diff --git a/index.html b/index.html index dd2d2f5..a315ad1 100644 --- a/index.html +++ b/index.html @@ -230,7 +230,7 @@ A Wall Behind A Wall: Emerging Regional Censorship in China - + @@ -258,7 +258,7 @@ Learning from Censored Experiences: Social Media Discussions around Censorship C - + @@ -286,7 +286,7 @@ Transport Layer Obscurity: Circumventing SNI Censorship on the TLS Layer - + @@ -314,7 +314,7 @@ Is Nobody There? Good! Globally Measuring Connection Tampering without Responsiv - + @@ -343,7 +343,7 @@ Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China - + @@ -371,7 +371,7 @@ The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic - + @@ -399,7 +399,7 @@ Is Custom Congestion Control a Bad Idea for Circumvention Tools? - + @@ -427,7 +427,7 @@ I(ra)nconsistencies: Novel Insights into Iran’s Censorship - + @@ -455,7 +455,7 @@ Extended Abstract: Using TURN Servers for Censorship Evasion - + @@ -483,7 +483,7 @@ Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censo - + @@ -511,7 +511,7 @@ Examining Leading Pakistani Mobile Apps - + @@ -539,7 +539,7 @@ Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing - + @@ -569,7 +569,7 @@ Look What’s There! Utilizing the Internet’s Existing Data for Censorship Cir - + @@ -597,7 +597,7 @@ Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circu - + @@ -625,7 +625,7 @@ SpotProxy: Rediscovering the Cloud for Censorship Circumvention - + @@ -653,7 +653,7 @@ Communication Breakdown: Modularizing Application Tunneling for Signaling Around - + @@ -681,7 +681,7 @@ Automatic Generation of Web Censorship Probe Lists - + @@ -709,7 +709,7 @@ Extended Abstract: The Impact of Online Censorship on LLMs - + @@ -737,7 +737,7 @@ Extended Abstract: Leveraging Large Language Models to Identify Internet Censors - + @@ -765,7 +765,7 @@ Toward Automated DNS Tampering Detection Using Machine Learning - + @@ -793,7 +793,7 @@ Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention - + @@ -821,7 +821,7 @@ Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistan - + @@ -849,7 +849,7 @@ Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burd - + @@ -877,7 +877,7 @@ Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smugg - + @@ -905,7 +905,7 @@ Detecting VPN Traffic through Encapsulated TCP Behavior - + @@ -933,7 +933,7 @@ Analyzing Prominent Mobile Apps in Latin America - + @@ -961,7 +961,7 @@ Lost in Translation: Characterizing Automated Censorship in Online Translation S - + @@ -989,7 +989,7 @@ Identifying VPN Servers through Graph-Represented Behaviors - + @@ -1017,7 +1017,7 @@ GFWeb: Measuring the Great Firewall’s Web Censorship at Scale - + @@ -1045,7 +1045,7 @@ Digital Repression in Palestine - + @@ -1073,7 +1073,7 @@ How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censor - + @@ -1102,7 +1102,7 @@ Snowflake, a censorship circumvention system using temporary WebRTC proxies - + @@ -1130,7 +1130,7 @@ Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against S - + @@ -1158,7 +1158,7 @@ Out in the Open: On the Implementation of Mobile App Filtering in India - + @@ -1186,7 +1186,7 @@ Communication Breakdown: Modularizing Application Tunneling for Signaling Around - + @@ -1214,7 +1214,7 @@ Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model - + @@ -1242,7 +1242,7 @@ Modeling and Detecting Internet Censorship Events - + @@ -1270,7 +1270,7 @@ Internet Sanctions on Russian Media: Actions and Effects - + @@ -1299,7 +1299,7 @@ Bleeding Wall: A Hematologic Examination on the Great Firewall - + @@ -1327,7 +1327,7 @@ Just add WATER: WebAssembly-based Circumvention Transports - + @@ -1355,7 +1355,7 @@ Extended Abstract: Traffic Splitting