mirror of
https://github.com/NullHypothesis/censorbib.git
synced 2025-07-23 06:31:22 -04:00
9451 lines
No EOL
340 KiB
HTML
9451 lines
No EOL
340 KiB
HTML
|
||
<!DOCTYPE html>
|
||
<html lang="en">
|
||
|
||
<head>
|
||
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
|
||
<title>The Internet censorship bibliography</title>
|
||
<link rel="icon" href="assets/favicon-32.png" sizes="32x32">
|
||
<link rel="icon" href="assets/favicon-128.png" sizes="128x128">
|
||
<link rel="icon" href="assets/favicon-180.png" sizes="180x180">
|
||
<link rel="icon" href="assets/favicon-192.png" sizes="192x192">
|
||
<style>
|
||
body {
|
||
font-family: Roboto,Helvetica,sans-serif;
|
||
background: #ddd;
|
||
margin: 1em auto;
|
||
max-width: 1000px;
|
||
}
|
||
li {
|
||
border-radius: 10px;
|
||
margin: 0.5em;
|
||
padding: 0.5em;
|
||
}
|
||
h1 {
|
||
font-size: 2em;
|
||
color: #efefef;
|
||
width: 80%;
|
||
float: left;
|
||
}
|
||
ul {
|
||
padding: 0.5em;
|
||
list-style-type: none; /* Disable bullet points */
|
||
border-radius: 10px;
|
||
border:1px solid #c0c0c0;
|
||
background: #f5f5f5;
|
||
box-shadow: 2px 2px 5px #bbb;
|
||
}
|
||
a:link {
|
||
color:#0b61a4;
|
||
text-decoration:none;
|
||
}
|
||
a:visited {
|
||
color:#033e6b;
|
||
text-decoration:none;
|
||
}
|
||
a:hover {
|
||
text-decoration:underline;
|
||
}
|
||
.icons a:hover {
|
||
text-decoration: none;
|
||
}
|
||
p {
|
||
margin: 0px;
|
||
}
|
||
#container {
|
||
margin: 1em;
|
||
}
|
||
.author {
|
||
color: #666;
|
||
}
|
||
.venue {
|
||
font-style: italic;
|
||
}
|
||
.paper {
|
||
font-weight: bold;
|
||
}
|
||
.other {
|
||
color: #666;
|
||
}
|
||
#footer {
|
||
text-align: center;
|
||
line-height: 20px;
|
||
}
|
||
.icon {
|
||
height: 1em;
|
||
margin-right: 0.5em;
|
||
}
|
||
.icons {
|
||
float: right;
|
||
}
|
||
.top-icon {
|
||
height: 1em;
|
||
width: 1em;
|
||
position: relative;
|
||
vertical-align: middle;
|
||
margin-left: 1em;
|
||
}
|
||
.menu-item {
|
||
padding-bottom: 5px;
|
||
}
|
||
.url {
|
||
font-family: monospace;
|
||
font-size: 12px;
|
||
}
|
||
:target {
|
||
background-color: #ffb772;
|
||
}
|
||
#header {
|
||
margin: 1em;
|
||
}
|
||
#left-header {
|
||
flex: 4;
|
||
background: #f5f5f5;
|
||
margin-right: 0.5em;
|
||
border-radius: 10px;
|
||
border: 1px solid #c0c0c0;
|
||
box-shadow: 2px 2px 5px #bbb;
|
||
overflow: hidden; /* For child elements to inherit rounded corners. */
|
||
}
|
||
#right-header {
|
||
flex: 1;
|
||
background: #f5f5f5;
|
||
margin-left: 0.5em;
|
||
background: #333 url('assets/research-power-tools-cover.jpg') no-repeat;
|
||
background-size: 100%;
|
||
}
|
||
.round-shadow {
|
||
border-radius: 10px;
|
||
border: 1px solid #c0c0c0;
|
||
box-shadow: 2px 2px 5px #bbb;
|
||
overflow: hidden; /* For child elements to inherit rounded corners. */
|
||
}
|
||
.flex-row {
|
||
display: flex;
|
||
}
|
||
.flex-column {
|
||
display: flex;
|
||
flex-direction: column;
|
||
}
|
||
#title-box {
|
||
text-align: center;
|
||
background: #333 url('assets/open-access.svg') right/25% no-repeat;
|
||
}
|
||
#censorbib-description {
|
||
font-size: 1.15em;
|
||
text-align: justify;
|
||
padding: 1em;
|
||
flex: 5;
|
||
}
|
||
#censorbib-links {
|
||
padding: 1em;
|
||
flex: 2;
|
||
font-size: 0.9em;
|
||
}
|
||
#book-info {
|
||
text-align: center;
|
||
padding: 0.5em;
|
||
background: #333;
|
||
color: #efefef;
|
||
}
|
||
#book-info > a:link {
|
||
color: #d94b7b
|
||
}
|
||
#book-info > a:visited {
|
||
color: #d94b7b
|
||
}
|
||
</style>
|
||
</head>
|
||
|
||
<body>
|
||
|
||
<div id="header" class="flex-row">
|
||
|
||
<div id="left-header" class="flex-column round-shadow">
|
||
|
||
<div id="title-box">
|
||
<h1>Selected Research Papers<br>in Internet Censorship</h1>
|
||
</div>
|
||
|
||
<div class="flex-row">
|
||
|
||
<div id="censorbib-description">
|
||
CensorBib is an archive of selected academic research papers on
|
||
Internet censorship. If you think I missed a paper,
|
||
<a href="https://github.com/NullHypothesis/censorbib">make a pull request</a>.
