censorbib/references.bib
2017-05-22 13:53:30 -04:00

1433 lines
53 KiB
BibTeX

@inproceedings{Pearce2017a,
author = {Paul Pearce and Roya Ensafi and Frank Li and Nick Feamster and Vern Paxson},
title = {{Augur}: {Internet}-Wide Detection of Connectivity Disruptions},
booktitle = {Symposium on Security \& Privacy},
publisher = {IEEE},
year = {2017},
url = {http://www.ieee-security.org/TC/SP2017/papers/586.pdf},
}
@article{Heydari2017a,
author = {Vahid Heydari and Sun-il Kim and Seong-Moo Yoo},
title = {Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers},
journal = {Transactions on Information Forensics and Security},
volume = {12},
number = {5},
publisher = {IEEE},
year = {2017},
pages = {1113--1124},
url = {http://censorbib.nymity.ch/pdf/Heydari2017a.pdf},
}
@inproceedings{Gebhart2017a,
author = {Genevieve Gebhart and Anonymous Author and Tadayoshi Kohno},
title = {Internet Censorship in {Thailand}: User Practices and Potential Threats},
booktitle = {European Symposium on Security \& Privacy},
publisher = {IEEE},
year = {2017},
url = {http://homes.cs.washington.edu/~yoshi/papers/GebhartEtAl-IEEEEuroSP.pdf},
}
@techreport{Wolfgarten2006a,
author = {Sebastian Wolfgarten},
title = {Investigating large-scale {Internet} content filtering},
institution = {Dublin City University},
year = {2006},
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.133.5778&rep=rep1&type=pdf},
}
@misc{Pfitzmann2010a,
author = {Andreas Pfitzmann and Marit Hansen},
title = {A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management},
month = aug,
year = {2010},
note = {Version 0.34},
url = {https://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf},
}
@inproceedings{Matic2017a,
author = {Srdjan Matic and Carmela Troncoso and Juan Caballero},
title = {Dissecting {Tor} Bridges: a Security Evaluation of Their Private and Public Infrastructures},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
year = {2017},
url = {https://software.imdea.org/~juanca/papers/torbridges_ndss17.pdf},
}
@inproceedings{Dornseif2003a,
author = {Maximillian Dornseif},
title = {Government mandated blocking of foreign {Web} content},
booktitle = {DFN-Arbeitstagung \"{u}ber Kommunikationsnetze},
publisher = {Gesellschaft f\"{u}r Informatik},
year = {2003},
pages = {617--647},
url = {https://censorbib.nymity.ch/pdf/Dornseif2003a.pdf},
}
@inproceedings{Farnan2016a,
author = {Oliver Farnan and Alexander Darer and Joss Wright},
title = {Poisoning the Well -- Exploring the {Great} {Firewall}'s Poisoned {DNS} Responses},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2016},
url = {http://dl.acm.org/authorize?N25517},
}
@inproceedings{Bocovich2016a,
author = {Cecylia Bocovich and Ian Goldberg},
title = {{Slitheen}: Perfectly Imitated Decoy Routing through Traffic Replacement},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2016},
url = {https://cypherpunks.ca/~iang/pubs/slitheen-ccs16.pdf},
}
@inproceedings{Nasr2016a,
author = {Milad Nasr and Amir Houmansadr},
title = {Game of Decoys: Optimal Decoy Routing Through Game Theory},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2016},
url = {https://people.cs.umass.edu/~amir/papers/GameOfDecoys.pdf},
}
@inproceedings{Zolfaghari2016a,
author = {Hadi Zolfaghari and Amir Houmansadr},
title = {Practical Censorship Evasion Leveraging Content Delivery Networks},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2016},
url = {https://people.cs.umass.edu/~amir/papers/CDNReaper.pdf},
}
@inproceedings{Akbar2016a,
author = {Qurat-Ul-Ann Danyal Akbar and Marcel Flores and Aleksandar Kuzmanovic},
title = {{DNS}-sly: Avoiding Censorship through Network Complexity},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2016},
url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-akbar.pdf},
}
@inproceedings{Safaka2016a,
author = {Iris Safaka and Christina Fragouli and Katerina Argyraki},
title = {{Matryoshka}: Hiding Secret Communication in Plain Sight},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2016},
url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-safaka-revised.pdf},
}
@inproceedings{Douglas2016b,
author = {Frederick Douglas and Matthew Caesar},
title = {{GhostPost}: Seamless Restoration of Censored Social Media Posts},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2016},
url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-douglas.pdf},
}
@inproceedings{Fifield2016a,
author = {David Fifield and Lynn Tsai},
title = {Censors' Delay in Blocking Circumvention Proxies},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2016},
url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-fifield.pdf},
}
@inproceedings{Singh2016a,
author = {Rachee Singh and Hyungjoon Koo and Najmehalsadat Miramirkhani and Fahimeh Mirhaj and Phillipa Gill and Leman Akoglu},
title = {The Politics of Routing: Investigating the Relationship Between {AS} Connectivity and {Internet} Freedom},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2016},
url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-singh.pdf},
}
@article{Elahi2016a,
author = {Tariq Elahi and John A. Doucette and Hadi Hosseini and Steven J. Murdoch and Ian Goldberg},
title = {A Framework for the Game-theoretic Analysis of Censorship Resistance},
journal = {Privacy Enhancing Technologies},
volume = {2016},
number = {4},
publisher = {De Gruyter Open},
year = {2016},
pages = {83--101},
url = {http://www.degruyter.com/downloadpdf/j/popets.2016.2016.issue-4/popets-2016-0030/popets-2016-0030.xml},
}
@article{Khattak2016a,
author = {Sheharbano Khattak and Tariq Elahi and Laurent Simon and Colleen M. Swanson and Steven J. Murdoch and Ian Goldberg},
title = {{SoK}: Making Sense of Censorship Resistance Systems},
journal = {Privacy Enhancing Technologies},
volume = {2016},
number = {4},
publisher = {De Gruyter Open},
year = {2016},
pages = {37--61},
url = {http://www.degruyter.com/downloadpdf/j/popets.2016.2016.issue-4/popets-2016-0028/popets-2016-0028.xml},
}
@article{Douglas2016a,
author = {Frederick Douglas and Rorshach and Weiyang Pan and Matthew Caesar},
