheem Awan and Tahir Ahmad and Saad Qaisar}, + title = {Monitoring Internet Censorship with {UBICA}}, + booktitle = {Traffic Monitoring and Analysis}, + publisher = {Springer}, + year = {2015}, + url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015monitoring_TMA.pdf}, +} + +@inproceedings{Anderson1996a, + author = {Ross J. Anderson}, + booktitle = {Theory and Applications of Cryptology}, + pages = {242--253}, + publisher = {CTU Publishing House}, + title = {The {E}ternity {S}ervice}, + year = {1996}, + url = {http://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf}, +} + +@techreport{Anderson2012a, + author = {Collin Anderson}, + title = {The Hidden {I}nternet of {I}ran: Private Address Allocations on a National Network}, + institution = {}, + year = {2012}, + url = {http://arxiv.org/pdf/1209.6398v1}, +} + +@techreport{Anderson2013a, + author = {Collin Anderson}, + title = {Dimming the {I}nternet: Detecting Throttling as a Mechanism of Censorship in {I}ran}, + institution = {University of Pennsylvania}, + year = {2013}, + url = {http://arxiv.org/pdf/1306.4361v1.pdf}, +} + +@inproceedings{Anderson2014a, + author = {Collin Anderson and Philipp Winter and Roya}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Global Network Interference Detection over the {RIPE} {A}tlas Network}, + year = {2014}, + url = {https://www.usenix.org/system/files/conference/foci14/foci14-anderson.pdf}, +} + +@article{Sparks2012a, + author = {Sparks and Neo and Tank and Smith and Dozer}, + title = {The Collateral Damage of {I}nternet Censorship by {DNS} Injection}, + journal = {SIGCOMM Computer Communication Review}, + volume = {42}, + number = {3}, + pages = {21--27}, + publisher = {ACM}, + year = {2012}, + url = {http://conferences.sigcomm.org/sigcomm/2012/paper/ccr-paper266.pdf}, +} + +@inproceedings{Anonymous2014a, + author = {Anonymous}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Towards a Comprehensive Picture of the {G}reat {F}irewall's {DNS} Censorship}, + year = {2014}, + url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf}, +} + +@inproceedings{Aryan2013a, + author = {Simurgh Aryan and Homa Aryan and J. Alex Halderman}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {{I}nternet Censorship in {I}ran: A First Look}, + year = {2013}, + url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip}, +} + +@article{Aycock2008a, + author = {Aycock, John and Maurushat, Alana}, + journal = {SIGCAS Computers \& Society}, + publisher = {ACM}, + number = {1}, + pages = {28--39}, + title = {``Good'' Worms and Human Rights}, + volume = {38}, + year = {2008}, + url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007}, +} + +@techreport{Bachrach2011a, + author = {Dustin Bachrach and Christopher Nunu and Dan S. Wallach and Matthew Wright}, + title = {\#h00t: Censorship Resistant Microblogging}, + institution = {Rice University and University of Texas at Arlington}, + year = {2011}, + url = {http://arxiv.org/pdf/1109.6874v1.pdf}, +} + +@inproceedings{Benson2013a, + author = {Karyn Benson and Alberto Dainotti and Kimberly Claffy and Emile Aben}, + title = {Gaining Insight into {AS}-level Outages through Analysis of {I}nternet Background Radiation}, + booktitle = {Traffic Monitoring and Analysis}, + publisher = {IEEE}, + year = {2013}, + url = {http://cseweb.ucsd.edu/~kbenson/papers/tma13.pdf}, +} + +@inproceedings{Bonneau2011a, + author = {Joseph Bonneau and Rubin Xu}, + title = {Scrambling for lightweight censorship resistance}, + booktitle = {Security Protocols}, + publisher = {Springer}, + year = {2011}, + url = {http://www.jbonneau.com/doc/BX11-SPW-scrambling_censorship.pdf}, +} + +@inproceedings{Brubaker2014a, + author = {Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov}, + title = {{C}loud{T}ransport: Using Cloud Storage for Censorship-Resistant Networking}, + booktitle = {Privacy Enhancing Technologies Symposium}, + publisher = {Springer}, + year = {2014}, + url = {https://petsymposium.org/2014/papers/paper_68.pdf}, +} + +@inproceedings{Burnett2010a, + author = {Sam Burnett and Nick Feamster and Santosh Vempala}, + booktitle = {USENIX Security Symposium}, + publisher = {USENIX}, + title = {Chipping Away at Censorship Firewalls with User-Generated Content}, + year = {2010}, + url = {http://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf}, +} + +@inproceedings{Cao2009a, + author = {Shoufeng Cao and Longtao He and Zhongxian Li and Yixian Yang}, + booktitle = {International Conference on Information Engineering}, + pages = {350--354}, + publisher = {IEEE}, + title = {{S}ky{F2F}: Censorship Resistant via {S}kype Overlay Network}, + year = {2009}, + url = {http://www.cs.kau.se/philwint/censorbib/pdf/Cao2009.pdf}, +} + +@inproceedings{Chaabane2014a, + author = {Abdelberi Chaabane and Terence Chen and Mathieu Cunche and Emiliano De Cristofaro and Arik Friedman and Mohamed Ali Kaafar}, + title = {Censorship in the Wild: Analyzing {I}nternet Filtering in {S}yria}, + booktitle = {Internet Measurement Conference}, + publisher = {ACM}, + year = {2014}, + url = {http://conferences2.sigcomm.org/imc/2014/papers/p285.pdf}, +} + +@inproceedings{Chen2013a, + author = {Le Chen and Chi Zhang and Christo Wilson}, + title = {Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on {S}ina {W}eibo}, + booktitle = {Conference on Online Social Networks}, + publisher = {ACM}, + year = {2013}, + url = {http://www.ccs.neu.edu/home/cbw/pdf/weibo-cosn13.pdf}, +} + +@inproceedings{Clayton2006a, + author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson}, + booktitle = {Privacy Enhancing Technologies}, + pages = {20--35}, + publisher = {Springer}, + title = {Ignoring the {G}reat {F}irewall of {C}hina}, + year = {2006}, + url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}, +} + +@inproceedings{Clayton2006b, + author = {Richard Clayton}, + booktitle = {Privacy Enhancing Technologies}, + pages = {78--92}, + publisher = {Springer}, + title = {Failures in a Hybrid Content Blocking System}, + year = {2006}, + url = {http://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf}, +} + +@inproceedings{Connolly2014a, + author = {Christopher Connolly and Patrick Lincoln and Ian Mason and Vinod Yegneswaran}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {{TRIST}: Circumventing Censorship with Transcoding-Resistant Image Steganography}, + year = {2014}, + url = {https://www.usenix.org/system/files/conference/foci14/foci14-connolly.pdf}, +} + +@inproceedings{Crandall2007a, + author = {Jedidiah R. Crandall and Daniel Zinn and Michael Byrd and Earl Barr and Rich East}, + booktitle = {Computer and Communications Security}, + pages = {352--365}, + publisher = {ACM}, + title = {{C}oncept{D}oppler: A Weather Tracker for {I}nternet Censorship}, + year = {2007}, + url = {http://www.csd.uoc.gr/~hy558/papers/conceptdoppler.pdf}, +} + +@inproceedings{Dainotti2011a, + author = {Alberto Dainotti and Claudio Squarcella and Emile Aben and Kimberly C. Claffy and Marco Chiesa and Michele Russo and Antonio Pescap\'{e}}, + booktitle = {Internet Measurement Conference}, + pages = {1--18}, + publisher = {ACM}, + title = {Analysis of Country-wide {I}nternet Outages Caused by Censorship}, + year = {2011}, + url = {http://conferences.sigcomm.org/imc/2011/docs/p1.pdf}, +} + +@inproceedings{Dalek2013a, + author = {Jakub Dalek and Bennett Haselton and Helmi Noman and Adam Senft and Masashi Crete-Nishihata and Phillipa Gill and Ronald J. Deibert}, + booktitle = {Internet Measurement Conference}, + publisher = {ACM}, + title = {A Method for Identifying and Confirming the Use of {URL} Filtering Products for Censorship}, + year = {2013}, + url = {http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf}, +} + +@inproceedings{Danezis2004a, + author = {George Danezis and Ross Anderson}, + booktitle = {Economics and Information Security}, + title = {The Economics of Censorship Resistance}, + year = {2004}, + url = {http://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf}, +} + +@techreport{Danezis2011a, + author = {Danezis, George}, + title = {An anomaly-based censorship-detection system for {T}or}, + institution = {The Tor Project}, + year = {2011}, + url = {https://research.torproject.org/techreports/detector-2011-09-09.pdf} +} + +@inproceedings{Detal2013a, + author = {Gregory Detal and Benjamin