for Pluggable Transports - + @@ -1383,7 +1383,7 @@ Extended Abstract: Oscur0: One-shot Circumvention without Registration - + @@ -1411,7 +1411,7 @@ Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes - + @@ -1439,7 +1439,7 @@ NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge - + @@ -1468,7 +1468,7 @@ On Precisely Detecting Censorship Circumvention in Real-World Networks - + @@ -1498,7 +1498,7 @@ Discop: Provably secure steganography in practice based on “distribution copie - + @@ -1527,7 +1527,7 @@ Poster: Circumventing the GFW with TLS Record Fragmentation - + @@ -1555,7 +1555,7 @@ Website blocking in the European Union: Network interference from the perspectiv - + @@ -1583,7 +1583,7 @@ Comments on certain past cryptographic flaws affecting fully encrypted censorshi - + @@ -1611,7 +1611,7 @@ Destination Unreachable: Characterizing Internet Outages and Shutdowns - + @@ -1639,7 +1639,7 @@ Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning - + @@ -1667,7 +1667,7 @@ A Study of China’s Censorship and Its Evasion Through the Lens of Online Gamin - + @@ -1695,7 +1695,7 @@ DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorshi - + @@ -1723,7 +1723,7 @@ TELEPATH: A Minecraft-based Covert Communication System - + @@ -1751,7 +1751,7 @@ Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese - + @@ -1779,7 +1779,7 @@ Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law - + @@ -1807,7 +1807,7 @@ A Worldwide View of Nation-state Internet Censorship - + @@ -1835,7 +1835,7 @@ The Use of Push Notification in Censorship Circumvention - + @@ -1864,7 +1864,7 @@ Measuring and Evading Turkmenistan’s Internet Censorship - + @@ -1892,7 +1892,7 @@ Detecting Network Interference Without Endpoint Participation - + @@ -1921,7 +1921,7 @@ Running a high-performance pluggable transports Tor bridge - + @@ -1949,7 +1949,7 @@ Towards a Comprehensive Understanding of Russian Transit Censorship - + @@ -1977,7 +1977,7 @@ Proteus: Programmable Protocols for Censorship Circumvention - + @@ -2005,7 +2005,7 @@ Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling - + @@ -2033,7 +2033,7 @@ Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies - + @@ -2061,7 +2061,7 @@ Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale f - + @@ -2089,7 +2089,7 @@ How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic - + @@ -2118,7 +2118,7 @@ Lox: Protecting the Social Graph in Bridge Distribution - + @@ -2146,7 +2146,7 @@ Dolphin: A Cellular Voice Based Internet Shutdown Resistance System - + @@ -2175,7 +2175,7 @@ CensorWatch: On the Implementation of Online Censorship in India - + @@ -2204,7 +2204,7 @@ Chasing Shadows: A security analysis of the ShadowTLS proxy - + @@ -2233,7 +2233,7 @@ Security Notions for Fully Encrypted Protocols - + @@ -2261,7 +2261,7 @@ Advancing the Art of Censorship Data Analysis - + @@ -2289,7 +2289,7 @@ Global, Passive Detection of Connection Tampering - + @@ -2319,7 +2319,7 @@ In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolve - + @@ -2347,7 +2347,7 @@ Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with - + @@ -2375,7 +2375,7 @@ Network Measurement Methods for Locating and Examining Censorship Devices - + @@ -2403,7 +2403,7 @@ TSPU: Russia’s Decentralized Censorship System - + @@ -2431,7 +2431,7 @@ Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement - + @@ -2459,7 +2459,7 @@ GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies - + @@ -2487,7 +2487,7 @@ OpenVPN is Open to VPN Fingerprinting - + @@ -2516,7 +2516,7 @@ Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet - + @@ -2544,7 +2544,7 @@ COVID-19 increased censorship circumvention