title = {{Salmon}: Robust Proxy Distribution for Censorship Circumvention},
journal = {Privacy Enhancing Technologies},
volume = {2016},
number = {4},
publisher = {De Gruyter Open},
year = {2016},
pages = {4--20},
url = {http://www.degruyter.com/downloadpdf/j/popets.2016.2016.issue-4/popets-2016-0026/popets-2016-0026.xml},
}
@inproceedings{Scott2016a,
author = {Will Scott and Thomas Anderson and Tadayoshi Kohno and Arvind Krishnamurthy},
title = {{Satellite}: Joint Analysis of {CDN}s and Network-Level Interference},
booktitle = {USENIX Annual Technical Conference},
publisher = {USENIX},
year = {2016},
url = {https://www.usenix.org/system/files/conference/atc16/atc16_paper-scott.pdf},
}
@inproceedings{Aceto2016a,
author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and M. Faheem Awan and Tahir Ahmad and Saad Qaisar},
title = {Analyzing {Internet} Censorship in {Pakistan}},
booktitle = {Research and Technologies for Society and Industry},
publisher = {IEEE},
year = {2016},
url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2016analyzing.pdf},
}
@inproceedings{Zarras2016a,
author = {Apostolis Zarras},
title = {Leveraging {Internet} Services to Evade Censorship},
booktitle = {Information Security Conference},
publisher = {Springer},
year = {2016},
url = {https://www.sec.in.tum.de/assets/Uploads/camouflage.pdf},
}
@inproceedings{Hahn2016a,
author = {Bridger Hahn and Rishab Nithyanand and Phillipa Gill and Rob Johnson},
title = {Games Without Frontiers: Investigating Video Games as a Covert Channel},
booktitle = {European Symposium on Security \& Privacy},
publisher = {IEEE},
year = {2016},
url = {http://www3.cs.stonybrook.edu/~phillipa/papers/castle.pdf},
}
@inproceedings{Ellard2015a,
author = {Daniel Ellard and Alden Jackson and Christine Jones and Victoria Ursula Manfredi and Timothy Strayer and Bishal Thapa and Megan Van Welie},
title = {{Rebound}: Decoy Routing on Asymmetric Routes Via Error Messages},
booktitle = {Local Computer Networks},
publisher = {IEEE},
year = {2015},
url = {http://www.ir.bbn.com/documents/articles/Rebound-LCN15.pdf},
}
@article{Li2016a,
author = {Shuai Li and Nicholas Hopper},
title = {{Mailet}: Instant Social Networking under Censorship},
journal = {Privacy Enhancing Technologies},
volume = {2016},
number = {2},
publisher = {De Gruyter Open},
year = {2016},
pages = {175--192},
url = {http://www.degruyter.com/downloadpdf/j/popets.2015.2016.issue-2/popets-2016-0011/popets-2016-0011.xml},
}
@article{McPherson2016a,
author = {Richard McPherson and Amir Houmansadr and Vitaly Shmatikov},
title = {{CovertCast}: Using Live Streaming to Evade Internet Censorship},
journal = {Privacy Enhancing Technologies},
volume = {2016},
number = {3},
publisher = {De Gruyter Open},
year = {2016},
pages = {212--225},
url = {http://www.degruyter.com/downloadpdf/j/popets.2016.2016.issue-3/popets-2016-0024/popets-2016-0024.xml},
}
@inproceedings{Kohls2016a,
author = {Katharina Kohls and Thorsten Holz and Dorothea Kolossa and Christina P\"{o}pper},
title = {{SkypeLine}: Robust Hidden Data Transmission for {VoIP}},
booktitle = {ASIA Computer and Communications Security},
publisher = {ACM},
year = {2016},
url = {https://hgi.rub.de/media/emma/veroeffentlichungen/2016/03/17/SkypeLine-AsiaCCS16.pdf},
}
@article{Al-Saqaf2016a,
author = {Walid Al-Saqaf},
title = {{Internet} Censorship Circumvention Tools: Escaping the Control of the {Syrian} Regime},
journal = {Media and Communication},
volume = {4},
number = {1},
publisher = {Cogitatio},
year = {2016},
url = {http://www.cogitatiopress.com/ojs/index.php/mediaandcommunication/article/download/357/357},
}
@inproceedings{Tschantz2016a,
author = {Michael Carl Tschantz and Sadia Afroz and Anonymous and Vern Paxson},
title = {{SoK}: Towards Grounding Censorship Circumvention in Empiricism},
booktitle = {Symposium on Security \& Privacy},
publisher = {IEEE},
year = {2016},
url = {https://www.eecs.berkeley.edu/~sa499/papers/oakland2016.pdf},
}
@inproceedings{Hiruncharoenvate2015a,
author = {Chaya Hiruncharoenvate and Zhiyuan Lin and Eric Gilbert},
title = {Algorithmically Bypassing Censorship on {Sina Weibo} with Nondeterministic Homophone Substitutions},
booktitle = {International Conference on Web and Social Media},
publisher = {AAAI},
year = {2015},
url = {https://comp.social.gatech.edu/papers/icwsm15.algorithmically.hiruncharoenvate.pdf},
}
@inproceedings{Nisar2015a,
author = {Aqib Nisar and Aqsa Kashaf and Zartash Afzal Uzmi and Ihsan Ayyub Qazi},
title = {A Case for Marrying Censorship Measurements with Circumvention},
booktitle = {Hot Topics in Networks},
publisher = {ACM},
year = {2015},
url = {http://conferences.sigcomm.org/hotnets/2015/papers/nisar.pdf},
}
@inproceedings{Jones2015b,
author = {Ben Jones and Nick Feamster},
title = {Can Censorship Measurements Be Safe(r)?},
booktitle = {Hot Topics in Networks},
publisher = {ACM},
year = {2015},
url = {http://conferences.sigcomm.org/hotnets/2015/papers/jones.pdf},
}
@inproceedings{Vines2015a,
author = {Paul Vines and Tadayoshi Kohno},
title = {{Rook}: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2015},
url = {http://censorbib.nymity.ch/pdf/Vines2015a.pdf},
}
@inproceedings{Tanash2015a,
author = {Rima S. Tanash and Zhouhan Chen and Tanmay Thakur and Dan S. Wallach and Devika Subramanian},
title = {Known Unknowns: An Analysis of {Twitter} Censorship in {Turkey}},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2015},
url = {http://censorbib.nymity.ch/pdf/Tanash2015a.pdf},
}
@inproceedings{Ensafi2015b,
author = {Roya Ensafi and David Fifield and Philipp Winter and Nick Feamster and Nicholas Weaver and Vern Paxson},
title = {Examining How the {Great Firewall} Discovers Hidden Circumvention Servers},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2015},
url = {http://conferences2.sigcomm.org/imc/2015/papers/p445.pdf},
}
@inproceedings{Holowczak2015a,
author = {John Holowczak and Amir Houmansadr},
title = {{CacheBrowser}: Bypassing {Chinese} Censorship without Proxies Using Cached Content},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2015},