|
||
Finally, the
|
||
<a href="https://github.com/net4people/bbs/issues">net4people/bbs forum</a>
|
||
has reading groups for many of the papers listed below.
|
||
</div> <!-- censorbib-description -->
|
||
|
||
<div id="censorbib-links">
|
||
<div class="menu-item">
|
||
<img class="top-icon" src="assets/code-icon.svg" alt="source code icon">
|
||
<a href="https://github.com/NullHypothesis/censorbib">CensorBib code</a>
|
||
</div>
|
||
<div class="menu-item">
|
||
<img class="top-icon" src="assets/update-icon.svg" alt="update icon">
|
||
<a href="https://github.com/NullHypothesis/censorbib/commits/master">Updated: 2024-11-05</a>
|
||
</div>
|
||
</div> <!-- censorbib-links -->
|
||
|
||
</div>
|
||
|
||
</div> <!-- left-header -->
|
||
|
||
<div id="right-header" class="round-shadow">
|
||
|
||
<div class="flex-column" style="height: 100%">
|
||
<div style="flex: 1 1 auto">
|
||
</div>
|
||
|
||
<div id="book-info" style="flex: 0 1 auto">
|
||
Are you a researcher? You may like my book
|
||
<a href="http://research-power-tools.com">Research Power Tools</a>.
|
||
</div>
|
||
</div>
|
||
|
||
</div> <!-- right-header -->
|
||
|
||
</div><div id='container'>
|
||
<ul>
|
||
<li id='Zillien2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3634737.3637676'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Zillien2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Zillien2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sebastian Zillien, Tobias Schmidbauer, Mario Kubek, Jörg Keller, Steffen Wendzel
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Asia CCS</span>, 2024, ACM
|
||
</span>
|
||
</li><li id='Xue2024b'>
|
||
<div>
|
||
<span class="paper">
|
||
Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/usenixsecurity24-xue-bridging.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Xue2024b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L10'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Xue2024b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diwen Xue, Anna Ablove, Reethika Ramesh, Grace Kwak Danciu, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2024, USENIX
|
||
</span>
|
||
</li><li id='Kon2024b'>
|
||
<div>
|
||
<span class="paper">
|
||
SpotProxy: Rediscovering the Cloud for Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs-pk.com/sec24-spotproxy-final.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Kon2024b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L19'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Kon2024b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2024, USENIX
|
||
</span>
|
||
</li><li id='Vines2024c'>
|
||
<div>
|
||
<span class="paper">
|
||
Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/popets/2024/popets-2024-0027.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Vines2024c.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L28'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Vines2024c'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2024
|
||
</span>
|
||
</li><li id='Tang2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Automatic Generation of Web Censorship Probe Lists
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/popets/2024/popets-2024-0106.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Tang2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L39'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Tang2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2024
|
||
</span>
|
||
</li><li id='Ahmed2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Extended Abstract: The Impact of Online Censorship on LLMs
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0006.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ahmed2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L50'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ahmed2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Mohamed Ahmed, Jeffrey Knockel
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Gao2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Extended Abstract: Leveraging Large Language Models to Identify Internet Censorship through Network Data
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0007.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Gao2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L59'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Gao2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Tianyu Gao, Ping Ji
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Calle2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Toward Automated DNS Tampering Detection Using Machine Learning
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0008.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Calle2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L68'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Calle2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Paola Calle, Larissa Savitsky, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Shinyoung Cho
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Pu2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0009.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Pu2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L77'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Pu2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Michael Pu, Andrew Wang, Anthony Chang, Kieran Quan, Yi Wei Zhou
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Vilalonga2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0010.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Vilalonga2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L86'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Vilalonga2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Afonso Vilalonga, João S. Resende, Henrique Domingos
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Vines2024b'>
|
||
<div>
|
||
<span class="paper">
|
||
Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burdens
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0011.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Vines2024b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L95'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Vines2024b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Paul Vines
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Müller2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0012.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Müller2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L104'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Müller2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Philipp Müller, Niklas Niere, Felix Lange, Juraj Somorovsky
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Hanlon2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Detecting VPN Traffic through Encapsulated TCP Behavior
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0016.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hanlon2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L113'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hanlon2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Michelina Hanlon, Gerry Wan, Anna Ascheman, Zakir Durumeric
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Kujath2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Analyzing Prominent Mobile Apps in Latin America
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0017.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Kujath2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L122'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Kujath2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Beau Kujath, Jeffrey Knockel, Paul Aguilar, Diego Morabito, Masashi Crete-Nishihata, Jedidiah R. Crandall
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Ruo2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Lost in Translation: Characterizing Automated Censorship in Online Translation Services