Hesmans and Olivier Bonaventure and Yves Vanaubel and Benoit Donnet}, + booktitle = {Internet Measurement Conference}, + publisher = {ACM}, + title = {Revealing Middlebox Interference with {T}racebox}, + year = {2013}, + url = {http://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf}, +} + +@techreport{Dingledine2006a, + author = {Roger Dingledine and Nick Mathewson}, + institution = {The Tor Project}, + title = {Design of a blocking-resistant anonymity system}, + year = {2006}, + url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf}, +} + +@inproceedings{Duan2012a, + author = {Haixin Duan and Nicholas Weaver and Zongxu Zhao and Meng Hu and Jinjin Liang and Jian Jiang and Kang Li and Vern Paxson}, + title = {Hold-On: Protecting Against On-Path {DNS} Poisoning}, + booktitle = {Securing and Trusting Internet Names}, + year = {2012}, + publisher = {National Physical Laboratory}, + url = {http://conferences.npl.co.uk/satin/papers/satin2012-Duan.pdf}, +} + +@inproceedings{Dyer2013a, + author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, + title = {Protocol Misidentification Made Easy with {F}ormat-{T}ransforming {E}ncryption}, + booktitle = {Computer and Communications Security}, + year = {2013}, + publisher = {ACM}, + url = {http://eprint.iacr.org/2012/494.pdf}, +} + +@inproceedings{Ensafi2014a, + author = {Roya Ensafi and Jeffrey Knockel and Geoffrey Alexander and Jedidiah R. Crandall}, + title = {Detecting Intentional Packet Drops on the {I}nternet via {TCP}/{IP} Side Channels}, + booktitle = {Passive and Active Measurement Conference}, + publisher = {Springer}, + year = {2014}, + url = {http://arxiv.org/pdf/1312.5739.pdf}, +} + +@inproceedings{Espinoza2011a, + author = {Antonio M. Espinoza and Jedidiah R. Crandall}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Automated Named Entity Extraction for Tracking Censorship of Current Events}, + year = {2011}, + url = {http://static.usenix.org/event/foci11/tech/final_files/Espinoza.pdf}, +} + +@inproceedings{Feamster2002a, + author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger}, + booktitle = {USENIX Security Symposium}, + publisher = {USENIX}, + title = {{I}nfranet: Circumventing Web Censorship and Surveillance}, + year = {2002}, + url = {http://wind.lcs.mit.edu/papers/usenixsec2002.pdf}, +} + +@inproceedings{Feamster2003a, + author = {Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan and David Karger}, + booktitle = {Privacy Enhancing Technologies}, + pages = {125--140}, + publisher = {Springer}, + title = {Thwarting Web Censorship with Untrusted Messenger Discovery}, + year = {2003}, + url = {http://nms.csail.mit.edu/papers/disc-pet2003.pdf}, +} + +@inproceedings{Fifield2012a, + author = {David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh}, + booktitle = {Privacy Enhancing Technologies Symposium}, + pages = {239--258}, + publisher = {Springer}, + title = {Evading Censorship with Browser-Based Proxies}, + year = {2012}, + url = {http://crypto.stanford.edu/flashproxy/flashproxy.pdf}, +} + +@inproceedings{Fifield2013a, + author = {David Fifield and Gabi Nakibly and Dan Boneh}, + booktitle = {Privacy Enhancing Technologies Symposium}, + publisher = {Springer}, + title = {{OSS}: Using Online Scanning Services for Censorship Circumvention}, + year = {2013}, + url = {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf}, +} + +@inproceedings{Filasto2012a, + author = {Arturo Filast\`{o} and Jacob Appelbaum}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {{OONI}: Open Observatory of Network Interference}, + year = {2012}, + url = {https://www.usenix.org/system/files/conference/foci12/foci12-final12.pdf}, +} + +@inproceedings{Geddes2013a, + author = {John Geddes and Max Schuchard and Nicholas Hopper}, + title = {Cover Your {ACK}s: Pitfalls of Covert Channel Censorship Circumvention}, + booktitle = {Computer and Communications Security}, + year = {2013}, + publisher = {ACM}, + url = {http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf}, +} + +@inproceedings{Hasan2013a, + author = {Shaddi Hasan and Yahel Ben-David and Giulia Fanti and Eric Brewer and Scott