url = {https://people.cs.umass.edu/~amir/papers/CacheBrowser.pdf},
}
@inproceedings{Wang2015a,
author = {Liang Wang and Kevin P. Dyer and Aditya Akella and Thomas Ristenpart and Thomas Shrimpton},
title = {Seeing through Network-Protocol Obfuscation},
booktitle = {Computer and Communications Security},
year = {2015},
publisher = {ACM},
url = {http://pages.cs.wisc.edu/~liangw/pub/ccsfp653-wangA.pdf},
}
@inproceedings{Crandall2015a,
author = {Jedidiah R. Crandall and Masashi Crete-Nishihata and Jeffrey Knockel},
title = {Forgive Us our {SYN}s: Technical and Ethical Considerations for Measuring {Internet} Filtering},
booktitle = {Ethics in Networked Systems Research},
publisher = {ACM},
year = {2015},
url = {http://ensr.oii.ox.ac.uk/wp-content/uploads/2015/07/Forgive-Us-Our-SYNs-Technical-and-Ethical-Considerations-for-Measuring-Internet-Censorship.pdf}
}
@inproceedings{Smits2011a,
author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner},
title = {{BridgeSPA}: Improving {Tor} Bridges with Single Packet Authorization},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2011},
url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf},
}
@inproceedings{Ververis2015a,
author = {Vasilis Ververis and George Kargiotakis and Arturo Filast\`{o} and Benjamin Fabian and Afentoulis Alexandros},
title = {Understanding {Internet} Censorship Policy: The Case of {Greece}},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2015},
url = {https://www.usenix.org/system/files/conference/foci15/foci15-paper-ververis-updated-2.pdf},
}
@inproceedings{Knockel2015a,
author = {Jeffrey Knockel and Masashi Crete-Nishihata and Jason Q. Ng and Adam Senft and Jedidiah R. Crandall},
title = {Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in {China}},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2015},
url = {https://www.usenix.org/system/files/conference/foci15/foci15-paper-knockel.pdf},
}
@inproceedings{Marczak2015a,
author = {Bill Marczak and Nicholas Weaver and Jakub Dalek and Roya Ensafi and David Fifield and Sarah McKune and Arn Rey and John Scott-Railton and Ron Deibert and Vern Paxson},
title = {An Analysis of {China}'s ``{Great Cannon}''},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2015},
url = {https://www.usenix.org/system/files/conference/foci15/foci15-paper-marczak.pdf},
}
@inproceedings{Dyer2015a,
author = {Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton},
title = {{Marionette}: A Programmable Network-Traffic Obfuscation System},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2015},
url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf},
}
@inproceedings{Burnett2015a,
author = {Sam Burnett and Nick Feamster},
title = {{Encore}: Lightweight Measurement of Web Censorship with Cross-Origin Requests},
booktitle = {SIGCOMM},
publisher = {ACM},
year = {2015},
url = {http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p653.pdf},
}
@inproceedings{Jones2011a,
author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo and Michael J. Freedman},
title = {Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2011},
url = {http://www.cs.princeton.edu/~najones/publications/cor-foci11.pdf},
}
@inproceedings{Jones2015a,
author = {Ben Jones and Roya Ensafi and Nick Feamster and Vern Paxson and Nick Weaver},
title = {Ethical Concerns for Censorship Measurement},
publisher = {ACM},
booktitle = {Ethics in Networked Systems Research},
year = {2015},
url = {http://www.icir.org/vern/papers/censorship-meas.nsethics15.pdf},
}
@article{Ensafi2015a,
author = {Roya Ensafi and Philipp Winter and Abdullah Mueen and Jedidiah R. Crandall},
title = {Analyzing the {Great Firewall} of {China} Over Space and Time},
journal = {Privacy Enhancing Technologies},
volume = {2015},
number = {1},
publisher = {De Gruyter Open},
year = {2015},
url = {http://censorbib.nymity.ch/pdf/Ensafi2015a.pdf},
}
@article{Fifield2015a,
author = {David Fifield and Chang Lan and Rod Hynes and Percy Wegmann and Vern Paxson},
title = {Blocking-resistant communication through domain fronting},
journal = {Privacy Enhancing Technologies},
volume = {2015},
number = {2},
publisher = {De Gruyter Open},
year = {2015},
url = {http://www.icir.org/vern/papers/meek-PETS-2015.pdf},
}
@inproceedings{Backes2009a,
author = {Michael Backes and Marek Hamerlik and Alessandro Linari and Matteo Maffei and Christos Tryfonopoulos and Gerhard Weikum},
title = {Anonymity and Censorship Resistance in Unstructured Overlay Networks},
booktitle = {On the Move to Meaningful Internet Systems},
publisher = {Springer},
year = {2009},
url = {https://sps.cs.uni-saarland.de/maffei/resources/coopis.pdf},
}
@inproceedings{Wang2014a,
author = {Yuzhi Wang and Ping Ji and Borui Ye and Pengjun Wang and Rong Luo and Huazhong Yang},
title = {{GoHop}: Personal {VPN} to Defend from Censorship},
booktitle = {International Conference on Advanced Communication Technology},
publisher = {IEEE},
year = {2014},
url = {http://censorbib.nymity.ch/pdf/Wang2014a.pdf},
}
@article{Gill2015a,
author = {Phillipa Gill and Masashi Crete-Nishihata and Jakub Dalek and Sharon Goldberg and Adam Senft and Greg Wiseman},
title = {Characterizing Web Censorship Worldwide: Another Look at the {OpenNet Initiative} Data},
journal = {Transactions on the Web},
publisher = {ACM},
year = {2015},
volume = {9},
number = {1},
url = {http://censorbib.nymity.ch/pdf/Gill2015a.pdf},
}
@inproceedings{Aase2012a,
author = {Nicholas Aase and Jedidiah R. Crandall and \'{A}lvaro D\'{i}az and Jeffrey Knockel and Jorge Oca\~{n}a Molinero and Jared Saia and Dan Wallach and Tao Zhu},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final17.pdf},
}
@article{Aceto2015b,
author = {Giuseppe Aceto and Antonio Pescap\`{e}},
title = {{Internet} Censorship detection: A survey},
journal = {Computer Networks},
publisher = {Elsevier},
year = {2015},
url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015internet_censorship_detection__a_survey.pdf},
}
@inproceedings{Aceto2015a,