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0018.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ruo2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L131'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ruo2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Samuel Ruo, Jeffrey Knockel, Zoë Reichert
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Wang2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Identifying VPN Servers through Graph-Represented Behaviors
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3589334.3645552'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L140'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wang2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Chenxu Wang, Jiangyi Yin, Zhao Li, Hongbo Xu, Zhongyi Zhang, Qingyun Liu
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">The International World Wide Web Conference</span>, 2024, ACM
|
||
</span>
|
||
</li><li id='Hoang2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
GFWeb: Measuring the Great Firewall’s Web Censorship at Scale
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/sec24fall-prepub-310-hoang.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hoang2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L149'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hoang2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2024, USENIX
|
||
</span>
|
||
</li><li id='Awwad2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Digital Repression in Palestine
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3613904.3642422'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Awwad2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L158'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Awwad2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ghadeer Awwad, Kentaro Toyama
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">CHI</span>, 2024, ACM
|
||
</span>
|
||
</li><li id='Zhang2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censorship by Local Governments in China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cambridge.org/core/services/aop-cambridge-core/content/view/B1BB347F7458EBF033A65461D1C2D82A/S0305741024000602a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Zhang2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L167'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Zhang2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Tony Huiquan Zhang, Jianhua Xu, Jinjin Liu
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">The China Quarterly</span>, 2024, SOAS University of London
|
||
</span>
|
||
</li><li id='Bocovich2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Snowflake, a censorship circumvention system using temporary WebRTC proxies
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/366'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/sec24fall-prepub-1998-bocovich.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bocovich2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L178'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bocovich2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Cecylia Bocovich, Arlo Breault, David Fifield, Serene, Xiaokang Wang
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2024, USENIX
|
||
</span>
|
||
</li><li id='Moon2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/1Ub242nYFoY/pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Moon2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L188'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Moon2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Soo-Jin Moon, Milind Srivastava, Yves Bieri, Ruben Martins, Vyas Sekar
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Symposium on Security & Privacy</span>, 2024, IEEE
|
||
</span>
|
||
</li><li id='Gosain2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Out in the Open: On the Implementation of Mobile App Filtering in India
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://pam2024.cs.northwestern.edu/pdfs/paper-58.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Gosain2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L197'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Gosain2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Devashish Gosain, Kartikey Singh, Rishi Sharma, Jithin S, Sambuddho Chakravaty
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Passive and Active Measurement Conference</span>, 2024, Springer
|
||
</span>
|
||
</li><li id='Vines2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/popets/2024/popets-2024-0027.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Vines2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L206'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Vines2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2024
|
||
</span>
|
||
</li><li id='Almutairi2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Almutairi2024a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Almutairi2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L217'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Almutairi2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sultan Almutairi, Yogev Neumann, Khaled Harfoush
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Consumer Communications & Networking Conference</span>, 2024, IEEE
|
||
</span>
|
||
</li><li id='Tsai2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Modeling and Detecting Internet Censorship Events
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.ndss-symposium.org/wp-content/uploads/2024-409-paper.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Tsai2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L226'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Tsai2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2024, The Internet Society
|
||
</span>
|
||
</li><li id='Kristoff2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Internet Sanctions on Russian Media: Actions and Effects
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0001.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Kristoff2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L235'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Kristoff2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
John Kristoff, Moritz Müller, Arturo Filastò, Max Resing, Chris Kanich, Niels ten Oever
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Sakamoto2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Bleeding Wall: A Hematologic Examination on the Great Firewall
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/367'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0002.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Sakamoto2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L244'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Sakamoto2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sakamoto, Elson Wedwards
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Chi2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Just add WATER: WebAssembly-based Circumvention Transports
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0003.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Chi2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L254'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Chi2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Erik Chi, Gaukas Wang, J. Alex Halderman, Eric Wustrow, Jack Wampler
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Lorimer2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Extended Abstract: Traffic Splitting for Pluggable Transports
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0004.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Lorimer2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L263'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Lorimer2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Anna Harbluk Lorimer, Rob Jansen, Nick Feamster