and access to sensitive topics in Ch - + @@ -2572,7 +2572,7 @@ Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet - + @@ -2602,7 +2602,7 @@ Understanding Internet Censorship in Europe: The Case of Spain - + @@ -2630,7 +2630,7 @@ OUStralopithecus: Overt User Simulation for Censorship Circumvention - + @@ -2658,7 +2658,7 @@ Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels - + @@ -2686,7 +2686,7 @@ Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China - + @@ -2715,7 +2715,7 @@ Meteor: Cryptographically Secure Steganography for Realistic Distributions - + @@ -2743,7 +2743,7 @@ Throttling Twitter: an emerging censorship technique in Russia - + @@ -2772,7 +2772,7 @@ Web censorship measurements of HTTP/3 over QUIC - + @@ -2800,7 +2800,7 @@ Measuring DoT/DoH blocking using OONI Probe: a preliminary study - + @@ -2828,7 +2828,7 @@ A multi-perspective view of Internet censorship in Myanmar - + @@ -2856,7 +2856,7 @@ Measuring QQMail’s Automated Email Censorship in China - + @@ -2885,7 +2885,7 @@ Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels - + @@ -2913,7 +2913,7 @@ Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middlebo - + @@ -2942,7 +2942,7 @@ BlindTLS: Circumventing TLS-Based HTTPS Censorship - + @@ -2971,7 +2971,7 @@ Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resis - + @@ -2999,7 +2999,7 @@ Weaponizing Middleboxes for TCP Reflected Amplification - + @@ -3027,7 +3027,7 @@ How Great is the Great Firewall? Measuring China’s DNS Censorship - + @@ -3056,7 +3056,7 @@ Balboa: Bobbing and Weaving around Network Censorship - + @@ -3084,7 +3084,7 @@ Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability - + @@ -3113,7 +3113,7 @@ Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs - + @@ -3144,7 +3144,7 @@ Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert C - + @@ -3173,7 +3173,7 @@ Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communication - + @@ -3202,7 +3202,7 @@ Censored Planet: An Internet-wide, Longitudinal Censorship Observatory - + @@ -3230,7 +3230,7 @@ How China Detects and Blocks Shadowsocks - + @@ -3259,7 +3259,7 @@ Investigating Large Scale HTTPS Interception in Kazakhstan - + @@ -3287,7 +3287,7 @@ Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side E - + @@ -3315,7 +3315,7 @@ MIMIQ: Masking IPs with Migration in QUIC - + @@ -3344,7 +3344,7 @@ Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Ar - + @@ -3373,7 +3373,7 @@ Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior - + @@ -3402,7 +3402,7 @@ Slitheen++: Stealth TLS-based Decoy Routing - + @@ -3431,7 +3431,7 @@ Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Fil - + @@ -3459,7 +3459,7 @@ Turbo Tunnel, a good way to design censorship circumvention protocols - + @@ -3488,7 +3488,7 @@ HTTPT: A Probe-Resistant Proxy - + @@ -3516,7 +3516,7 @@ How India Censors the Web - + @@ -3545,7 +3545,7 @@ Characterizing Transnational Internet Performance and the Great Bottleneck of Ch - + @@ -3574,7 +3574,7 @@ SiegeBreaker: An SDN Based Practical Decoy Routing System - + @@ -3603,7 +3603,7 @@ Running Refraction Networking for Real - + @@ -3632,7 +3632,7 @@ MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencie - + @@ -3661,7 +3661,7 @@ ICLab: A Global, Longitudinal Internet Censorship Measurement Platform - + @@ -3690,7 +3690,7 @@ SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Disco - + @@ -3719,7 +3719,7 @@ MassBrowser: Unblocking the Censored Web for the Masses, by the Masses - + @@ -3748,7 +3748,7 @@ Detecting Probe-resistant Proxies - + @@ -3777,7 +3777,7 @@ Measuring the Deployment of Network Censorship Filters at Global Scale - + @@ -3806,7 +3806,7 @@ Decentralized Control: A Case Study of Russia - + @@ -3834,7 +3834,7 @@ Protocol Proxy: An FTE-based covert channel - + @@ -3852,7 +3852,35 @@ In: Computers & Security, 2020, Elsevier - + + + +The Impact of Media Censorship: 1984 or Brave New World? + + + + + + + + + + + + + + + + + + +Yuyu Chen, David Y. Yang + + + +In: American Economic Review, 2019, American Economic Association + + Conjure: Summoning Proxies from Unused Address Space @@ -3865,7 +3893,7 @@ Conjure: Summoning Proxies from Unused Address Space - + @@ -3894,7 +3922,7 @@ Geneva: Evolving Censorship Evasion Strategies - + @@ -3922,7 +3950,7 @@ Distributed Detection of Tor Directory Authorities Censorship in Mexico - + @@ -3950,7 +3978,7 @@ Shedding Light on Mobile App Store Censorship - + @@ -3979,7 +4007,7 @@ Improving Meek With Adversarial Techniques - + @@ -4008,7 +4036,7 @@ On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention - + @@ -4036,7 +4064,7 @@ An Efficient Method to Determine which Combination of Keywords Triggered Automat - + @@ -4065,7 +4093,7 @@ Measuring I2P Censorship at a Global Scale - + @@ -4093,7 +4121,7 @@ Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory - + @@ -4122,7 +4150,7 @@ The use of TLS in Censorship Circumvention - + @@ -4152,7 +4180,7 @@ On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Ce - + @@ -4180,7 +4208,7 @@ Where The Light Gets In: Analyzing Web Censorship Mechanisms in India - + @@ -4208,7 +4236,7 @@ In Proc. of: Internet Measurement Conference, 2018, A - + @@ -4236,7 +4264,7 @@ An Empirical Study of the I2P Anonymity Network and its Censorship Resistance - + @@ -4265,7 +4293,7 @@ Secure asymmetry and deployability for decoy routing systems - + @@ -4294,7 +4322,7 @@ Effective Detection of Multimedia Protocol Tunneling using Machine Learning - + @@ -4323,7 +4351,7 @@ Quack: Scalable Remote Measurement of Application-Layer Censorship - + @@ -4351,7 +4379,7 @@ Incentivizing Censorship Measurements via Circumvention - + @@ -4380,7 +4408,7 @@ Analyzing China’s Blocking of Unpublished Tor Bridges - + @@ -4409,7 +4437,7 @@ MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption - + @@ -4437,7 +4465,7 @@ An analysis of automatic image filtering on WeChat Moments - + @@ -4465,7 +4493,7 @@ A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability - + @@ -4493,7 +4521,7 @@ Automatically Generating a Large, Culture-Specific Blocklist for China - + @@ -4521,7 +4549,7 @@ How Sudden Censorship Can Increase Access to Information - + @@ -4549,7 +4577,7 @@ Detecting Censorable Content on Sina Weibo: A Pilot Study - + @@ -4577,7 +4605,7 @@ Proof-of-Censorship: Enabling centralized censorship-resistant content providers - + @@ -4607,7 +4635,7 @@ The Devil’s in The Details: Placing Decoy Routers in the Internet - + @@ -4635,7 +4663,7 @@ Lavinia: An audit-payment protocol for censorship-resistant storage - + @@ -4663,7 +4691,7 @@ The Random Forest based Detection of Shadowsock’s Traffic - + @@ -4691,7 +4719,7 @@ DeTor: Provably Avoiding Geographic Regions in Tor - + @@ -4719,7 +4747,7 @@ Mending Wall: On the Implementation of Censorship in India - + @@ -4747,7 +4775,7 @@ Online Advertising under Internet Censorship - + @@ -4775,7 +4803,7 @@ Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling - + @@ -4803,7 +4831,7 @@ Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue - + @@ -4831,7 +4859,7 @@ A Churn for the Better: Localizing Censorship using Network-level Path Churn and - + @@ -4859,7 +4887,7 @@ The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attac - + @@ -4887,7 +4915,7 @@ Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship - + @@ -4915,7 +4943,7 @@ lib·erate, (n): A library for exposing (traffic-classification) rules and avoid - + @@ -4943,7 +4971,7 @@ When the Internet Goes Down in Bangladesh - + @@ -4971,7 +4999,7 @@ Characterizing the Nature and Dynamics of Tor Exit Blocking - + @@ -4999,7 +5027,7 @@ Global Measurement of DNS Manipulation - + @@ -5027,7 +5055,7 @@ FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URL - + @@ -5055,7 +5083,7 @@ Measuring Decentralization of Chinese Keyword Censorship via Mobile Games - + @@ -5083,7 +5111,7 @@ The Decline of Social Media Censorship and the Rise of Self-Censorship after the - + @@ -5112,7 +5140,7 @@ Autosonda: Discovering Rules and Triggers of Censorship Devices - + @@ -5140,7 +5168,7 @@ An ISP-Scale Deployment of TapDance - + @@ -5168,7 +5196,7 @@ DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Video - + @@ -5196,7 +5224,7 @@ Topics of Controversy: An Empirical Analysis of Web Censorship Lists - + @@ -5224,7 +5252,7 @@ A Usability Evaluation of Tor Launcher - + @@ -5252,7 +5280,7 @@ Augur: Internet-Wide Detection of Connectivity Disruptions - + @@ -5280,7 +5308,7 @@ Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers - + @@ -5308,7 +5336,7 @@ Internet Censorship in Thailand: User Practices and Potential Threats - + @@ -5336,7 +5364,7 @@ Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infras - + @@ -5366,7 +5394,7 @@ Fingerprintability of WebRTC - + @@ -5394,7 +5422,7 @@ Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses - + @@ -5422,7 +5450,7 @@ Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement - + @@ -5450,7 +5478,7 @@ Game of Decoys: Optimal Decoy Routing Through Game Theory - + @@ -5478,7 +5506,7 @@ Practical Censorship Evasion Leveraging Content Delivery Networks - + @@ -5506,7 +5534,7 @@ DNS-sly: Avoiding Censorship through Network Complexity - + @@ -5534,7 +5562,7 @@ Matryoshka: Hiding Secret Communication in Plain Sight - + @@ -5562,7 +5590,7 @@ GhostPost: Seamless Restoration of Censored Social Media Posts - + @@ -5590,7 +5618,7 @@ Censors’ Delay in Blocking Circumvention Proxies - + @@ -5618,7 +5646,7 @@ The Politics of Routing: Investigating the Relationship Between AS Connectivity - + @@ -5646,7 +5674,7 @@ A Framework for the Game-theoretic Analysis of Censorship Resistance - + @@ -5674,7 +5702,7 @@ SoK: Making Sense of Censorship Resistance Systems - + @@ -5703,7 +5731,7 @@ Salmon: Robust Proxy Distribution for Censorship Circumvention - + @@ -5731,7 +5759,7 @@ Satellite: Joint Analysis of CDNs and Network-Level Interference - + @@ -5759,7 +5787,7 @@ Analyzing Internet Censorship in Pakistan - + @@ -5787,7 +5815,7 @@ Leveraging Internet Services to Evade Censorship - + @@ -5815,7 +5843,7 @@ Games Without Frontiers: Investigating Video Games as a Covert Channel - + @@ -5843,7 +5871,7 @@ Mailet: Instant Social Networking under Censorship - + @@ -5871,7 +5899,7 @@ CovertCast: Using Live Streaming to Evade Internet Censorship - + @@ -5899,7 +5927,7 @@ SkypeLine: Robust Hidden Data Transmission for VoIP - + @@ -5927,7 +5955,7 @@ Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regi - + @@ -5955,7 +5983,7 @@ SoK: Towards Grounding Censorship Circumvention in Empiricism - + @@ -5985,7 +6013,7 @@ Alibi Routing - + @@ -6013,7 +6041,7 @@ No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement - + @@ -6041,7 +6069,7 @@ Rebound: Decoy Routing on Asymmetric Routes Via Error Messages - + @@ -6069,7 +6097,7 @@ Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homopho - + @@ -6097,7 +6125,7 @@ A Case for Marrying Censorship Measurements with Circumvention - + @@ -6125,7 +6153,7 @@ Can Censorship Measurements Be Safe(r)? - + @@ -6153,7 +6181,7 @@ Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Pl - + @@ -6181,7 +6209,7 @@ Known Unknowns: An Analysis of Twitter Censorship in Turkey - + @@ -6210,7 +6238,7 @@ Examining How the Great Firewall Discovers Hidden Circumvention Servers - + @@ -6238,7 +6266,7 @@ CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content - + @@ -6266,7 +6294,7 @@ Seeing through Network-Protocol Obfuscation - + @@ -6294,7 +6322,7 @@ Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet - + @@ -6322,7 +6350,7 @@ Understanding Internet Censorship Policy: The Case of Greece - + @@ -6350,7 +6378,7 @@ Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms - + @@ -6378,7 +6406,7 @@ An Analysis of China’s “Great Cannon” - + @@ -6406,7 +6434,7 @@ Marionette: A Programmable Network-Traffic Obfuscation System - + @@ -6434,7 +6462,7 @@ Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests - + @@ -6462,7 +6490,7 @@ Ethical Concerns for Censorship Measurement - + @@ -6490,7 +6518,7 @@ Analyzing the Great Firewall of China Over Space and Time - + @@ -6518,7 +6546,7 @@ Blocking-resistant communication through domain fronting - + @@ -6546,7 +6574,7 @@ Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative - + @@ -6574,7 +6602,7 @@ Internet Censorship detection: A survey - + @@ -6602,7 +6630,7 @@ Monitoring Internet Censorship with UBICA - + @@ -6632,7 +6660,7 @@ GoHop: Personal VPN to Defend from Censorship - + @@ -6660,7 +6688,7 @@ Global Network Interference Detection over the RIPE Atlas Network - + @@ -6688,7 +6716,7 @@ Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship - + @@ -6716,7 +6744,7 @@ CloudTransport: Using Cloud Storage for Censorship-Resistant Networking - + @@ -6744,7 +6772,7 @@ Censorship in the Wild: Analyzing Internet Filtering in Syria - + @@ -6772,7 +6800,7 @@ TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography - + @@ -6800,7 +6828,7 @@ Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels - + @@ -6828,7 +6856,7 @@ No Direction Home: The True Cost of Routing Around Decoys - + @@ -6856,7 +6884,7 @@ Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search - + @@ -6884,7 +6912,7 @@ Automated Detection and Fingerprinting of Censorship Block Pages - + @@ -6912,7 +6940,7 @@ A Look at the Consequences of Internet Censorship Through an ISP Lens - + @@ -6940,7 +6968,7 @@ Reverse-engineering censorship in China: Randomized experimentation and particip - + @@ -6968,7 +6996,7 @@ Facet: Streaming over Videoconferencing for Censorship Circumvention - + @@ -6996,7 +7024,7 @@ LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - + @@ -7024,7 +7052,7 @@ Toward automatic censorship detection in microblogs - + @@ -7052,7 +7080,7 @@ VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance - + @@ -7080,7 +7108,7 @@ Measuring Freenet in the Wild: Censorship-resilience under Observation - + @@ -7108,7 +7136,7 @@ Censorship Resistance as a Side-Effect - + @@ -7136,7 +7164,7 @@ A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System - + @@ -7164,7 +7192,7 @@ TapDance: End-to-Middle Anticensorship without Flow Blocking - + @@ -7194,7 +7222,7 @@ Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorshi - + @@ -7222,7 +7250,7 @@ Self-Censorship on Facebook - + @@ -7250,7 +7278,7 @@ Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran - + @@ -7279,7 +7307,7 @@ Internet Censorship in Iran: A First Look - + @@ -7307,7 +7335,7 @@ Gaining Insight into AS-level Outages through Analysis of Internet Background Ra - + @@ -7335,7 +7363,7 @@ Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on S - + @@ -7363,7 +7391,7 @@ A Method for Identifying and