author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and Nick Feamster and M. Faheem Awan and Tahir Ahmad and Saad Qaisar},
title = {Monitoring {Internet} Censorship with {UBICA}},
booktitle = {Traffic Monitoring and Analysis},
publisher = {Springer},
year = {2015},
url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015monitoring_TMA.pdf},
}
@inproceedings{Anderson1996a,
author = {Ross J. Anderson},
booktitle = {Theory and Applications of Cryptology},
pages = {242--253},
publisher = {CTU Publishing House},
title = {The {Eternity} Service},
year = {1996},
url = {http://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf},
}
@techreport{Anderson2012a,
author = {Collin Anderson},
title = {The Hidden {Internet} of {Iran}: Private Address Allocations on a National Network},
institution = {},
year = {2012},
url = {http://arxiv.org/pdf/1209.6398v1},
}
@techreport{Anderson2013a,
author = {Collin Anderson},
title = {Dimming the {Internet}: Detecting Throttling as a Mechanism of Censorship in {Iran}},
institution = {University of Pennsylvania},
year = {2013},
url = {http://arxiv.org/pdf/1306.4361v1.pdf},
}
@inproceedings{Anderson2014a,
author = {Collin Anderson and Philipp Winter and Roya},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Global Network Interference Detection over the {RIPE Atlas} Network},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14-anderson.pdf},
}
@article{Sparks2012a,
author = {Sparks and Neo and Tank and Smith and Dozer},
title = {The Collateral Damage of {Internet} Censorship by {DNS} Injection},
journal = {SIGCOMM Computer Communication Review},
volume = {42},
number = {3},
pages = {21--27},
publisher = {ACM},
year = {2012},
url = {http://conferences.sigcomm.org/sigcomm/2012/paper/ccr-paper266.pdf},
}
@inproceedings{Anonymous2014a,
author = {Anonymous},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Towards a Comprehensive Picture of the {Great Firewall}'s {DNS} Censorship},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf},
}
@inproceedings{Aryan2013a,
author = {Simurgh Aryan and Homa Aryan and J. Alex Halderman},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{Internet} Censorship in {Iran}: A First Look},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Aryan2013a.pdf},
}
@article{Aycock2008a,
author = {Aycock, John and Maurushat, Alana},
journal = {SIGCAS Computers \& Society},
publisher = {ACM},
number = {1},
pages = {28--39},
title = {``Good'' Worms and Human Rights},
volume = {38},
year = {2008},
url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007},
}
@techreport{Bachrach2011a,
author = {Dustin Bachrach and Christopher Nunu and Dan S. Wallach and Matthew Wright},
title = {{\#h00t}: Censorship Resistant Microblogging},
institution = {Rice University and University of Texas at Arlington},
year = {2011},
url = {http://arxiv.org/pdf/1109.6874v1.pdf},
}
@inproceedings{Benson2013a,
author = {Karyn Benson and Alberto Dainotti and Kimberly Claffy and Emile Aben},
title = {Gaining Insight into {AS}-level Outages through Analysis of {Internet} Background Radiation},
booktitle = {Traffic Monitoring and Analysis},
publisher = {IEEE},
year = {2013},
url = {http://cseweb.ucsd.edu/~kbenson/papers/tma13.pdf},
}
@inproceedings{Bonneau2011a,
author = {Joseph Bonneau and Rubin Xu},
title = {Scrambling for lightweight censorship resistance},
booktitle = {Security Protocols},
publisher = {Springer},
year = {2011},
url = {http://www.jbonneau.com/doc/BX11-SPW-scrambling_censorship.pdf},
}
@inproceedings{Brubaker2014a,
author = {Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov},
title = {{CloudTransport}: Using Cloud Storage for Censorship-Resistant Networking},
booktitle = {Privacy Enhancing Technologies Symposium},
publisher = {Springer},
year = {2014},
url = {https://petsymposium.org/2014/papers/paper_68.pdf},
}
@inproceedings{Burnett2010a,
author = {Sam Burnett and Nick Feamster and Santosh Vempala},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
title = {Chipping Away at Censorship Firewalls with User-Generated Content},
year = {2010},
url = {http://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf},
}
@inproceedings{Cao2009a,
author = {Shoufeng Cao and Longtao He and Zhongxian Li and Yixian Yang},
booktitle = {International Conference on Information Engineering},
pages = {350--354},
publisher = {IEEE},
title = {{SkyF2F}: Censorship Resistant via {Skype} Overlay Network},
year = {2009},
url = {http://censorbib.nymity.ch/pdf/Cao2009a.pdf},
}
@inproceedings{Chaabane2014a,
author = {Abdelberi Chaabane and Terence Chen and Mathieu Cunche and Emiliano De Cristofaro and Arik Friedman and Mohamed Ali Kaafar},
title = {Censorship in the Wild: Analyzing {Internet} Filtering in {Syria}},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2014},
url = {http://conferences2.sigcomm.org/imc/2014/papers/p285.pdf},
}
@inproceedings{Chen2013a,
author = {Le Chen and Chi Zhang and Christo Wilson},
title = {Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on {Sina Weibo}},
booktitle = {Conference on Online Social Networks},
publisher = {ACM},
year = {2013},
url = {http://www.ccs.neu.edu/home/cbw/pdf/weibo-cosn13.pdf},
}
@inproceedings{Clayton2006a,
author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
booktitle = {Privacy Enhancing Technologies},
pages = {20--35},
publisher = {Springer},
title = {Ignoring the {Great Firewall} of {China}},
year = {2006},
url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
}
@inproceedings{Clayton2006b,
author = {Richard Clayton},
booktitle = {Privacy Enhancing Technologies},
pages = {78--92},
publisher = {Springer},
title = {Failures in a Hybrid Content Blocking System},
year = {2006},
url = {http://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf},
}
@inproceedings{Connolly2014a,
author = {Christopher Connolly and Patrick Lincoln and Ian Mason and Vinod Yegneswaran},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{TRIST}: Circumventing Censorship with Transcoding-Resistant Image Steganography},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14-connolly.pdf},