Shenker}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts}, + year = {2013}, + url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip}, +} + +@inproceedings{Houmansadr2011a, + author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov}, + booktitle = {Computer and Communications Security}, + pages = {187--200}, + publisher = {ACM}, + title = {{C}irripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability}, + year = {2011}, + url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf}, +} + +@inproceedings{Houmansadr2013a, + author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer}, + booktitle = {Network and Distributed System Security}, + publisher = {The Internet Society}, + title = {I want my voice to be heard: {IP} over {V}oice-over-{IP} for unobservable censorship circumvention}, + year = {2013}, + url = {http://people.cs.umass.edu/~amir/papers/FreeWave.pdf}, +} + +@inproceedings{Houmansadr2013b, + author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov}, + booktitle = {Symposium on Security \& Privacy}, + publisher = {IEEE}, + title = {The Parrot is Dead: Observing Unobservable Network Communications}, + year = {2013}, + url = {http://people.cs.umass.edu/~amir/papers/parrot.pdf}, +} + +@inproceedings{Houmansadr2014a, + author = {Amir Houmansadr and Edmund L. Wong and Vitaly Shmatikov}, + booktitle = {Network and Distributed System Security}, + publisher = {The Internet Society}, + title = {No Direction Home: The True Cost of Routing Around Decoys}, + year = {2014}, + url = {http://dedis.cs.yale.edu/dissent/papers/nodirection.pdf}, +} + +@inproceedings{Invernizzi2013a, + author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna}, + booktitle = {Annual Computer Security Applications Conference}, + title = {{M}essage {I}n {A} {B}ottle: Sailing Past Censorship}, + publisher = {ACM}, + year = {2013}, + url = {http://seclab.cs.ucsb.edu/media/uploads/papers/invernizzi_miab_acsac_2013.pdf}, +} + +@inproceedings{Jones2014a, + author = {Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover and Sathya Gunasekaran and Karim Habak}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {{F}acade: High-Throughput, Deniable Censorship Circumvention Using Web Search}, + year = {2014}, + url = {https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf}, +} + +@inproceedings{Jones2014b, + author = {Ben Jones and Tzu-Wen Lee and Nick Feamster and Phillipa Gill}, + title = {Automated Detection and Fingerprinting of Censorship Block Pages}, + booktitle = {Internet Measurement Conference}, + publisher = {ACM}, + year = {2014}, + url = {http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf}, +} + +@inproceedings{Karlin2011a, + author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Decoy Routing: Toward Unblockable {I}nternet Communication}, + year = {2011}, + url = {http://static.usenix.org/event/foci11/tech/final_files/Karlin.pdf}, +} + +@inproceedings{Kathuria2011a, + author = {Karl Kathuria}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Bypassing {I}nternet Censorship for News Broadcasters}, + year = {2011}, + url = {http://static.usenix.org/event/foci11/tech/final_files/Kathuria.pdf}, +} + +@inproceedings{Khattak2013a, + author = {Sheharbano Khattak and Mobin Javed and Philip D. Anderson and Vern Paxson}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion}, + year = {2013}, + url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip}, +} + +@inproceedings{Khattak2014a, + author = {Sheharbano Khattak and Mobin Javed and Syed Ali Khayam and Zartash Afzal Uzmi and Vern Paxson}, + title = {A Look at the Consequences of {I}nternet Censorship Through an {ISP} Lens}, + booktitle = {Internet Measurement Conference}, + publisher = {ACM}, + year = {2014}, + url = {http://conferences2.sigcomm.org/imc/2014/papers/p271.pdf}, +} + +@article{King2014a, + author = {Gary King and Jennifer Pan and Margaret E. Roberts}, + title = {Reverse-engineering censorship in {C}hina: Randomized experimentation and participant observation}, + journal = {Science}, + publisher = {AAAS}, + year = {2014}, + volume = {345}, + number = {6199}, + url = {http://cryptome.org/2014/08/reverse-eng-cn-censorship.pdf}, +} + +@article{King2012a, + author = {Gary King and Jennifer Pan and Margaret E. Roberts}, + journal = {American Political Science Review}, + title = {How Censorship in {C}hina Allows Government Criticism but Silences Collective Expression}, + year = {2012}, + url = {http://gking.harvard.edu/gking/files/censored.pdf}, +} + +@inproceedings{Knockel2011a, + author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Three Researchers, Five Conjectures: An Empirical Analysis of {TOM}-{S}kype Censorship and Surveillance}, + year = {2011}, + url = {http://static.usenix.org/event/foci11/tech/final_files/Knockel.pdf}, +} + +@inproceedings{Koepsell2004a, + author = {Stefan K\"{o}psell and Ulf Hillig}, + booktitle = {Workshop on Privacy in the Electronic Society}, + title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing}, + publisher = {ACM}, + year = {2004}, + pages = {47--58}, + url = {http://www.cs.kau.se/philwint/censorbib/pdf/Koepsell2004.pdf}, +} + +@inproceedings{Li2014a, + author = {Shuai Li and Mike Schliep and Nick Hopper}, + booktitle = {Workshop on Privacy in the Electronic Society}, + title = {{F}acet: Streaming over Videoconferencing for Censorship Circumvention}, + publisher = {ACM}, + year = {2014}, + url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf}, +} + +@inproceedings{Lincoln2012a, + author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Simpson and Paul Vixie and Dan Boneh}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Bootstrapping Communications into an Anti-Censorship System}, + year = {2012}, + url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf}, +} + +@inproceedings{Ling2012a, + author = {Zhen Ling and Xinwen Fu and Wei Yu and Junzhou Luo and Ming Yang}, + booktitle = {INFOCOM}, + publisher = {IEEE}, + title = {Extensive Analysis and Large-Scale Empirical Evaluation of {T}or Bridge Discovery}, + year = {2012}, + url = {http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf}, +} + +@inproceedings{Liu2011a, + author = {Vincent Liu and Seungyeop Han and Arvind Krishnamurthy and Thomas Anderson}, + booktitle = {Hot Topics in Networks}, + publisher = {ACM}, + title = {{T}or Instead of {IP}}, + year = {2011}, + url = {http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf}, +} + +@techreport{Lowe2007a, + author = {Graham Lowe and Patrick Winters and Michael L. Marcus}, + title = {The Great {DNS} Wall of {C}hina}, + institution = {New York University}, + year = {2007}, + url = {http://cs.nyu.edu/~pcw216/work/nds/final.pdf}, +} + +@inproceedings{Luchaup2014a, + author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton}, + booktitle = {USENIX Security Symposium}, + publisher = {USENIX}, + title = {{L}ib{FTE}: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes}, + year = {2014}, + url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-luchaup.pdf}, +} + +@inproceedings{Mahdian2010a, + author = {Mohammad Mahdian}, + booktitle = {International Conference on Fun with Algorithms}, + pages = {296--306}, + publisher = {Springer}, + title = {Fighting Censorship with Algorithms}, + year = {2010}, + url = {http://mahdian.org/censorship.pdf}, +} + +@inproceedings{McCoy2011a, + author = {Damon McCoy and Jose Andre Morales and Kirill Levchenko}, + booktitle = {Financial Cryptography and Data Security}, + publisher = {Springer}, + title = {{P}roximax: A Measurement Based System for Proxies Dissemination}, + year = {2011}, + url = {http://cseweb.ucsd.edu/~klevchen/mml-fc11.pdf}, +} + +@inproceedings{Moghaddam2012a, + author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg}, + title = {{S}kype{M}orph: Protocol Obfuscation for {T}or Bridges}, + booktitle = {Computer and Communications Security}, + year = {2012}, + publisher = {ACM}, + url = {http://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf}, +} + +@inproceedings{Morrison2014a, + author = {Donn Morrison}, + title = {Toward automatic censorship detection in microblogs}, + booktitle = {Data Mining in Social Networks}, + year = {2014}, + url = {http://arxiv.org/pdf/1402.5310.pdf}, +} + +@inproceedings{Nabi2013a, + author = {Zubair Nabi}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {The Anatomy of Web Censorship in {P}akistan}, + year = {2013}, + url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip}, +} + +@inproceedings{Nobori2014a, + author = {Daiyuu Nobori and Yasushi Shinjo}, + booktitle = {Networked Systems Design and Implementation}, + publisher = {USENIX}, + title = {{VPN} {G}ate: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls}, + year = {2014}, + url = {https://www.usenix.org/system/files/conference/nsdi14/nsdi14-paper-nobori.pdf}, +} + +@inproceedings{Park2010a, + author = {Jong Chun Park and Jedidiah R. Crandall}, + booktitle = {Distributed Computing Systems}, + pages = {315--326}, + publisher = {IEEE}, + title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {C}hina}, + year = {2010}, + url = {http://www.cs.unm.edu/~crandall/icdcs2010.pdf}, +} + +@inproceedings{Perng2005a, + author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}, + booktitle = {International Conference on Information Hiding}, + pages = {62--76}, + publisher = {Springer}, + title = {Censorship Resistance Revisited}, + year = {2005}, + url = {http://www.cs.kau.se/philwint/censorbib/pdf/Perng2005.pdf}, +} + +@inproceedings{Roberts2011a, + author = {Hal Roberts and David Larochelle and Rob Faris and John Palfrey}, + booktitle = {Computer Communications Workshop}, + publisher = {IEEE}, + title = {Mapping Local {I}nternet Control}, + year = {2011}, + url = {https://cyber.law.harvard.edu/netmaps/mlic_20110513.pdf}, +} + +@inproceedings{Rogers2012a, + author = {Michael Rogers and Eleanor Saitta}, + booktitle = {Workshop on Privacy in the Electronic Society}, + publisher = {ACM}, + title = {Secure Communication over Diverse Transports}, + year = {2012}, + pages = {75--80}, + url = {https://fulpool.org/btp.pdf}, +} + +@inproceedings{Roos2014a, + author = {Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe}, + title = {Measuring {F}reenet in the Wild: Censorship-resilience under Observation}, + booktitle = {Privacy Enhancing Technologies Symposium}, + publisher = {Springer}, + year = {2014}, + url = {https://petsymposium.org/2014/papers/paper_71.pdf}, +} + +@inproceedings{Ruffing2013a, + author = {Tim Ruffing and Jonas Schneider and Aniket Kate}, + booktitle = {Hot Topics in Privacy Enhancing Technologies}, + title = {Identity-Based Steganography and Its Applications to Censorship Resistance}, + publisher = {Springer}, + year = {2013}, + url = {http://petsymposium.org/2013/papers/ruffing-censorship.pdf}, +} + +@inproceedings{Schuchard2012a, + author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper}, + title = {Routing Around Decoys}, + booktitle = {Computer and Communications Security}, + year = {2012}, + publisher = {ACM}, + url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf}, +} + +@inproceedings{Seltzer2011a, + author = {Wendy Seltzer}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Infrastructures of Censorship and Lessons from Copyright Resistance}, + year = {2011}, + url = {http://static.usenix.org/event/foci11/tech/final_files/Seltzer.pdf}, +} + +@inproceedings{Serjantov2002a, + author = {Andrei Serjantov}, + booktitle = {International Workshop on Peer-To-Peer Systems}, + publisher = {Springer}, + title = {Anonymizing Censorship Resistant Systems}, + year = {2002}, + pages = {111--120}, + url = {http://www.iptps.org/papers-2002/120.pdf}, +} + +@inproceedings{Sfakianakis2011a, + author = {Andreas Sfakianakis and Elias Athanasopoulos and Sotiris Ioannidis}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {{C}ens{M}on: A Web Censorship Monitor}, + year = {2011}, + url = {http://static.usenix.org/event/foci11/tech/final_files/Sfakianakis.pdf}, +} + +@inproceedings{Shklovski2011a, + author = {Irina Shklovski and Nalini P. Kotamraju}, + title = {Online Contribution Practices in Countries that Engage in {I}nternet Blocking and Censorship}, + booktitle = {CHI Conference on Human Factors in Computing Systems}, + publisher = {ACM}, + year = {2011}, + url = {http://www.cs.kau.se/philwint/censorbib/pdf_mirror/Shklovski2011.pdf}, +} + +@inproceedings{Sovran2008a, + author = {Yair Sovran and Alana Libonati and Jinyang Li}, + booktitle = {International