Confirming the Use of URL Filtering Products for Ce - + @@ -7391,7 +7419,7 @@ Revealing Middlebox Interference with Tracebox - + @@ -7419,7 +7447,7 @@ Protocol Misidentification Made Easy with Format-Transforming Encryption - + @@ -7447,7 +7475,7 @@ OSS: Using Online Scanning Services for Censorship Circumvention - + @@ -7475,7 +7503,7 @@ Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention - + @@ -7503,7 +7531,7 @@ Building Dissent Networks: Towards Effective Countermeasures against Large-Scale - + @@ -7531,7 +7559,7 @@ I want my voice to be heard: IP over Voice-over-IP for unobservable censorship c - + @@ -7560,7 +7588,7 @@ The Parrot is Dead: Observing Unobservable Network Communications - + @@ -7588,7 +7616,7 @@ Message In A Bottle: Sailing Past Censorship - + @@ -7616,7 +7644,7 @@ Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion - + @@ -7644,7 +7672,7 @@ The Anatomy of Web Censorship in Pakistan - + @@ -7672,7 +7700,7 @@ Identity-Based Steganography and Its Applications to Censorship Resistance - + @@ -7700,7 +7728,7 @@ Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest - + @@ -7728,7 +7756,7 @@ On the Feasibility of a Censorship Resistant Decentralized Name System - + @@ -7756,7 +7784,7 @@ rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation - + @@ -7784,7 +7812,7 @@ Towards a Censorship Analyser for Tor - + @@ -7812,7 +7840,7 @@ ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship - + @@ -7840,7 +7868,7 @@ SWEET: Serving the Web by Exploiting Email Tunnels - + @@ -7868,7 +7896,7 @@ The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions - + @@ -7898,7 +7926,7 @@ Technical analysis of the Ultrasurf proxying software - + @@ -7926,7 +7954,7 @@ Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resource - + @@ -7954,7 +7982,7 @@ The Hidden Internet of Iran: Private Address Allocations on a National Network - + @@ -7982,7 +8010,7 @@ The Collateral Damage of Internet Censorship by DNS Injection - + @@ -8010,7 +8038,7 @@ Hold-On: Protecting Against On-Path DNS Poisoning - + @@ -8038,7 +8066,7 @@ Evading Censorship with Browser-Based Proxies - + @@ -8066,7 +8094,7 @@ OONI: Open Observatory of Network Interference - + @@ -8094,7 +8122,7 @@ How Censorship in China Allows Government Criticism but Silences Collective Expr - + @@ -8122,7 +8150,7 @@ Bootstrapping Communications into an Anti-Censorship System - + @@ -8150,7 +8178,7 @@ Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery - + @@ -8178,7 +8206,7 @@ SkypeMorph: Protocol Obfuscation for Tor Bridges - + @@ -8206,7 +8234,7 @@ Secure Communication over Diverse Transports - + @@ -8234,7 +8262,7 @@ Routing Around Decoys - + @@ -8262,7 +8290,7 @@ Adapting Social Spam Infrastructure for Political Censorship - + @@ -8290,7 +8318,7 @@ One-way indexing for plausible deniability in censorship resistant storage - + @@ -8318,7 +8346,7 @@ Inferring Mechanics of Web Censorship Around the World - + @@ -8346,7 +8374,7 @@ CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resista - + @@ -8374,7 +8402,7 @@ StegoTorus: A Camouflage Proxy for the Tor Anonymity System - + @@ -8402,7 +8430,7 @@ How the Great Firewall of China is Blocking Tor - + @@ -8430,7 +8458,7 @@ Regional Variation in Chinese Internet Filtering - + @@ -8460,7 +8488,7 @@ BridgeSPA: Improving Tor Bridges with Single Packet Authorization - + @@ -8488,7 +8516,7 @@ Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing - + @@ -8516,7 +8544,7 @@ In Proc. of: Free and Open Communications on the Internet - + @@ -8544,7 +8572,7 @@ Scrambling for lightweight censorship resistance - + @@ -8572,7 +8600,7 @@ Analysis of Country-wide Internet Outages