}
@inproceedings{Crandall2007a,
author = {Jedidiah R. Crandall and Daniel Zinn and Michael Byrd and Earl Barr and Rich East},
booktitle = {Computer and Communications Security},
pages = {352--365},
publisher = {ACM},
title = {{ConceptDoppler}: A Weather Tracker for {Internet} Censorship},
year = {2007},
url = {http://www.csd.uoc.gr/~hy558/papers/conceptdoppler.pdf},
}
@inproceedings{Dainotti2011a,
author = {Alberto Dainotti and Claudio Squarcella and Emile Aben and Kimberly C. Claffy and Marco Chiesa and Michele Russo and Antonio Pescap\'{e}},
booktitle = {Internet Measurement Conference},
pages = {1--18},
publisher = {ACM},
title = {Analysis of Country-wide {Internet} Outages Caused by Censorship},
year = {2011},
url = {http://conferences.sigcomm.org/imc/2011/docs/p1.pdf},
}
@inproceedings{Dalek2013a,
author = {Jakub Dalek and Bennett Haselton and Helmi Noman and Adam Senft and Masashi Crete-Nishihata and Phillipa Gill and Ronald J. Deibert},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
title = {A Method for Identifying and Confirming the Use of {URL} Filtering Products for Censorship},
year = {2013},
url = {http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf},
}
@inproceedings{Danezis2004a,
author = {George Danezis and Ross Anderson},
booktitle = {Economics and Information Security},
title = {The Economics of Censorship Resistance},
year = {2004},
url = {http://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf},
}
@techreport{Danezis2011a,
author = {Danezis, George},
title = {An anomaly-based censorship-detection system for {Tor}},
institution = {The Tor Project},
year = {2011},
url = {https://research.torproject.org/techreports/detector-2011-09-09.pdf}
}
@inproceedings{Detal2013a,
author = {Gregory Detal and Benjamin Hesmans and Olivier Bonaventure and Yves Vanaubel and Benoit Donnet},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
title = {Revealing Middlebox Interference with {Tracebox}},
year = {2013},
url = {http://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf},
}
@techreport{Dingledine2006a,
author = {Roger Dingledine and Nick Mathewson},
institution = {The Tor Project},
title = {Design of a blocking-resistant anonymity system},
year = {2006},
url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf},
}
@inproceedings{Duan2012a,
author = {Haixin Duan and Nicholas Weaver and Zongxu Zhao and Meng Hu and Jinjin Liang and Jian Jiang and Kang Li and Vern Paxson},
title = {{Hold-On}: Protecting Against On-Path {DNS} Poisoning},
booktitle = {Securing and Trusting Internet Names},
year = {2012},
publisher = {National Physical Laboratory},
url = {http://conferences.npl.co.uk/satin/papers/satin2012-Duan.pdf},
}
@inproceedings{Dyer2013a,
author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
title = {Protocol Misidentification Made Easy with {Format-Transforming Encryption}},
booktitle = {Computer and Communications Security},
year = {2013},
publisher = {ACM},
url = {http://eprint.iacr.org/2012/494.pdf},
}
@inproceedings{Ensafi2014a,
author = {Roya Ensafi and Jeffrey Knockel and Geoffrey Alexander and Jedidiah R. Crandall},
title = {Detecting Intentional Packet Drops on the {Internet} via {TCP/IP} Side Channels},
booktitle = {Passive and Active Measurement Conference},
publisher = {Springer},
year = {2014},
url = {http://arxiv.org/pdf/1312.5739.pdf},
}
@inproceedings{Espinoza2011a,
author = {Antonio M. Espinoza and Jedidiah R. Crandall},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Automated Named Entity Extraction for Tracking Censorship of Current Events},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Espinoza.pdf},
}
@inproceedings{Feamster2002a,
author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
title = {{Infranet}: Circumventing Web Censorship and Surveillance},
year = {2002},
url = {http://wind.lcs.mit.edu/papers/usenixsec2002.pdf},
}
@inproceedings{Feamster2003a,
author = {Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan and David Karger},
booktitle = {Privacy Enhancing Technologies},
pages = {125--140},
publisher = {Springer},
title = {Thwarting Web Censorship with Untrusted Messenger Discovery},
year = {2003},
url = {http://nms.csail.mit.edu/papers/disc-pet2003.pdf},
}
@inproceedings{Fifield2012a,
author = {David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh},
booktitle = {Privacy Enhancing Technologies Symposium},
pages = {239--258},
publisher = {Springer},
title = {Evading Censorship with Browser-Based Proxies},
year = {2012},
url = {http://crypto.stanford.edu/flashproxy/flashproxy.pdf},
}
@inproceedings{Fifield2013a,
author = {David Fifield and Gabi Nakibly and Dan Boneh},
booktitle = {Privacy Enhancing Technologies Symposium},
publisher = {Springer},
title = {{OSS}: Using Online Scanning Services for Censorship Circumvention},
year = {2013},
url = {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf},
}
@inproceedings{Filasto2012a,
author = {Arturo Filast\`{o} and Jacob Appelbaum},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{OONI}: Open Observatory of Network Interference},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final12.pdf},
}
@inproceedings{Geddes2013a,
author = {John Geddes and Max Schuchard and Nicholas Hopper},
title = {Cover Your {ACK}s: Pitfalls of Covert Channel Censorship Circumvention},
booktitle = {Computer and Communications Security},
year = {2013},
publisher = {ACM},
url = {http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf},
}
@inproceedings{Hasan2013a,
author = {Shaddi Hasan and Yahel Ben-David and Giulia Fanti and Eric Brewer and Scott Shenker},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Hasan2013a.pdf},
}
@inproceedings{Houmansadr2011a,
author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov},
booktitle = {Computer and Communications Security},
pages = {187--200},
publisher = {ACM},
title = {{Cirripede}: Circumvention Infrastructure using Router Redirection with Plausible Deniability},
year = {2011},
