@inproceedings{Crandall2015a, author = {Jedidiah R. Crandall and Masashi Crete-Nishihata and Jeffrey Knockel}, title = {Forgive Us our {SYN}s: Technical and Ethical Considerations for Measuring {I}nternet Filtering}, booktitle = {Ethics in Networked Systems Research}, publisher = {ACM}, year = {2015}, url = {http://ensr.oii.ox.ac.uk/wp-content/uploads/2015/07/Forgive-Us-Our-SYNs-Technical-and-Ethical-Considerations-for-Measuring-Internet-Censorship.pdf} } @inproceedings{Smits2011a, author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner}, title = {{B}ridge{SPA}: Improving {T}or Bridges with Single Packet Authorization}, booktitle = {Workshop on Privacy in the Electronic Society}, publisher = {ACM}, year = {2011}, url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf}, } @inproceedings{Ververis2015a, author = {Vasilis Ververis and George Kargiotakis and Arturo Filast\`{o} and Benjamin Fabian and Afentoulis Alexandros}, title = {Understanding {I}nternet Censorship Policy: The Case of {G}reece}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2015}, url = {https://www.usenix.org/system/files/conference/foci15/foci15-paper-ververis-updated-2.pdf}, } @inproceedings{Knockel2015a, author = {Jeffrey Knockel and Masashi Crete-Nishihata and Jason Q. Ng and Adam Senft and Jedidiah R. Crandall}, title = {Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in {C}hina}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2015}, url = {https://www.usenix.org/system/files/conference/foci15/foci15-paper-knockel.pdf}, } @inproceedings{Marczak2015a, author = {Bill Marczak and Nicholas Weaver and Jakub Dalek and Roya Ensafi and David Fifield and Sarah McKune and Arn Rey and John Scott-Railton and Ron Deibert}, title = {An Analysis of {C}hina's ``{G}reat {C}annon''}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2015}, url = {https://www.usenix.org/system/files/conference/foci15/foci15-paper-marczak.pdf}, } @inproceedings{Dyer2015a, author = {Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton}, title = {Marionette: A Programmable Network-Traffic Obfuscation System}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, year = {2015}, url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf}, } @inproceedings{Burnett2015a, author = {Sam Burnett and Nick Feamster}, title = {Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests}, booktitle = {SIGCOMM}, publisher = {ACM}, year = {2015}, url = {http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p653.pdf}, } @inproceedings{Jones2011a, author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo and Michael J. Freedman}, title = {Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2011}, url = {http://www.cs.princeton.edu/~najones/publications/cor-foci11.pdf}, } @inproceedings{Jones2015a, author = {Ben Jones and Roya Ensafi and Nick Feamster and Vern Paxson and Nick Weaver}, title = {Ethical Concerns for Censorship Measurement}, publisher = {ACM}, booktitle = {Ethics in Networked Systems Research}, year = {2015}, url = {http://www.icir.org/vern/papers/censorship-meas.nsethics15.pdf}, } @article{Ensafi2015a, author = {Roya Ensafi and Philipp Winter and Abdullah Mueen and Jedidiah R. Crandall}, title = {Analyzing the {G}reat {F}irewall of {C}hina Over Space and Time}, journal = {Privacy Enhancing Technologies}, volume = {1}, number = {1}, publisher = {De Gruyter Open}, year = {2015}, url = {http://censorbib.nymity.ch/pdf/Ensafi2015a.pdf}, } @article{Fifield2015a, author = {David Fifield and Chang Lan and Rod Hynes and Percy Wegmann and Vern Paxson}, title = {Blocking-resistant communication through domain fronting}, journal = {Privacy Enhancing Technologies}, volume = {1}, number = {2}, publisher = {De Gruyter Open}, year = {2015}, url = {http://www.icir.org/vern/papers/meek-PETS-2015.pdf}, } @inproceedings{Backes2009a, author = {Michael Backes and Marek Hamerlik and Alessandro Linari and Matteo Maffei and Christos Tryfonopoulos and Gerhard Weikum}, title = {Anonymity and Censorship Resistance in Unstructured Overlay Networks}, booktitle = {On the Move to Meaningful Internet Systems}, publisher = {Springer}, year = {2009}, url = {https://sps.cs.uni-saarland.de/maffei/resources/coopis.pdf}, } @inproceedings{Wang2014a, author = {Yuzhi Wang and Ping Ji and Borui Ye and Pengjun Wang and Rong Luo and Huazhong Yang}, title = {Go{H}op: Personal {VPN} to Defend from Censorship}, booktitle = {International Conference on Advanced Communication Technology}, publisher = {IEEE}, year = {2014}, url = {http://censorbib.nymity.ch/pdf/Wang2014a.pdf}, } @article{Gill2015a, author = {Phillipa Gill and Masashi Crete-Nishihata and Jakub Dalek and Sharon Goldberg and Adam Senft and Greg Wiseman}, title = {Characterizing Web Censorship Worldwide: Another Look at the {O}pen{N}et {I}nitiative Data}, journal = {Transactions on the Web}, publisher = {ACM}, year = {2015}, volume = {9}, number = {1}, url = {http://censorbib.nymity.ch/pdf/Gill2015a.pdf}, } @inproceedings{Aase2012a, author = {Nicholas Aase and Jedidiah R. Crandall and \'{A}lvaro D\'{i}az and Jeffrey Knockel and Jorge Oca\~{n}a Molinero and Jared Saia and Dan Wallach and Tao Zhu}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations}, year = {2012}, url = {https://www.usenix.org/system/files/conference/foci12/foci12-final17.pdf}, } @article{Aceto2015b, author = {Giuseppe Aceto and Antonio Pescap\`{e}}, title = {{I}nternet Censorship detection: A survey}, journal = {Computer Networks}, publisher = {Elsevier}, year = {2015}, url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015internet_censorship_detection__a_survey.pdf}, } @inproceedings{Aceto2015a, author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and Nick Feamster and M. Faheem Awan and Tahir Ahmad and Saad Qaisar}, title = {Monitoring {I}nternet Censorship with {UBICA}}, booktitle = {Traffic Monitoring and Analysis}, publisher = {Springer}, year = {2015}, url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015monitoring_TMA.pdf}, } @inproceedings{Anderson1996a, author = {Ross J. Anderson}, booktitle = {Theory and Applications of Cryptology}, pages = {242--253}, publisher = {CTU Publishing House}, title = {The {E}ternity {S}ervice}, year = {1996}, url = {http://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf}, } @techreport{Anderson2012a, author = {Collin Anderson}, title = {The Hidden {I}nternet of {I}ran: Private Address Allocations on a National Network}, institution = {}, year = {2012}, url = {http://arxiv.org/pdf/1209.6398v1}, } @techreport{Anderson2013a, author = {Collin Anderson}, title = {Dimming the {I}nternet: Detecting Throttling as a Mechanism of Censorship in {I}ran}, institution = {University of Pennsylvania}, year = {2013}, url = {http://arxiv.org/pdf/1306.4361v1.pdf}, } @inproceedings{Anderson2014a, author = {Collin Anderson and Philipp Winter and Roya}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Global Network Interference Detection over the {RIPE} {A}tlas Network}, year = {2014}, url = {https://www.usenix.org/system/files/conference/foci14/foci14-anderson.pdf}, } @article{Sparks2012a, author = {Sparks and Neo and Tank and Smith and Dozer}, title = {The Collateral Damage of {I}nternet Censorship by {DNS} Injection}, journal = {SIGCOMM Computer Communication Review}, volume = {42}, number = {3}, pages = {21--27}, publisher = {ACM}, year = {2012}, url = {http://conferences.sigcomm.org/sigcomm/2012/paper/ccr-paper266.pdf}, } @inproceedings{Anonymous2014a, author = {Anonymous}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Towards a Comprehensive Picture of the {G}reat {F}irewall's {DNS} Censorship}, year = {2014}, url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf}, } @inproceedings{Aryan2013a, author = {Simurgh Aryan and Homa Aryan and J. Alex Halderman}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {{I}nternet Censorship in {I}ran: A First Look}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Aryan2013a.pdf}, } @article{Aycock2008a, author = {Aycock, John and Maurushat, Alana}, journal = {SIGCAS Computers \& Society}, publisher = {ACM}, number = {1}, pages = {28--39}, title = {``Good'' Worms and Human Rights}, volume = {38}, year = {2008}, url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007}, } @techreport{Bachrach2011a, author = {Dustin Bachrach and Christopher Nunu and Dan S. Wallach and Matthew Wright}, title = {\#h00t: Censorship Resistant Microblogging}, institution = {Rice University and University of Texas at Arlington}, year = {2011}, url = {http://arxiv.org/pdf/1109.6874v1.pdf}, } @inproceedings{Benson2013a, author = {Karyn Benson and Alberto Dainotti and Kimberly Claffy and Emile Aben}, title = {Gaining Insight into {AS}-level Outages through Analysis of {I}nternet Background Radiation}, booktitle = {Traffic Monitoring and Analysis}, publisher = {IEEE}, year = {2013}, url = {http://cseweb.ucsd.edu/~kbenson/papers/tma13.pdf}, } @inproceedings{Bonneau2011a, author = {Joseph Bonneau and Rubin Xu}, title = {Scrambling for lightweight censorship resistance}, booktitle = {Security Protocols}, publisher = {Springer}, year = {2011}, url = {http://www.jbonneau.com/doc/BX11-SPW-scrambling_censorship.pdf}, } @inproceedings{Brubaker2014a, author = {Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov}, title = {{C}loud{T}ransport: Using Cloud Storage for Censorship-Resistant Networking}, booktitle = {Privacy Enhancing Technologies Symposium}, publisher = {Springer}, year = {2014}, url = {https://petsymposium.org/2014/papers/paper_68.pdf}, } @inproceedings{Burnett2010a, author = {Sam Burnett and Nick Feamster and Santosh Vempala}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, title = {Chipping Away at Censorship Firewalls with User-Generated Content}, year = {2010}, url = {http://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf}, } @inproceedings{Cao2009a, author = {Shoufeng Cao and Longtao He and Zhongxian Li and Yixian Yang}, booktitle = {International Conference on Information Engineering}, pages = {350--354}, publisher = {IEEE}, title = {{S}ky{F2F}: Censorship Resistant via {S}kype Overlay Network}, year = {2009}, url = {http://censorbib.nymity.ch/pdf/Cao2009a.pdf}, } @inproceedings{Chaabane2014a, author = {Abdelberi Chaabane and Terence Chen and Mathieu Cunche and Emiliano De Cristofaro and Arik Friedman and Mohamed Ali Kaafar}, title = {Censorship in the Wild: Analyzing {I}nternet Filtering in {S}yria}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, year = {2014}, url = {http://conferences2.sigcomm.org/imc/2014/papers/p285.pdf}, } @inproceedings{Chen2013a, author = {Le Chen and Chi Zhang and Christo Wilson}, title = {Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on {S}ina {W}eibo}, booktitle = {Conference on Online Social Networks}, publisher = {ACM}, year = {2013}, url = {http://www.ccs.neu.edu/home/cbw/pdf/weibo-cosn13.pdf}, } @inproceedings{Clayton2006a, author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson}, booktitle = {Privacy Enhancing Technologies}, pages = {20--35}, publisher = {Springer}, title = {Ignoring the {G}reat {F}irewall of {C}hina}, year = {2006}, url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}, } @inproceedings{Clayton2006b, author = {Richard Clayton}, booktitle = {Privacy Enhancing Technologies}, pages = {78--92}, publisher = {Springer}, title = {Failures in a Hybrid Content Blocking System}, year = {2006}, url = {http://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf}, } @inproceedings{Connolly2014a, author = {Christopher Connolly and Patrick Lincoln and Ian Mason and Vinod Yegneswaran}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {{TRIST}: Circumventing Censorship with Transcoding-Resistant Image Steganography}, year = {2014}, url = {https://www.usenix.org/system/files/conference/foci14/foci14-connolly.pdf}, } @inproceedings{Crandall2007a, author = {Jedidiah R. Crandall and Daniel Zinn and Michael Byrd and Earl Barr and Rich East}, booktitle = {Computer and Communications Security}, pages = {352--365}, publisher = {ACM}, title = {{C}oncept{D}oppler: A Weather Tracker for {I}nternet Censorship}, year = {2007}, url = {http://www.csd.uoc.gr/~hy558/papers/conceptdoppler.pdf}, } @inproceedings{Dainotti2011a, author = {Alberto Dainotti and Claudio Squarcella and Emile Aben and Kimberly C. Claffy and Marco Chiesa and Michele Russo and Antonio Pescap\'{e}}, booktitle = {Internet Measurement Conference}, pages = {1--18}, publisher = {ACM}, title = {Analysis of Country-wide {I}nternet Outages Caused by Censorship}, year = {2011}, url = {http://conferences.sigcomm.org/imc/2011/docs/p1.pdf}, } @inproceedings{Dalek2013a, author = {Jakub Dalek and Bennett Haselton and Helmi Noman and Adam Senft and Masashi Crete-Nishihata and Phillipa Gill and Ronald J. Deibert}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, title = {A Method for Identifying and Confirming the Use of {URL} Filtering Products for Censorship}, year = {2013}, url = {http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf}, } @inproceedings{Danezis2004a, author = {George Danezis and Ross Anderson}, booktitle = {Economics and Information Security}, title = {The Economics of Censorship Resistance}, year = {2004}, url = {http://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf}, } @techreport{Danezis2011a, author = {Danezis, George}, title = {An anomaly-based censorship-detection system for {T}or}, institution = {The Tor Project}, year = {2011}, url = {https://research.torproject.org/techreports/detector-2011-09-09.pdf} } @inproceedings{Detal2013a, author = {Gregory Detal and Benjamin Hesmans and Olivier Bonaventure and Yves Vanaubel and Benoit Donnet}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, title = {Revealing Middlebox Interference with {T}racebox}, year = {2013}, url = {http://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf}, } @techreport{Dingledine2006a, author = {Roger Dingledine and Nick Mathewson}, institution = {The Tor Project}, title = {Design of a blocking-resistant anonymity system}, year = {2006}, url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf}, } @inproceedings{Duan2012a, author = {Haixin Duan and Nicholas Weaver and Zongxu Zhao and Meng Hu and Jinjin Liang and Jian Jiang and Kang Li and Vern Paxson}, title = {Hold-On: Protecting Against On-Path {DNS} Poisoning}, booktitle = {Securing and Trusting Internet Names}, year = {2012}, publisher = {National Physical Laboratory}, url = {http://conferences.npl.co.uk/satin/papers/satin2012-Duan.pdf}, } @inproceedings{Dyer2013a, author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, title = {Protocol Misidentification Made Easy with {F}ormat-{T}ransforming {E}ncryption}, booktitle = {Computer and Communications Security}, year = {2013}, publisher = {ACM}, url = {http://eprint.iacr.org/2012/494.pdf}, } @inproceedings{Ensafi2014a, author = {Roya Ensafi and Jeffrey Knockel and Geoffrey Alexander and Jedidiah R. Crandall}, title = {Detecting Intentional Packet Drops on the {I}nternet via {TCP}/{IP} Side Channels}, booktitle = {Passive and Active Measurement Conference}, publisher = {Springer}, year = {2014}, url = {http://arxiv.org/pdf/1312.5739.pdf}, } @inproceedings{Espinoza2011a, author = {Antonio M. Espinoza and Jedidiah R. Crandall}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Automated Named Entity Extraction for Tracking Censorship of Current Events}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Espinoza.pdf}, } @inproceedings{Feamster2002a, author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, title = {{I}nfranet: Circumventing Web Censorship and Surveillance}, year = {2002}, url = {http://wind.lcs.mit.edu/papers/usenixsec2002.pdf}, } @inproceedings{Feamster2003a, author = {Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan and David Karger}, booktitle = {Privacy Enhancing Technologies}, pages = {125--140}, publisher = {Springer}, title = {Thwarting Web Censorship with Untrusted Messenger Discovery}, year = {2003}, url = {http://nms.csail.mit.edu/papers/disc-pet2003.pdf}, } @inproceedings{Fifield2012a, author = {David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh}, booktitle = {Privacy Enhancing Technologies Symposium}, pages = {239--258}, publisher = {Springer}, title = {Evading Censorship with Browser-Based Proxies}, year = {2012}, url = {http://crypto.stanford.edu/flashproxy/flashproxy.pdf}, } @inproceedings{Fifield2013a, author = {David Fifield and Gabi Nakibly and Dan Boneh}, booktitle = {Privacy Enhancing Technologies Symposium}, publisher = {Springer}, title = {{OSS}: Using Online Scanning Services for Censorship Circumvention}, year = {2013}, url = {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf}, } @inproceedings{Filasto2012a, author = {Arturo Filast\`{o} and Jacob Appelbaum}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {{OONI}: Open Observatory of Network Interference}, year = {2012}, url = {https://www.usenix.org/system/files/conference/foci12/foci12-final12.pdf}, } @inproceedings{Geddes2013a, author = {John Geddes and Max Schuchard and Nicholas Hopper}, title = {Cover Your {ACK}s: Pitfalls of Covert Channel Censorship Circumvention}, booktitle = {Computer and Communications Security}, year = {2013}, publisher = {ACM}, url = {http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf}, } @inproceedings{Hasan2013a, author = {Shaddi Hasan and Yahel Ben-David and Giulia Fanti and Eric Brewer and Scott Shenker}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Hasan2013a.pdf}, } @inproceedings{Houmansadr2011a, author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov}, booktitle = {Computer and Communications Security}, pages = {187--200}, publisher = {ACM}, title = {{C}irripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability}, year = {2011}, url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf}, } @inproceedings{Houmansadr2013a, author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer}, booktitle = {Network and Distributed System Security}, publisher = {The Internet Society}, title = {I want my voice to be heard: {IP} over {V}oice-over-{IP} for unobservable censorship circumvention}, year = {2013}, url = {http://people.cs.umass.edu/~amir/papers/FreeWave.pdf}, } @inproceedings{Houmansadr2013b, author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov}, booktitle = {Symposium on Security \& Privacy}, publisher = {IEEE}, title = {The Parrot is Dead: Observing Unobservable Network Communications}, year = {2013}, url = {http://people.cs.umass.edu/~amir/papers/parrot.pdf}, } @inproceedings{Houmansadr2014a, author = {Amir Houmansadr and Edmund L. Wong and Vitaly Shmatikov}, booktitle = {Network and Distributed System Security}, publisher = {The Internet Society}, title = {No Direction Home: The True Cost of Routing Around Decoys}, year = {2014}, url = {http://dedis.cs.yale.edu/dissent/papers/nodirection.pdf}, } @inproceedings{Invernizzi2013a, author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna}, booktitle = {Annual Computer Security Applications Conference}, title = {{M}essage {I}n {A} {B}ottle: Sailing Past Censorship}, publisher = {ACM}, year = {2013}, url = {https://seclab.cs.ucsb.edu/media/uploads/papers/invernizzi_miab_acsac_2013.pdf}, } @inproceedings{Jones2014a, author = {Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover and Sathya Gunasekaran and Karim Habak}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {{F}acade: High-Throughput, Deniable Censorship Circumvention Using Web Search}, year = {2014}, url = {https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf}, } @inproceedings{Jones2014b, author = {Ben Jones and Tzu-Wen Lee and Nick Feamster and Phillipa Gill}, title = {Automated Detection and Fingerprinting of Censorship Block Pages}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, year = {2014}, url = {http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf}, } @inproceedings{Karlin2011a, author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Decoy Routing: Toward Unblockable {I}nternet Communication}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Karlin.pdf}, } @inproceedings{Kathuria2011a, author = {Karl Kathuria}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Bypassing {I}nternet Censorship for News Broadcasters}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Kathuria.pdf}, } @inproceedings{Khattak2013a, author = {Sheharbano Khattak and Mobin Javed and Philip D. Anderson and Vern Paxson}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Khattak2013a.pdf}, } @inproceedings{Khattak2014a, author = {Sheharbano Khattak and Mobin Javed and Syed Ali Khayam and Zartash Afzal Uzmi and Vern Paxson}, title = {A Look at the Consequences of {I}nternet Censorship Through an {ISP} Lens}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, year = {2014}, url = {http://conferences2.sigcomm.org/imc/2014/papers/p271.pdf}, } @article{King2014a, author = {Gary King and Jennifer Pan and Margaret E. Roberts}, title = {Reverse-engineering censorship in {C}hina: Randomized experimentation and participant observation}, journal = {Science}, publisher = {AAAS}, year = {2014}, volume = {345}, number = {6199}, url = {http://cryptome.org/2014/08/reverse-eng-cn-censorship.pdf}, } @article{King2012a, author = {Gary King and Jennifer Pan and Margaret E. Roberts}, journal = {American Political Science Review}, title = {How Censorship in {C}hina Allows Government Criticism but Silences Collective Expression}, year = {2012}, url = {http://gking.harvard.edu/files/censored.pdf}, } @inproceedings{Knockel2011a, author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Three Researchers, Five Conjectures: An Empirical Analysis of {TOM}-{S}kype Censorship and Surveillance}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Knockel.pdf}, } @inproceedings{Koepsell2004a, author = {Stefan K\"{o}psell and Ulf Hillig}, booktitle = {Workshop on Privacy in the Electronic Society}, title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing}, publisher = {ACM}, year = {2004}, pages = {47--58}, url = {http://censorbib.nymity.ch/pdf/Koepsell2004a.pdf}, } @inproceedings{Li2014a, author = {Shuai Li and Mike Schliep and Nick Hopper}, booktitle = {Workshop on Privacy in the Electronic Society}, title = {{F}acet: Streaming over Videoconferencing for Censorship Circumvention}, publisher = {ACM}, year = {2014}, url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf}, } @inproceedings{Lincoln2012a, author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Simpson and Paul Vixie and Dan Boneh}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Bootstrapping Communications into an Anti-Censorship System}, year = {2012}, url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf}, } @inproceedings{Ling2012a, author = {Zhen Ling and Xinwen Fu and Wei Yu and