Caused by Censorship - + @@ -8600,7 +8628,7 @@ An anomaly-based censorship-detection system for Tor - + @@ -8628,7 +8656,7 @@ Automated Named Entity Extraction for Tracking Censorship of Current Events - + @@ -8656,7 +8684,7 @@ Cirripede: Circumvention Infrastructure using Router Redirection with Plausible - + @@ -8684,7 +8712,7 @@ Decoy Routing: Toward Unblockable Internet Communication - + @@ -8712,7 +8740,7 @@ Bypassing Internet Censorship for News Broadcasters - + @@ -8740,7 +8768,7 @@ Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorsh - + @@ -8768,7 +8796,7 @@ Tor Instead of IP - + @@ -8796,7 +8824,7 @@ Proximax: A Measurement Based System for Proxies Dissemination - + @@ -8824,7 +8852,7 @@ Mapping Local Internet Control - + @@ -8852,7 +8880,7 @@ Infrastructures of Censorship and Lessons from Copyright Resistance - + @@ -8880,7 +8908,7 @@ CensMon: A Web Censorship Monitor - + @@ -8908,7 +8936,7 @@ Online Contribution Practices in Countries that Engage in Internet Blocking and - + @@ -8936,7 +8964,7 @@ Dust: A Blocking-Resistant Internet Transport Protocol - + @@ -8964,7 +8992,7 @@ Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics - + @@ -8992,7 +9020,7 @@ Telex: Anticensorship in the Network Infrastructure - + @@ -9020,7 +9048,7 @@ Internet Censorship in China: Where Does the Filtering Occur? - + @@ -9050,7 +9078,7 @@ A terminology for talking about privacy by data minimization: Anonymity, Unlinka - + @@ -9078,7 +9106,7 @@ Chipping Away at Censorship Firewalls with User-Generated Content - + @@ -9106,7 +9134,7 @@ Fighting Censorship with Algorithms - + @@ -9134,7 +9162,7 @@ Empirical Study of a National-Scale Distributed Intrusion Detection System: Back - + @@ -9164,7 +9192,7 @@ On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking r - + @@ -9192,7 +9220,7 @@ Anonymity and Censorship Resistance in Unstructured Overlay Networks - + @@ -9220,7 +9248,7 @@ SkyF2F: Censorship Resistant via Skype Overlay Network - + @@ -9248,7 +9276,7 @@ Detecting Forged TCP Reset Packets - + @@ -9278,7 +9306,7 @@ In Proc. of: Network and Distributed System Security, - + @@ -9306,7 +9334,7 @@ Pass it on: Social Networks Stymie Censors - + @@ -9336,7 +9364,7 @@ ConceptDoppler: A Weather Tracker for Internet Censorship - + @@ -9364,7 +9392,7 @@ The Great DNS Wall of China - + @@ -9394,7 +9422,7 @@ Investigating large-scale Internet content filtering - + @@ -9422,7 +9450,7 @@ Ignoring the Great Firewall of China - + @@ -9450,7 +9478,7 @@ Failures in a Hybrid Content Blocking System - + @@ -9478,7 +9506,7 @@ Design of a blocking-resistant anonymity system - + @@ -9508,7 +9536,7 @@ Censorship Resistance Revisited - + @@ -9538,7 +9566,7 @@ The Economics of Censorship Resistance - + @@ -9566,7 +9594,7 @@ How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web S - + @@ -9596,7 +9624,7 @@ Government mandated blocking of foreign Web content - + @@ -9624,7 +9652,7 @@ Thwarting Web Censorship with Untrusted Messenger Discovery - + @@ -9654,7 +9682,7 @@ Infranet: Circumventing Web Censorship and Surveillance - + @@ -9682,7 +9710,7 @@ Anonymizing Censorship Resistant Systems - + @@ -9712,7 +9740,7 @@ Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Prot - + @@ -9740,7 +9768,7 @@ Dagster: Censorship-Resistant Publishing Without Replication - + @@ -9768,7 +9796,7 @@ Tangler: A Censorship-Resistant Publishing System Based On Document Entanglement - + @@ -9798,7 +9826,7 @@ Publius: A robust, tamper-evident, censorship-resistant web publishing system - + @@ -9828,7 +9856,7 @@ Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection - + @@ -9858,7 +9886,7 @@ The Eternity Service - +