url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf},
}
@inproceedings{Houmansadr2013a,
author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
title = {I want my voice to be heard: {IP} over Voice-over-{IP} for unobservable censorship circumvention},
year = {2013},
url = {http://people.cs.umass.edu/~amir/papers/FreeWave.pdf},
}
@inproceedings{Houmansadr2013b,
author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov},
booktitle = {Symposium on Security \& Privacy},
publisher = {IEEE},
title = {The Parrot is Dead: Observing Unobservable Network Communications},
year = {2013},
url = {http://people.cs.umass.edu/~amir/papers/parrot.pdf},
}
@inproceedings{Houmansadr2014a,
author = {Amir Houmansadr and Edmund L. Wong and Vitaly Shmatikov},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
title = {No Direction Home: The True Cost of Routing Around Decoys},
year = {2014},
url = {http://dedis.cs.yale.edu/dissent/papers/nodirection.pdf},
}
@inproceedings{Invernizzi2013a,
author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna},
booktitle = {Annual Computer Security Applications Conference},
title = {{Message In A Bottle}: Sailing Past Censorship},
publisher = {ACM},
year = {2013},
url = {https://seclab.cs.ucsb.edu/media/uploads/papers/invernizzi_miab_acsac_2013.pdf},
}
@inproceedings{Jones2014a,
author = {Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover and Sathya Gunasekaran and Karim Habak},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{Facade}: High-Throughput, Deniable Censorship Circumvention Using Web Search},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf},
}
@inproceedings{Jones2014b,
author = {Ben Jones and Tzu-Wen Lee and Nick Feamster and Phillipa Gill},
title = {Automated Detection and Fingerprinting of Censorship Block Pages},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2014},
url = {http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf},
}
@inproceedings{Karlin2011a,
author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Decoy Routing: Toward Unblockable {Internet} Communication},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Karlin.pdf},
}
@inproceedings{Kathuria2011a,
author = {Karl Kathuria},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Bypassing {Internet} Censorship for News Broadcasters},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Kathuria.pdf},
}
@inproceedings{Khattak2013a,
author = {Sheharbano Khattak and Mobin Javed and Philip D. Anderson and Vern Paxson},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Khattak2013a.pdf},
}
@inproceedings{Khattak2014a,
author = {Sheharbano Khattak and Mobin Javed and Syed Ali Khayam and Zartash Afzal Uzmi and Vern Paxson},
title = {A Look at the Consequences of {Internet} Censorship Through an {ISP} Lens},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2014},
url = {http://conferences2.sigcomm.org/imc/2014/papers/p271.pdf},
}
@article{King2014a,
author = {Gary King and Jennifer Pan and Margaret E. Roberts},
title = {Reverse-engineering censorship in {China}: Randomized experimentation and participant observation},
journal = {Science},
publisher = {AAAS},
year = {2014},
volume = {345},
number = {6199},
url = {http://cryptome.org/2014/08/reverse-eng-cn-censorship.pdf},
}
@article{King2012a,
author = {Gary King and Jennifer Pan and Margaret E. Roberts},
journal = {American Political Science Review},
title = {How Censorship in {China} Allows Government Criticism but Silences Collective Expression},
year = {2012},
url = {http://gking.harvard.edu/files/censored.pdf},
}
@inproceedings{Knockel2011a,
author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Three Researchers, Five Conjectures: An Empirical Analysis of {TOM-Skype} Censorship and Surveillance},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Knockel.pdf},
}
@inproceedings{Koepsell2004a,
author = {Stefan K\"{o}psell and Ulf Hillig},
booktitle = {Workshop on Privacy in the Electronic Society},
title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
publisher = {ACM},
year = {2004},
pages = {47--58},
url = {http://censorbib.nymity.ch/pdf/Koepsell2004a.pdf},
}
@inproceedings{Li2014a,
author = {Shuai Li and Mike Schliep and Nick Hopper},
booktitle = {Workshop on Privacy in the Electronic Society},
title = {{Facet}: Streaming over Videoconferencing for Censorship Circumvention},
publisher = {ACM},
year = {2014},
url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf},
}
@inproceedings{Lincoln2012a,
author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Simpson and Paul Vixie and Dan Boneh},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Bootstrapping Communications into an Anti-Censorship System},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf},
}
@inproceedings{Ling2012a,
author = {Zhen Ling and Xinwen Fu and Wei Yu and Junzhou Luo and Ming Yang},
booktitle = {INFOCOM},
publisher = {IEEE},
title = {Extensive Analysis and Large-Scale Empirical Evaluation of {Tor} Bridge Discovery},
year = {2012},
url = {http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf},
}
@inproceedings{Liu2011a,
author = {Vincent Liu and Seungyeop Han and Arvind Krishnamurthy and Thomas Anderson},
booktitle = {Hot Topics in Networks},
publisher = {ACM},
title = {{Tor} Instead of {IP}},
year = {2011},
url = {http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf},
}
@techreport{Lowe2007a,
author = {Graham Lowe and Patrick Winters and Michael L. Marcus},
title = {The Great {DNS} Wall of {China}},
institution = {New York University},
year = {2007},
url = {https://cs.nyu.edu/~pcw216/work/nds/final.pdf},
}
@inproceedings{Luchaup2014a,
author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
title = {{LibFTE}: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes},
year = {2014},
url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-luchaup.pdf},
}
@inproceedings{Mahdian2010a,
author = {Mohammad Mahdian},
booktitle = {International Conference on Fun with Algorithms},
pages = {296--306},
publisher = {Springer},
