From ccbe7cd10d3239a9ce0a23e60cda1bcf29fcd24f Mon Sep 17 00:00:00 2001 From: NullHypothesis Date: Mon, 16 Jun 2025 12:51:28 +0000 Subject: [PATCH] =?UTF-8?q?Deploying=20to=20gh-pages=20from=20@=20NullHypo?= =?UTF-8?q?thesis/censorbib@9ff0850315b9436a8428d0ac207b0e270316b45f=20?= =?UTF-8?q?=F0=9F=9A=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- index.html | 712 ++++++++++++++++++++++++++++------------------------- 1 file changed, 370 insertions(+), 342 deletions(-) diff --git a/index.html b/index.html index dd2d2f5..a315ad1 100644 --- a/index.html +++ b/index.html @@ -230,7 +230,7 @@ A Wall Behind A Wall: Emerging Regional Censorship in China Cached download icon - + BibTeX download icon @@ -258,7 +258,7 @@ Learning from Censored Experiences: Social Media Discussions around Censorship C Cached download icon - + BibTeX download icon @@ -286,7 +286,7 @@ Transport Layer Obscurity: Circumventing SNI Censorship on the TLS Layer Cached download icon - + BibTeX download icon @@ -314,7 +314,7 @@ Is Nobody There? Good! Globally Measuring Connection Tampering without Responsiv Cached download icon - + BibTeX download icon @@ -343,7 +343,7 @@ Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China Cached download icon - + BibTeX download icon @@ -371,7 +371,7 @@ The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic Cached download icon - + BibTeX download icon @@ -399,7 +399,7 @@ Is Custom Congestion Control a Bad Idea for Circumvention Tools? Cached download icon - + BibTeX download icon @@ -427,7 +427,7 @@ I(ra)nconsistencies: Novel Insights into Iran’s Censorship Cached download icon - + BibTeX download icon @@ -455,7 +455,7 @@ Extended Abstract: Using TURN Servers for Censorship Evasion Cached download icon - + BibTeX download icon @@ -483,7 +483,7 @@ Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censo Cached download icon - + BibTeX download icon @@ -511,7 +511,7 @@ Examining Leading Pakistani Mobile Apps Cached download icon - + BibTeX download icon @@ -539,7 +539,7 @@ Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing Cached download icon - + BibTeX download icon @@ -569,7 +569,7 @@ Look What’s There! Utilizing the Internet’s Existing Data for Censorship Cir Cached download icon - + BibTeX download icon @@ -597,7 +597,7 @@ Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circu Cached download icon - + BibTeX download icon @@ -625,7 +625,7 @@ SpotProxy: Rediscovering the Cloud for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -653,7 +653,7 @@ Communication Breakdown: Modularizing Application Tunneling for Signaling Around Cached download icon - + BibTeX download icon @@ -681,7 +681,7 @@ Automatic Generation of Web Censorship Probe Lists Cached download icon - + BibTeX download icon @@ -709,7 +709,7 @@ Extended Abstract: The Impact of Online Censorship on LLMs Cached download icon - + BibTeX download icon @@ -737,7 +737,7 @@ Extended Abstract: Leveraging Large Language Models to Identify Internet Censors Cached download icon - + BibTeX download icon @@ -765,7 +765,7 @@ Toward Automated DNS Tampering Detection Using Machine Learning Cached download icon - + BibTeX download icon @@ -793,7 +793,7 @@ Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -821,7 +821,7 @@ Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistan Cached download icon - + BibTeX download icon @@ -849,7 +849,7 @@ Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burd Cached download icon - + BibTeX download icon @@ -877,7 +877,7 @@ Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smugg Cached download icon - + BibTeX download icon @@ -905,7 +905,7 @@ Detecting VPN Traffic through Encapsulated TCP Behavior Cached download icon - + BibTeX download icon @@ -933,7 +933,7 @@ Analyzing Prominent Mobile Apps in Latin America Cached download icon - + BibTeX download icon @@ -961,7 +961,7 @@ Lost in Translation: Characterizing Automated Censorship in Online Translation S Cached download icon - + BibTeX download icon @@ -989,7 +989,7 @@ Identifying VPN Servers through Graph-Represented Behaviors Cached download icon - + BibTeX download icon @@ -1017,7 +1017,7 @@ GFWeb: Measuring the Great Firewall’s Web