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Chen2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Extended Abstract: Oscur0: One-shot Circumvention without Registration
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2024/foci-2024-0005.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Chen2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L272'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Chen2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Mingye Chen, Jack Wampler, Abdulrahman Alaraj, Gaukas Wang, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2024
|
||
</span>
|
||
</li><li id='Xue2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/sec24summer-prepub-465-xue.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Xue2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L281'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Xue2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2024, USENIX
|
||
</span>
|
||
</li><li id='Kon2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/1RjEabCelaM/pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Kon2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L290'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Kon2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Symposium on Security & Privacy</span>, 2024, IEEE
|
||
</span>
|
||
</li><li id='Wails2024a'>
|
||
<div>
|
||
<span class="paper">
|
||
On Precisely Detecting Censorship Circumvention in Real-World Networks
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/312'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.robgjansen.com/publications/precisedetect-ndss2024.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wails2024a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L299'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wails2024a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2024, The Internet Society
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Ding2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Discop: Provably secure steganography in practice based on “distribution copies”
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dingjinyang.github.io/uploads/Discop_sp23_paper.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ding2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L309'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ding2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, Nenghai Yu
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Symposium on Security & Privacy</span>, 2023, IEEE
|
||
</span>
|
||
</li><li id='Niere2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Poster: Circumventing the GFW with TLS Record Fragmentation
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/308'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://nerd2.nrw/wp-content/uploads/2024/05/3576915.3624372.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Niere2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L318'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Niere2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Niklas Niere, Sven Hebrok, Juraj Somorovsky, Robert Merget
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2023, ACM
|
||
</span>
|
||
</li><li id='Ververis2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Website blocking in the European Union: Network interference from the perspective of Open Internet
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://onlinelibrary.wiley.com/doi/pdf/10.1002/poi3.367'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ververis2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L328'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ververis2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Vasilis Ververis, Lucas Lasota, Tatiana Ermakova, Benjamin Fabian
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Policy & Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Fifield2023b'>
|
||
<div>
|
||
<span class="paper">
|
||
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://eprint.iacr.org/2023/1362.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Fifield2023b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L336'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Fifield2023b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
David Fifield
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2023
|
||
</span>
|
||
</li><li id='Bischof2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Destination Unreachable: Characterizing Internet Outages and Shutdowns
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://cseweb.ucsd.edu/~snoeren/papers/shutdown-sigcomm23.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bischof2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L343'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bischof2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zachary S. Bischof, Kennedy Pitcher, Esteban Carisimo, Amanda Meng, Rafael Bezerra Nunes, Ramakrishna Padmanabhan, Margaret E. Roberts, Alex C. Snoeren, Alberto Dainotti
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">SIGCOMM</span>, 2023, ACM
|
||
</span>
|
||
</li><li id='Brown2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://arxiv.org/pdf/2302.02031.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Brown2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L352'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Brown2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Knowledge Discovery And Data Mining</span>, 2023, ACM
|
||
</span>
|
||
</li><li id='Feng2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Study of China’s Censorship and Its Evasion Through the Lens of Online Gaming
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/usenixsecurity23-feng.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Feng2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L361'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Feng2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2023, USENIX
|
||
</span>
|
||
</li><li id='Amich2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/usenixsecurity23-amich.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Amich2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L370'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Amich2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2023, USENIX
|
||
</span>
|
||
</li><li id='Sun2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
TELEPATH: A Minecraft-based Covert Communication System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://doi.ieeecomputersociety.org/10.1109/SP46215.2023.00183'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Sun2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L379'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Sun2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zhen Sun, Vitaly Shmatikov
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Symposium on Security & Privacy</span>, 2023, IEEE
|
||
</span>
|
||
</li><li id='Streisand2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0001.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Streisand2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L388'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Streisand2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Mizhang Streisand, Eric Wustrow, Amir Houmansadr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Wang2023b'>
|
||
<div>
|
||
<span class="paper">
|
||
Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0007.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2023b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L397'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wang2023b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Mona Wang, Jonathan Mayer
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Master2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Worldwide View of Nation-state Internet Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0008.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Master2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L406'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Master2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Alexander Master, Christina Garman