title = {Fighting Censorship with Algorithms},
year = {2010},
url = {http://mahdian.org/censorship.pdf},
}
@inproceedings{McCoy2011a,
author = {Damon McCoy and Jose Andre Morales and Kirill Levchenko},
booktitle = {Financial Cryptography and Data Security},
publisher = {Springer},
title = {{Proximax}: A Measurement Based System for Proxies Dissemination},
year = {2011},
url = {http://cseweb.ucsd.edu/~klevchen/mml-fc11.pdf},
}
@inproceedings{Moghaddam2012a,
author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg},
title = {{SkypeMorph}: Protocol Obfuscation for {Tor} Bridges},
booktitle = {Computer and Communications Security},
year = {2012},
publisher = {ACM},
url = {http://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf},
}
@inproceedings{Morrison2014a,
author = {Donn Morrison},
title = {Toward automatic censorship detection in microblogs},
booktitle = {Data Mining in Social Networks},
year = {2014},
url = {http://arxiv.org/pdf/1402.5310.pdf},
}
@inproceedings{Nabi2013a,
author = {Zubair Nabi},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {The Anatomy of Web Censorship in {Pakistan}},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Nabi2013a.pdf},
}
@inproceedings{Nobori2014a,
author = {Daiyuu Nobori and Yasushi Shinjo},
booktitle = {Networked Systems Design and Implementation},
publisher = {USENIX},
title = {{VPN Gate}: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls},
year = {2014},
url = {https://www.usenix.org/system/files/conference/nsdi14/nsdi14-paper-nobori.pdf},
}
@inproceedings{Park2010a,
author = {Jong Chun Park and Jedidiah R. Crandall},
booktitle = {Distributed Computing Systems},
pages = {315--326},
publisher = {IEEE},
title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {China}},
year = {2010},
url = {http://www.cs.unm.edu/~crandall/icdcs2010.pdf},
}
@inproceedings{Perng2005a,
author = {Ginger Perng and Michael K. Reiter and Chenxi Wang},
booktitle = {International Conference on Information Hiding},
pages = {62--76},
publisher = {Springer},
title = {Censorship Resistance Revisited},
year = {2005},
url = {http://censorbib.nymity.ch/pdf/Perng2005a.pdf},
}
@inproceedings{Roberts2011a,
author = {Hal Roberts and David Larochelle and Rob Faris and John Palfrey},
booktitle = {Computer Communications Workshop},
publisher = {IEEE},
title = {Mapping Local {Internet} Control},
year = {2011},
url = {https://cyber.law.harvard.edu/netmaps/mlic_20110513.pdf},
}
@inproceedings{Rogers2012a,
author = {Michael Rogers and Eleanor Saitta},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
title = {Secure Communication over Diverse Transports},
year = {2012},
pages = {75--80},
url = {http://censorbib.nymity.ch/pdf/Rogers2012a.pdf},
}
@inproceedings{Roos2014a,
author = {Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe},
title = {Measuring {Freenet} in the Wild: Censorship-resilience under Observation},
booktitle = {Privacy Enhancing Technologies Symposium},
publisher = {Springer},
year = {2014},
url = {https://petsymposium.org/2014/papers/paper_71.pdf},
}
@inproceedings{Ruffing2013a,
author = {Tim Ruffing and Jonas Schneider and Aniket Kate},
booktitle = {Hot Topics in Privacy Enhancing Technologies},
title = {Identity-Based Steganography and Its Applications to Censorship Resistance},
publisher = {Springer},
year = {2013},
url = {http://petsymposium.org/2013/papers/ruffing-censorship.pdf},
}
@inproceedings{Schuchard2012a,
author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper},
title = {Routing Around Decoys},
booktitle = {Computer and Communications Security},
year = {2012},
publisher = {ACM},
url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf},
}
@inproceedings{Seltzer2011a,
author = {Wendy Seltzer},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Infrastructures of Censorship and Lessons from Copyright Resistance},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Seltzer.pdf},
}
@inproceedings{Serjantov2002a,
author = {Andrei Serjantov},
booktitle = {International Workshop on Peer-To-Peer Systems},
publisher = {Springer},
title = {Anonymizing Censorship Resistant Systems},
year = {2002},
pages = {111--120},
url = {http://www.iptps.org/papers-2002/120.pdf},
}
@inproceedings{Sfakianakis2011a,
author = {Andreas Sfakianakis and Elias Athanasopoulos and Sotiris Ioannidis},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{CensMon}: A Web Censorship Monitor},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Sfakianakis.pdf},
}
@inproceedings{Shklovski2011a,
author = {Irina Shklovski and Nalini P. Kotamraju},
title = {Online Contribution Practices in Countries that Engage in {Internet} Blocking and Censorship},
booktitle = {CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
year = {2011},
url = {http://censorbib.nymity.ch/pdf/Shklovski2011a.pdf},
}
@inproceedings{Sovran2008a,
author = {Yair Sovran and Alana Libonati and Jinyang Li},
booktitle = {International Workshop on Peer-to-Peer Systems},
publisher = {USENIX},
title = {Pass it on: Social Networks Stymie Censors},
year = {2008},
url = {http://www.cs.toronto.edu/iptps2008/final/73.pdf},
}
@techreport{Stubblefield2001a,
author = {Adam Stubblefield and Dan S. Wallach},
title = {{Dagster}: Censorship-Resistant Publishing Without Replication},
institution = {Rice University},
year = {2001},
url = {http://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf},
}
@inproceedings{Tan2014a,
author = {Henry Tan and Micah Sherr},
title = {Censorship Resistance as a Side-Effect},
booktitle = {Security Protocols},
publisher = {Springer},
year = {2014},
url = {https://security.cs.georgetown.edu/~msherr/papers/censorship-as-sideeffect.pdf},
}
@inproceedings{Thomas2012a,
author = {Kurt Thomas and Chris Grier and Vern Paxson},
title = {Adapting Social Spam Infrastructure for Political Censorship},
booktitle = {Large-Scale Exploits and Emergent Threats},
publisher = {USENIX},
year = {2012},
url = {https://www.usenix.org/system/files/conference/leet12/leet12-final13_0.pdf},
}
@inproceedings{Vasserman2012a,