Censorship at Scale Cached download icon - + BibTeX download icon @@ -1045,7 +1045,7 @@ Digital Repression in Palestine Cached download icon - + BibTeX download icon @@ -1073,7 +1073,7 @@ How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censor Cached download icon - + BibTeX download icon @@ -1102,7 +1102,7 @@ Snowflake, a censorship circumvention system using temporary WebRTC proxies Cached download icon - + BibTeX download icon @@ -1130,7 +1130,7 @@ Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against S Cached download icon - + BibTeX download icon @@ -1158,7 +1158,7 @@ Out in the Open: On the Implementation of Mobile App Filtering in India Cached download icon - + BibTeX download icon @@ -1186,7 +1186,7 @@ Communication Breakdown: Modularizing Application Tunneling for Signaling Around Cached download icon - + BibTeX download icon @@ -1214,7 +1214,7 @@ Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model Cached download icon - + BibTeX download icon @@ -1242,7 +1242,7 @@ Modeling and Detecting Internet Censorship Events Cached download icon - + BibTeX download icon @@ -1270,7 +1270,7 @@ Internet Sanctions on Russian Media: Actions and Effects Cached download icon - + BibTeX download icon @@ -1299,7 +1299,7 @@ Bleeding Wall: A Hematologic Examination on the Great Firewall Cached download icon - + BibTeX download icon @@ -1327,7 +1327,7 @@ Just add WATER: WebAssembly-based Circumvention Transports Cached download icon - + BibTeX download icon @@ -1355,7 +1355,7 @@ Extended Abstract: Traffic Splitting for Pluggable Transports Cached download icon - + BibTeX download icon @@ -1383,7 +1383,7 @@ Extended Abstract: Oscur0: One-shot Circumvention without Registration Cached download icon - + BibTeX download icon @@ -1411,7 +1411,7 @@ Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes Cached download icon - + BibTeX download icon @@ -1439,7 +1439,7 @@ NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge Cached download icon - + BibTeX download icon @@ -1468,7 +1468,7 @@ On Precisely Detecting Censorship Circumvention in Real-World Networks Cached download icon - + BibTeX download icon @@ -1498,7 +1498,7 @@ Discop: Provably secure steganography in practice based on “distribution copie Cached download icon - + BibTeX download icon @@ -1527,7 +1527,7 @@ Poster: Circumventing the GFW with TLS Record Fragmentation Cached download icon - + BibTeX download icon @@ -1555,7 +1555,7 @@ Website blocking in the European Union: Network interference from the perspectiv Cached download icon - + BibTeX download icon @@ -1583,7 +1583,7 @@ Comments on certain past cryptographic flaws affecting fully encrypted censorshi Cached download icon - + BibTeX download icon @@ -1611,7 +1611,7 @@ Destination Unreachable: Characterizing Internet Outages and Shutdowns Cached download icon - + BibTeX download icon @@ -1639,7 +1639,7 @@ Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning Cached download icon - + BibTeX download icon @@ -1667,7 +1667,7 @@ A Study of China’s Censorship and Its Evasion Through the Lens of Online Gamin Cached download icon - + BibTeX download icon @@ -1695,7 +1695,7 @@ DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorshi Cached download icon - + BibTeX download icon @@ -1723,7 +1723,7 @@ TELEPATH: A Minecraft-based Covert Communication System Cached download icon - + BibTeX download icon @@ -1751,7 +1751,7 @@ Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Cached download icon - + BibTeX download icon @@ -1779,7 +1779,7 @@ Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law Cached download icon - + BibTeX download icon @@ -1807,7 +1807,7 @@ A Worldwide View of Nation-state Internet Censorship Cached download icon - + BibTeX download icon @@ -1835,7 +1835,7 @@ The Use of Push Notification in Censorship Circumvention Cached download icon - + BibTeX download icon @@ -1864,7 +1864,7 @@ Measuring and Evading Turkmenistan’s Internet Censorship Cached download icon - + BibTeX download icon @@ -1892,7 +1892,7 @@ Detecting Network Interference Without Endpoint Participation Cached download icon - + BibTeX download icon @@ -1921,7 +1921,7 @@ Running a high-performance pluggable