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Xue2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Use of Push Notification in Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0009.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Xue2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L415'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Xue2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diwen Xue, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Nourin2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Measuring and Evading Turkmenistan’s Internet Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/273'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://dl.acm.org/doi/abs/10.1145/3543507.3583189'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nourin2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L424'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nourin2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">The International World Wide Web Conference</span>, 2023, ACM
|
||
</span>
|
||
</li><li id='Nourin2023b'>
|
||
<div>
|
||
<span class="paper">
|
||
Detecting Network Interference Without Endpoint Participation
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0010.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nourin2023b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L434'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nourin2023b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sadia Nourin, Kevin Bock, Nguyen Phong Hoang, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Fifield2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Running a high-performance pluggable transports Tor bridge
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/222'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0011.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Fifield2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L443'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Fifield2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
David Fifield, Linus Nordberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Ortwein2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Towards a Comprehensive Understanding of Russian Transit Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0012.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ortwein2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L453'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ortwein2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Aaron Ortwein, Kevin Bock, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Wails2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Proteus: Programmable Protocols for Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0013.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wails2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L462'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wails2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ryan Wails, Rob Jansen, Aaron Johnson, Micah Sherr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Jia2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0014.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Jia2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L471'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Jia2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Watson Jia, Joseph Eichenhofer, Liang Wang, Prateek Mittal
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Tran2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0016.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Tran2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L480'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Tran2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nhi Tran, Kevin Bock, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Ramesh2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censoredplanet.org/assets/russia-ukraine-invasion.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ramesh2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L507'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ramesh2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2023, USENIX
|
||
</span>
|
||
</li><li id='Wu2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/sec23fall-prepub-234-wu-mingshi.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wu2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L516'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wu2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2023, USENIX
|
||
</span>
|
||
</li><li id='Tulloch2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Lox: Protecting the Social Graph in Bridge Distribution
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/320'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://petsymposium.org/popets/2023/popets-2023-0029.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Tulloch2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L525'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Tulloch2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Lindsey Tulloch, Ian Goldberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2023
|
||
</span>
|
||
</li><li id='Sharma2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/popets/2023/popets-2023-0034.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Sharma2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L537'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Sharma2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2023
|
||
</span>
|
||
</li><li id='Katira2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
CensorWatch: On the Implementation of Online Censorship in India
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/360'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0006.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Katira2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L548'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Katira2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Divyank Katira, Gurshabad Grover, Kushagra Singh, Varun Bansal
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Wang2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Chasing Shadows: A security analysis of the ShadowTLS proxy
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/322'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0002.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L558'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wang2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Gaukas Wang, Anonymous, Jackson Sippe, Hai Chi, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Fenske2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Security Notions for Fully Encrypted Protocols
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/383'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0004.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Fenske2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L568'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Fenske2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ellis Fenske, Aaron Johnson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Raman2023a'>
|
||
<div>
|
||
<span class="paper">
|
||
Advancing the Art of Censorship Data Analysis
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.petsymposium.org/foci/2023/foci-2023-0003.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Raman2023a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L578'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Raman2023a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ram Sundara Raman, Apurva Virkud, Sarah Laplante, Vinicius Fortuna, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2023
|