Workshop on Peer-to-Peer Systems}, + publisher = {USENIX}, + title = {Pass it on: Social Networks Stymie Censors}, + year = {2008}, + url = {http://www.news.cs.nyu.edu/~jinyang/pub/kalei_iptps08.pdf}, +} + +@techreport{Stubblefield2001a, + author = {Adam Stubblefield and Dan S. Wallach}, + title = {{D}agster: Censorship-Resistant Publishing Without Replication}, + institution = {Rice University}, + year = {2001}, + url = {http://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf}, +} + +@inproceedings{Tan2014a, + author = {Henry Tan and Micah Sherr}, + title = {Censorship Resistance as a Side-Effect}, + booktitle = {Security Protocols}, + publisher = {Springer}, + year = {2014}, + url = {https://security.cs.georgetown.edu/~msherr/papers/censorship-as-sideeffect.pdf}, +} + +@inproceedings{Thomas2012a, + author = {Kurt Thomas and Chris Grier and Vern Paxson}, + title = {Adapting Social Spam Infrastructure for Political Censorship}, + booktitle = {Large-Scale Exploits and Emergent Threats}, + publisher = {USENIX}, + year = {2012}, + url = {https://www.usenix.org/system/files/conference/leet12/leet12-final13_0.pdf}, +} + +@inproceedings{Vasserman2012a, + author = {Eugene Y. Vasserman and Victor Heorhiadi and Nicholas Hopper and Yongdae Kim}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {One-way indexing for plausible deniability in censorship resistant storage}, + year = {2012}, + url = {https://www.usenix.org/system/files/conference/foci12/foci12-final5.pdf}, +} + +@inproceedings{Verkamp2012a, + author = {John-Paul Verkamp and Minaxi Gupta}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Inferring Mechanics of Web Censorship Around the World}, + year = {2012}, + url = {https://www.usenix.org/system/files/conference/foci12/foci12-final1.pdf}, +} + +@inproceedings{Verkamp2013a, + author = {John-Paul Verkamp and Minaxi Gupta}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + title = {Five Incidents, One Theme: {T}witter Spam as a Weapon to Drown Voices of Protest}, + year = {2013}, + url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip}, +} + +@inproceedings{Wachs2013a, + author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff}, + title = {On the Feasibility of a Censorship Resistant Decentralized Name System}, + booktitle = {Foundations \& Practice of Security}, + publisher = {Springer}, + year = {2013}, + url = {http://grothoff.org/christian/fps2013wachs.pdf}, +} + +@inproceedings{Wachs2014a, + author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff}, + title = {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System}, + booktitle = {Cryptology and Network Security}, + publisher = {Springer}, + year = {2014}, + url = {https://gnunet.org/sites/default/files/paper_cans2014_camera_ready.pdf}, +} + +@inproceedings{Waldman2000a, + author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor}, + title = {{P}ublius: A robust, tamper-evident, censorship-resistant web publishing system}, + booktitle = {USENIX Security Symposium}, + publisher = {USENIX}, + year = {2000}, + url = {http://www.eecs.harvard.edu/~mema/courses/cs264/papers/waldman00publius.pdf}, +} + +@inproceedings{Waldman2001a, + author = {Marc Waldman and David Mazi\`{e}res}, + title = {{T}angler: A Censorship-Resistant Publishing System Based On Document Entanglements}, + booktitle = {Computer and Communications Security}, + publisher = {ACM}, + year = {2001}, + pages = {126--135}, + url = {http://www.cs.nyu.edu/~waldman/tangler.ps}, +} + +@inproceedings{Wang2012a, + author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov}, + title = {{C}ensor{S}poofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing}, + booktitle = {Computer and Communications Security}, + publisher = {ACM}, + year = {2012}, + url = {http://hatswitch.org/~nikita/papers/censorspoofer.pdf}, +} + +@inproceedings{Wang2013a, + author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper}, + title = {r{B}ridge: User Reputation based {T}or Bridge Distribution with Privacy Preservation}, + booktitle = {Network and Distributed System Security}, + publisher = {The Internet Society}, + year = {2013}, + url = {http://www-users.cs.umn.edu/~hopper/rbridge_ndss13.pdf}, +} + +@inproceedings{Weaver2009a, + author = {Nicholas Weaver and Robin Sommer and Vern Paxson}, + title = {Detecting Forged {TCP} Reset Packets}, + booktitle = {Network and Distributed System Security}, + publisher = {The Internet Society}, + year = {2009}, + url = {http://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf}, +} + +@inproceedings{Weinberg2012a, + author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh}, + title = {{S}tego{T}orus: A Camouflage Proxy for the {T}or Anonymity System}, + booktitle = {Computer and Communications Security}, + publisher = {ACM}, + year = {2012}, + url = {http://web.mit.edu/frankw/www/papers/ccs2012.pdf}, +} + +@techreport{Wiley2011a, + author = {Brandon Wiley}, + title = {{D}ust: A Blocking-Resistant {I}nternet Transport Protocol}, + institution = {University of Texas at Austin}, + year = {2011}, + url = {http://blanu.net/Dust.pdf}, +} + +@inproceedings{Winter2012a, + author = {Philipp Winter and Stefan Lindskog}, + title = {How the {G}reat {F}irewall of {C}hina is Blocking {T}or}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + year = {2012}, + url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf}, +} + +@inproceedings{Winter2013a, + author = {Philipp Winter}, + title = {Towards a Censorship Analyser for {T}or}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + year = {2013}, + url = {https://www.usenix.org/system/files/tech-schedule/foci13-papers-archive.zip}, +} + +@inproceedings{Winter2013b, + author = {Philipp Winter and Tobias Pulls and Juergen Fuss}, + title = {{S}cramble{S}uit: A Polymorphic Network Protocol to Circumvent Censorship}, + booktitle = {Workshop on Privacy in the Electronic Society}, + publisher = {ACM}, + year = {2013}, + url = {http://www.cs.kau.se/philwint/pdf/wpes2013.pdf}, +} + +@inproceedings{Wright2011a, + author = {Joss Wright and Tulio de Souza and Ian Brown}, + title = {Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics}, + booktitle = {Free and Open Communications on the Internet}, + publisher = {USENIX}, + year = {2011}, + url = {http://static.usenix.org/event/foci11/tech/final_files/Wright.pdf}, +} + +@techreport{Wright2012a, + author = {Joss Wright}, + title = {Regional Variation in {C}hinese Internet Filtering}, + institution = {University of Oxford}, + year = {2012}, + url = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3}, +} + +@inproceedings{Wustrow2011a, + author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman}, + title = {{T}elex: Anticensorship in the Network Infrastructure}, + booktitle = {USENIX Security Symposium}, + publisher = {USENIX}, + year = {2011}, + url = {http://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf}, +} + +@inproceedings{Wustrow2014a, + author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman}, + title = {{T}ap{D}ance: End-to-Middle Anticensorship without Flow Blocking}, + booktitle = {USENIX Security Symposium}, + publisher = {USENIX}, + year = {2014}, + url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-wustrow.pdf}, +} + +@inproceedings{Xu2011a, + author = {Xueyang Xu and Z. Morley Mao and J. Alex Halderman}, + title = {Internet Censorship in {C}hina: Where Does the Filtering Occur?}, + booktitle = {Passive and Active Measurement Conference}, + publisher = {Springer}, + year = {2011}, + pages = {133--142}, + url = {http://www.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf}, +} + +@inproceedings{Zhou2013a, + author = {Wenxuan Zhou and Amir Houmansadr and Matthew Caesar and Nikita Borisov}, + title = {{SWEET}: Serving the Web by Exploiting Email Tunnels}, + booktitle = {Hot Topics in Privacy Enhancing Technologies}, + publisher = {Springer}, + year = {2013}, + url = {http://petsymposium.org/2013/papers/zhou-censorship.pdf}, +} + +@inproceedings{Zhu2013a, + author = {Tao Zhu and David Phipps and Adam Pridgen and Jedidiah R. Crandall and Dan S. Wallach}, + title = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions}, + booktitle = {USENIX Security Symposium}, + publisher = {USENIX}, + year = {2013}, + url = {https://www.cs.unm.edu/~crandall/usenix13.pdf}, +}