transports Tor bridge Cached download icon - + BibTeX download icon @@ -1949,7 +1949,7 @@ Towards a Comprehensive Understanding of Russian Transit Censorship Cached download icon - + BibTeX download icon @@ -1977,7 +1977,7 @@ Proteus: Programmable Protocols for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -2005,7 +2005,7 @@ Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling Cached download icon - + BibTeX download icon @@ -2033,7 +2033,7 @@ Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -2061,7 +2061,7 @@ Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale f Cached download icon - + BibTeX download icon @@ -2089,7 +2089,7 @@ How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic Cached download icon - + BibTeX download icon @@ -2118,7 +2118,7 @@ Lox: Protecting the Social Graph in Bridge Distribution Cached download icon - + BibTeX download icon @@ -2146,7 +2146,7 @@ Dolphin: A Cellular Voice Based Internet Shutdown Resistance System Cached download icon - + BibTeX download icon @@ -2175,7 +2175,7 @@ CensorWatch: On the Implementation of Online Censorship in India Cached download icon - + BibTeX download icon @@ -2204,7 +2204,7 @@ Chasing Shadows: A security analysis of the ShadowTLS proxy Cached download icon - + BibTeX download icon @@ -2233,7 +2233,7 @@ Security Notions for Fully Encrypted Protocols Cached download icon - + BibTeX download icon @@ -2261,7 +2261,7 @@ Advancing the Art of Censorship Data Analysis Cached download icon - + BibTeX download icon @@ -2289,7 +2289,7 @@ Global, Passive Detection of Connection Tampering Cached download icon - + BibTeX download icon @@ -2319,7 +2319,7 @@ In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolve Cached download icon - + BibTeX download icon @@ -2347,7 +2347,7 @@ Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with Cached download icon - + BibTeX download icon @@ -2375,7 +2375,7 @@ Network Measurement Methods for Locating and Examining Censorship Devices Cached download icon - + BibTeX download icon @@ -2403,7 +2403,7 @@ TSPU: Russia’s Decentralized Censorship System Cached download icon - + BibTeX download icon @@ -2431,7 +2431,7 @@ Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement Cached download icon - + BibTeX download icon @@ -2459,7 +2459,7 @@ GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -2487,7 +2487,7 @@ OpenVPN is Open to VPN Fingerprinting Cached download icon - + BibTeX download icon @@ -2516,7 +2516,7 @@ Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Cached download icon - + BibTeX download icon @@ -2544,7 +2544,7 @@ COVID-19 increased censorship circumvention and access to sensitive topics in Ch Cached download icon - + BibTeX download icon @@ -2572,7 +2572,7 @@ Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Cached download icon - + BibTeX download icon @@ -2602,7 +2602,7 @@ Understanding Internet Censorship in Europe: The Case of Spain Cached download icon - + BibTeX download icon @@ -2630,7 +2630,7 @@ OUStralopithecus: Overt User Simulation for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -2658,7 +2658,7 @@ Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels Cached download icon - + BibTeX download icon @@ -2686,7 +2686,7 @@ Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China Cached download icon - + BibTeX download icon @@ -2715,7 +2715,7 @@ Meteor: Cryptographically Secure Steganography for Realistic Distributions Cached download icon - + BibTeX download icon @@ -2743,7 +2743,7 @@ Throttling Twitter: an emerging censorship technique in Russia Cached download icon - + BibTeX download icon @@ -2772,7 +2772,7 @@ Web censorship measurements of HTTP/3 over QUIC Cached download icon - + BibTeX download icon @@ -2800,7 +2800,7 @@ Measuring DoT/DoH blocking using OONI Probe: a preliminary study Cached download icon - + BibTeX download icon @@ -2828,7 +2828,7 @@ A multi-perspective view of Internet censorship in Myanmar Cached download icon - + BibTeX download icon @@ -2856,7 +2856,7 @@ Measuring QQMail’s Automated Email Censorship in China Cached download icon - + BibTeX download icon @@ -2885,7 +2885,7 @@ Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels Cached download icon - + BibTeX download icon @@ -2913,7 +2913,7 @@ Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middlebo Cached download icon - + BibTeX download icon @@ -2942,7 +2942,7 @@ BlindTLS: Circumventing TLS-Based HTTPS Censorship Cached download icon - + BibTeX download icon @@ -2971,7 +2971,7 @@ Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resis Cached download icon - + BibTeX download icon @@ -2999,7 +2999,7 @@ Weaponizing Middleboxes for TCP Reflected Amplification Cached download icon - + BibTeX download icon @@ -3027,7 +3027,7 @@ How Great is the Great Firewall? Measuring China’s DNS Censorship Cached download icon - + BibTeX download icon @@ -3056,7 +3056,7 @@ Balboa: Bobbing and Weaving around Network Censorship Cached download icon - + BibTeX download icon @@ -3084,7 +3084,7 @@ Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Cached download icon - + BibTeX download icon @@ -3113,7 +3113,7 @@ Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs Cached download icon - + BibTeX download icon @@ -3144,7 +3144,7 @@ Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert C Cached download icon - + BibTeX download icon @@ -3173,7 +3173,7 @@ Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communication Cached download icon - + BibTeX download icon @@ -3202,7 +3202,7 @@ Censored Planet: An Internet-wide, Longitudinal Censorship Observatory Cached download icon - + BibTeX download icon @@ -3230,7 +3230,7 @@ How China Detects and Blocks Shadowsocks Cached download icon - + BibTeX download icon @@ -3259,7 +3259,7 @@ Investigating Large Scale HTTPS Interception in Kazakhstan Cached download icon - + BibTeX download icon @@ -3287,7 +3287,7 @@ Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side E Cached download icon - + BibTeX download icon @@ -3315,7 +3315,7 @@ MIMIQ: Masking IPs with Migration in QUIC Cached download icon - + BibTeX download icon @@ -3344,7 +3344,7 @@ Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Ar Cached download icon - + BibTeX download icon @@ -3373,7 +3373,7 @@ Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior Cached download icon - + BibTeX download icon @@ -3402,7 +3402,7 @@ Slitheen++: Stealth TLS-based Decoy Routing Cached download icon - + BibTeX download icon @@ -3431,7 +3431,7 @@ Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Fil Cached download icon - + BibTeX download icon @@ -3459,7 +3459,7 @@ Turbo Tunnel, a good way to design censorship circumvention protocols Cached download icon - + BibTeX download icon @@ -3488,7 +3488,7 @@ HTTPT: A Probe-Resistant Proxy Cached download icon - + BibTeX download icon @@ -3516,7 +3516,7 @@ How India Censors the Web Cached download icon - + BibTeX download icon @@ -3545,7 +3545,7 @@ Characterizing Transnational Internet Performance and the Great Bottleneck of Ch Cached download icon - + BibTeX download icon @@ -3574,7 +3574,7 @@ SiegeBreaker: An SDN Based Practical Decoy Routing System Cached download icon - + BibTeX download icon @@ -3603,7 +3603,7 @@ Running Refraction Networking for Real Cached download icon - + BibTeX download icon @@ -3632,7 +3632,7 @@ MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencie Cached download icon - + BibTeX download icon @@ -3661,7 +3661,7 @@ ICLab: A Global, Longitudinal Internet Censorship Measurement Platform Cached download icon - + BibTeX download icon @@ -3690,7 +3690,7 @@ SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Disco Cached download icon - + BibTeX download icon @@ -3719,7 +3719,7 @@ MassBrowser: Unblocking the Censored Web for the Masses, by the Masses Cached download icon - + BibTeX download icon @@ -3748,7 +3748,7 @@ Detecting Probe-resistant Proxies Cached download icon - + BibTeX download icon @@ -3777,7 +3777,7 @@ Measuring the Deployment of Network Censorship Filters at Global Scale Cached download icon - + BibTeX download icon @@ -3806,7 +3806,7 @@ Decentralized Control: A Case Study of Russia Cached download icon - + BibTeX download icon @@ -3834,7 +3834,7 @@ Protocol Proxy: An FTE-based covert channel Cached download icon - + BibTeX download icon @@ -3852,7 +3852,35 @@ In: Computers & Security, 2020, Elsevier