author = {Eugene Y. Vasserman and Victor Heorhiadi and Nicholas Hopper and Yongdae Kim},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {One-way indexing for plausible deniability in censorship resistant storage},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final5.pdf},
}
@inproceedings{Verkamp2012a,
author = {John-Paul Verkamp and Minaxi Gupta},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Inferring Mechanics of Web Censorship Around the World},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final1.pdf},
}
@inproceedings{Verkamp2013a,
author = {John-Paul Verkamp and Minaxi Gupta},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Five Incidents, One Theme: {Twitter} Spam as a Weapon to Drown Voices of Protest},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Verkamp2013a.pdf},
}
@inproceedings{Wachs2013a,
author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff},
title = {On the Feasibility of a Censorship Resistant Decentralized Name System},
booktitle = {Foundations \& Practice of Security},
publisher = {Springer},
year = {2013},
url = {http://grothoff.org/christian/fps2013wachs.pdf},
}
@inproceedings{Wachs2014a,
author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff},
title = {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System},
booktitle = {Cryptology and Network Security},
publisher = {Springer},
year = {2014},
url = {https://gnunet.org/sites/default/files/paper_cans2014_camera_ready.pdf},
}
@inproceedings{Waldman2000a,
author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor},
title = {{Publius}: A robust, tamper-evident, censorship-resistant web publishing system},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2000},
url = {http://www.eecs.harvard.edu/~mema/courses/cs264/papers/waldman00publius.pdf},
}
@inproceedings{Waldman2001a,
author = {Marc Waldman and David Mazi\`{e}res},
title = {{Tangler}: A Censorship-Resistant Publishing System Based On Document Entanglements},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2001},
pages = {126--135},
url = {http://www.cs.nyu.edu/~waldman/tangler.ps},
}
@inproceedings{Wang2012a,
author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov},
title = {{CensorSpoofer}: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2012},
url = {http://hatswitch.org/~nikita/papers/censorspoofer.pdf},
}
@inproceedings{Wang2013a,
author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper},
title = {{rBridge}: User Reputation based {Tor} Bridge Distribution with Privacy Preservation},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
year = {2013},
url = {http://www-users.cs.umn.edu/~hopper/rbridge_ndss13.pdf},
}
@inproceedings{Weaver2009a,
author = {Nicholas Weaver and Robin Sommer and Vern Paxson},
title = {Detecting Forged {TCP} Reset Packets},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
year = {2009},
url = {http://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf},
}
@inproceedings{Weinberg2012a,
author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh},
title = {{StegoTorus}: A Camouflage Proxy for the {Tor} Anonymity System},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2012},
url = {http://www.frankwang.org/papers/ccs2012.pdf},
}
@techreport{Wiley2011a,
author = {Brandon Wiley},
title = {{Dust}: A Blocking-Resistant {Internet} Transport Protocol},
institution = {University of Texas at Austin},
year = {2011},
url = {http://blanu.net/Dust.pdf},
}
@inproceedings{Winter2012a,
author = {Philipp Winter and Stefan Lindskog},
title = {How the {Great Firewall} of {China} is Blocking {Tor}},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2012},
url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf},
}
@inproceedings{Winter2013a,
author = {Philipp Winter},
title = {Towards a Censorship Analyser for {Tor}},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Winter2013a.pdf},
}
@inproceedings{Winter2013b,
author = {Philipp Winter and Tobias Pulls and Juergen Fuss},
title = {{ScrambleSuit}: A Polymorphic Network Protocol to Circumvent Censorship},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Winter2013b.pdf},
}
@inproceedings{Wright2011a,
author = {Joss Wright and Tulio de Souza and Ian Brown},
title = {Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Wright.pdf},
}
@techreport{Wright2012a,
author = {Joss Wright},
title = {Regional Variation in {Chinese Internet} Filtering},
institution = {University of Oxford},
year = {2012},
url = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3},
}
@inproceedings{Wustrow2011a,
author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman},
title = {{Telex}: Anticensorship in the Network Infrastructure},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2011},
url = {http://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf},
}
@inproceedings{Wustrow2014a,
author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman},
title = {{TapDance}: End-to-Middle Anticensorship without Flow Blocking},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2014},
url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-wustrow.pdf},
}
@inproceedings{Xu2011a,
author = {Xueyang Xu and Z. Morley Mao and J. Alex Halderman},
title = {{Internet} Censorship in {China}: Where Does the Filtering Occur?},
booktitle = {Passive and Active Measurement Conference},
publisher = {Springer},
year = {2011},
pages = {133--142},
url = {http://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf},
}
@inproceedings{Zhou2013a,
author = {Wenxuan Zhou and Amir Houmansadr and Matthew Caesar and Nikita Borisov},
title = {{SWEET}: Serving the Web by Exploiting Email Tunnels},
booktitle = {Hot Topics in Privacy Enhancing Technologies},
publisher = {Springer},
year = {2013},
url = {http://petsymposium.org/2013/papers/zhou-censorship.pdf},
}
@inproceedings{Zhu2013a,
author = {Tao Zhu and David Phipps and Adam Pridgen and Jedidiah R. Crandall and Dan S. Wallach},
title = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2013},
url = {https://www.cs.unm.edu/~crandall/usenix13.pdf},
}