Junzhou Luo and Ming Yang}, booktitle = {INFOCOM}, publisher = {IEEE}, title = {Extensive Analysis and Large-Scale Empirical Evaluation of {T}or Bridge Discovery}, year = {2012}, url = {http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf}, } @inproceedings{Liu2011a, author = {Vincent Liu and Seungyeop Han and Arvind Krishnamurthy and Thomas Anderson}, booktitle = {Hot Topics in Networks}, publisher = {ACM}, title = {{T}or Instead of {IP}}, year = {2011}, url = {http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf}, } @techreport{Lowe2007a, author = {Graham Lowe and Patrick Winters and Michael L. Marcus}, title = {The Great {DNS} Wall of {C}hina}, institution = {New York University}, year = {2007}, url = {https://cs.nyu.edu/~pcw216/work/nds/final.pdf}, } @inproceedings{Luchaup2014a, author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, title = {{L}ib{FTE}: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes}, year = {2014}, url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-luchaup.pdf}, } @inproceedings{Mahdian2010a, author = {Mohammad Mahdian}, booktitle = {International Conference on Fun with Algorithms}, pages = {296--306}, publisher = {Springer}, title = {Fighting Censorship with Algorithms}, year = {2010}, url = {http://mahdian.org/censorship.pdf}, } @inproceedings{McCoy2011a, author = {Damon McCoy and Jose Andre Morales and Kirill Levchenko}, booktitle = {Financial Cryptography and Data Security}, publisher = {Springer}, title = {{P}roximax: A Measurement Based System for Proxies Dissemination}, year = {2011}, url = {http://cseweb.ucsd.edu/~klevchen/mml-fc11.pdf}, } @inproceedings{Moghaddam2012a, author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg}, title = {{S}kype{M}orph: Protocol Obfuscation for {T}or Bridges}, booktitle = {Computer and Communications Security}, year = {2012}, publisher = {ACM}, url = {http://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf}, } @inproceedings{Morrison2014a, author = {Donn Morrison}, title = {Toward automatic censorship detection in microblogs}, booktitle = {Data Mining in Social Networks}, year = {2014}, url = {http://arxiv.org/pdf/1402.5310.pdf}, } @inproceedings{Nabi2013a, author = {Zubair Nabi}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {The Anatomy of Web Censorship in {P}akistan}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Nabi2013a.pdf}, } @inproceedings{Nobori2014a, author = {Daiyuu Nobori and Yasushi Shinjo}, booktitle = {Networked Systems Design and Implementation}, publisher = {USENIX}, title = {{VPN} {G}ate: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls}, year = {2014}, url = {https://www.usenix.org/system/files/conference/nsdi14/nsdi14-paper-nobori.pdf}, } @inproceedings{Park2010a, author = {Jong Chun Park and Jedidiah R. Crandall}, booktitle = {Distributed Computing Systems}, pages = {315--326}, publisher = {IEEE}, title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {C}hina}, year = {2010}, url = {http://www.cs.unm.edu/~crandall/icdcs2010.pdf}, } @inproceedings{Perng2005a, author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}, booktitle = {International Conference on Information Hiding}, pages = {62--76}, publisher = {Springer}, title = {Censorship Resistance Revisited}, year = {2005}, url = {http://censorbib.nymity.ch/pdf/Perng2005a.pdf}, } @inproceedings{Roberts2011a, author = {Hal Roberts and David Larochelle and Rob Faris and John Palfrey}, booktitle = {Computer Communications Workshop}, publisher = {IEEE}, title = {Mapping Local {I}nternet Control}, year = {2011}, url = {https://cyber.law.harvard.edu/netmaps/mlic_20110513.pdf}, } @inproceedings{Rogers2012a, author = {Michael Rogers and Eleanor Saitta}, booktitle = {Workshop on Privacy in the Electronic Society}, publisher = {ACM}, title = {Secure Communication over Diverse Transports}, year = {2012}, pages = {75--80}, url = {http://censorbib.nymity.ch/pdf/Rogers2012a.pdf}, } @inproceedings{Roos2014a, author = {Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe}, title = {Measuring {F}reenet in the Wild: Censorship-resilience under Observation}, booktitle = {Privacy Enhancing Technologies Symposium}, publisher = {Springer}, year = {2014}, url = {https://petsymposium.org/2014/papers/paper_71.pdf}, } @inproceedings{Ruffing2013a, author = {Tim Ruffing and Jonas Schneider and Aniket Kate}, booktitle = {Hot Topics in Privacy Enhancing Technologies}, title = {Identity-Based Steganography and Its Applications to Censorship Resistance}, publisher = {Springer}, year = {2013}, url = {http://petsymposium.org/2013/papers/ruffing-censorship.pdf}, } @inproceedings{Schuchard2012a, author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper}, title = {Routing Around Decoys}, booktitle = {Computer and Communications Security}, year = {2012}, publisher = {ACM}, url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf}, } @inproceedings{Seltzer2011a, author = {Wendy Seltzer}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Infrastructures of Censorship and Lessons from Copyright Resistance}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Seltzer.pdf}, } @inproceedings{Serjantov2002a, author = {Andrei Serjantov}, booktitle = {International Workshop on Peer-To-Peer Systems}, publisher = {Springer}, title = {Anonymizing Censorship Resistant Systems}, year = {2002}, pages = {111--120}, url = {http://www.iptps.org/papers-2002/120.pdf}, } @inproceedings{Sfakianakis2011a, author = {Andreas Sfakianakis and Elias Athanasopoulos and Sotiris Ioannidis}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {{C}ens{M}on: A Web Censorship Monitor}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Sfakianakis.pdf}, } @inproceedings{Shklovski2011a, author = {Irina Shklovski and Nalini P. Kotamraju}, title = {Online Contribution Practices in Countries that Engage in {I}nternet Blocking and Censorship}, booktitle = {CHI Conference on Human Factors in Computing Systems}, publisher = {ACM}, year = {2011}, url = {http://censorbib.nymity.ch/pdf/Shklovski2011a.pdf}, } @inproceedings{Sovran2008a, author = {Yair Sovran and Alana Libonati and Jinyang Li}, booktitle = {International Workshop on Peer-to-Peer Systems}, publisher = {USENIX}, title = {Pass it on: Social Networks Stymie Censors}, year = {2008}, url = {http://www.cs.toronto.edu/iptps2008/final/73.pdf}, } @techreport{Stubblefield2001a, author = {Adam Stubblefield and Dan S. Wallach}, title = {{D}agster: Censorship-Resistant Publishing Without Replication}, institution = {Rice University}, year = {2001}, url = {http://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf}, } @inproceedings{Tan2014a, author = {Henry Tan and Micah Sherr}, title = {Censorship Resistance as a Side-Effect}, booktitle = {Security Protocols}, publisher = {Springer}, year = {2014}, url = {https://security.cs.georgetown.edu/~msherr/papers/censorship-as-sideeffect.pdf}, } @inproceedings{Thomas2012a, author = {Kurt Thomas and Chris Grier and Vern Paxson}, title = {Adapting Social Spam Infrastructure for Political Censorship}, booktitle = {Large-Scale Exploits and Emergent Threats}, publisher = {USENIX}, year = {2012}, url = {https://www.usenix.org/system/files/conference/leet12/leet12-final13_0.pdf}, } @inproceedings{Vasserman2012a, author = {Eugene Y. Vasserman and Victor Heorhiadi and Nicholas Hopper and Yongdae Kim}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {One-way indexing for plausible deniability in censorship resistant storage}, year = {2012}, url = {https://www.usenix.org/system/files/conference/foci12/foci12-final5.pdf}, } @inproceedings{Verkamp2012a, author = {John-Paul Verkamp and Minaxi Gupta}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Inferring Mechanics of Web Censorship Around the World}, year = {2012}, url = {https://www.usenix.org/system/files/conference/foci12/foci12-final1.pdf}, } @inproceedings{Verkamp2013a, author = {John-Paul Verkamp and Minaxi Gupta}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, title = {Five Incidents, One Theme: {T}witter Spam as a Weapon to Drown Voices of Protest}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Verkamp2013a.pdf}, } @inproceedings{Wachs2013a, author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff}, title = {On the Feasibility of a Censorship Resistant Decentralized Name System}, booktitle = {Foundations \& Practice of Security}, publisher = {Springer}, year = {2013}, url = {http://grothoff.org/christian/fps2013wachs.pdf}, } @inproceedings{Wachs2014a, author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff}, title = {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System}, booktitle = {Cryptology and Network Security}, publisher = {Springer}, year = {2014}, url = {https://gnunet.org/sites/default/files/paper_cans2014_camera_ready.pdf}, } @inproceedings{Waldman2000a, author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor}, title = {{P}ublius: A robust, tamper-evident, censorship-resistant web publishing system}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, year = {2000}, url = {http://www.eecs.harvard.edu/~mema/courses/cs264/papers/waldman00publius.pdf}, } @inproceedings{Waldman2001a, author = {Marc Waldman and David Mazi\`{e}res}, title = {{T}angler: A Censorship-Resistant Publishing System Based On Document Entanglements}, booktitle = {Computer and Communications Security}, publisher = {ACM}, year = {2001}, pages = {126--135}, url = {http://www.cs.nyu.edu/~waldman/tangler.ps}, } @inproceedings{Wang2012a, author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov}, title = {{C}ensor{S}poofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing}, booktitle = {Computer and Communications Security}, publisher = {ACM}, year = {2012}, url = {http://hatswitch.org/~nikita/papers/censorspoofer.pdf}, } @inproceedings{Wang2013a, author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper}, title = {r{B}ridge: User Reputation based {T}or Bridge Distribution with Privacy Preservation}, booktitle = {Network and Distributed System Security}, publisher = {The Internet Society}, year = {2013}, url = {http://www-users.cs.umn.edu/~hopper/rbridge_ndss13.pdf}, } @inproceedings{Weaver2009a, author = {Nicholas Weaver and Robin Sommer and Vern Paxson}, title = {Detecting Forged {TCP} Reset Packets}, booktitle = {Network and Distributed System Security}, publisher = {The Internet Society}, year = {2009}, url = {http://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf}, } @inproceedings{Weinberg2012a, author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh}, title = {{S}tego{T}orus: A Camouflage Proxy for the {T}or Anonymity System}, booktitle = {Computer and Communications Security}, publisher = {ACM}, year = {2012}, url = {http://www.frankwang.org/papers/ccs2012.pdf}, } @techreport{Wiley2011a, author = {Brandon Wiley}, title = {{D}ust: A Blocking-Resistant {I}nternet Transport Protocol}, institution = {University of Texas at Austin}, year = {2011}, url = {http://blanu.net/Dust.pdf}, } @inproceedings{Winter2012a, author = {Philipp Winter and Stefan Lindskog}, title = {How the {G}reat {F}irewall of {C}hina is Blocking {T}or}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2012}, url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf}, } @inproceedings{Winter2013a, author = {Philipp Winter}, title = {Towards a Censorship Analyser for {T}or}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Winter2013a.pdf}, } @inproceedings{Winter2013b, author = {Philipp Winter and Tobias Pulls and Juergen Fuss}, title = {{S}cramble{S}uit: A Polymorphic Network Protocol to Circumvent Censorship}, booktitle = {Workshop on Privacy in the Electronic Society}, publisher = {ACM}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Winter2013b.pdf}, } @inproceedings{Wright2011a, author = {Joss Wright and Tulio de Souza and Ian Brown}, title = {Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Wright.pdf}, } @techreport{Wright2012a, author = {Joss Wright}, title = {Regional Variation in {C}hinese {I}nternet Filtering}, institution = {University of Oxford}, year = {2012}, url = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3}, } @inproceedings{Wustrow2011a, author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman}, title = {{T}elex: Anticensorship in the Network Infrastructure}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, year = {2011}, url = {http://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf}, } @inproceedings{Wustrow2014a, author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman}, title = {{T}ap{D}ance: End-to-Middle Anticensorship without Flow Blocking}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, year = {2014}, url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-wustrow.pdf}, } @inproceedings{Xu2011a, author = {Xueyang Xu and Z. Morley Mao and J. Alex Halderman}, title = {{I}nternet Censorship in {C}hina: Where Does the Filtering Occur?}, booktitle = {Passive and Active Measurement Conference}, publisher = {Springer}, year = {2011}, pages = {133--142}, url = {http://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf}, } @inproceedings{Zhou2013a, author = {Wenxuan Zhou and Amir Houmansadr and Matthew Caesar and Nikita Borisov}, title = {{SWEET}: Serving the Web by Exploiting Email Tunnels}, booktitle = {Hot Topics in Privacy Enhancing Technologies}, publisher = {Springer}, year = {2013}, url = {http://petsymposium.org/2013/papers/zhou-censorship.pdf}, } @inproceedings{Zhu2013a, author = {Tao Zhu and David Phipps and Adam Pridgen and Jedidiah R. Crandall and Dan S. Wallach}, title = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, year = {2013}, url = {https://www.cs.unm.edu/~crandall/usenix13.pdf}, }