||
</span>
|
||
</li><li id='Raman2023b'>
|
||
<div>
|
||
<span class="paper">
|
||
Global, Passive Detection of Connection Tampering
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.umd.edu/~dml/papers/tampering_sigcomm23.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Raman2023b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L587'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Raman2023b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ram Sundara Raman, Louis-Henri Merino, Kevin Bock, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">SIGCOMM</span>, 2023, ACM
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Waheed2022a'>
|
||
<div>
|
||
<span class="paper">
|
||
Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://research.owlfolio.org/pubs/2022-darwin-censorship.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Waheed2022a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L489'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Waheed2022a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Asim Waheed, Sara Qunaibi, Diogo Barradas, Zachary Weinberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2022, ACM
|
||
</span>
|
||
</li><li id='Raman2022a'>
|
||
<div>
|
||
<span class="paper">
|
||
Network Measurement Methods for Locating and Examining Censorship Devices
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3555050.3569133'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Raman2022a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L596'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Raman2022a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan Mayer, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Emerging Networking Experiments and Technologies</span>, 2022, ACM
|
||
</span>
|
||
</li><li id='Xue2022b'>
|
||
<div>
|
||
<span class="paper">
|
||
TSPU: Russia’s Decentralized Censorship System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3517745.3561461'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Xue2022b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L605'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Xue2022b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2022, ACM
|
||
</span>
|
||
</li><li id='Bhaskar2022a'>
|
||
<div>
|
||
<span class="paper">
|
||
Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/sec22-bhaskar.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bhaskar2022a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L623'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bhaskar2022a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Abhishek Bhaskar, Paul Pearce
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2022, USENIX
|
||
</span>
|
||
</li><li id='Harrity2022a'>
|
||
<div>
|
||
<span class="paper">
|
||
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/sec22-harrity.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Harrity2022a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L632'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Harrity2022a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2022, USENIX
|
||
</span>
|
||
</li><li id='Xue2022a'>
|
||
<div>
|
||
<span class="paper">
|
||
OpenVPN is Open to VPN Fingerprinting
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/sec22-xue-diwen.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Xue2022a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L641'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Xue2022a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2022, USENIX
|
||
</span>
|
||
</li><li id='Figueira2022a'>
|
||
<div>
|
||
<span class="paper">
|
||
Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/259'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3488932.3517419'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Figueira2022a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L650'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Figueira2022a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Gabriel Figueira, Diogo Barradas, Nuno Santos
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Asia CCS</span>, 2022, ACM
|
||
</span>
|
||
</li><li id='Chang2022a'>
|
||
<div>
|
||
<span class="paper">
|
||
COVID-19 increased censorship circumvention and access to sensitive topics in China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Chang2022a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Chang2022a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L687'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Chang2022a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Keng-Chi Chang, William R. Hobbs, Margaret E. Roberts, Zachary C. Steinert-Threlkeld
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">PNAS</span>, 2022, National Academy of Sciences
|
||
</span>
|
||
</li><li id='Hoang2022a'>
|
||
<div>
|
||
<span class="paper">
|
||
Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www3.cs.stonybrook.edu/~mikepo/papers/dneye.pam22.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hoang2022a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L698'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hoang2022a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nguyen Phong Hoang, Michalis Polychronakis, Phillipa Gill
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Passive and Active Measurement Conference</span>, 2022, Springer
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Ververis2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Understanding Internet Censorship in Europe: The Case of Spain
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3447535.3462638'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ververis2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L498'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ververis2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Vasilis Ververis, Tatiana Ermakova, Marios Isaakidis, Simone Basso, Benjamin Fabian, Stefania Milan
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Web Science Conference</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Lorimer2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
OUStralopithecus: Overt User Simulation for Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://cypherpunks.ca/~iang/pubs/oustral-wpes21.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Lorimer2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L614'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Lorimer2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Sharma2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Sharma2021a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Sharma2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L669'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Sharma2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Asia CCS</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Rambert2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Rambert2021a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Rambert2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L678'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Rambert2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Raymond Rambert, Zachary Weinberg, Diogo Barradas, Nicolas Christin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">WWW</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Kaptchuk2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Meteor: Cryptographically Secure Steganography for Realistic Distributions
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/104'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.cs.jhu.edu/~gkaptch1/publications/ccs21_meteor.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Kaptchuk2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L708'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Kaptchuk2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Xue2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Throttling Twitter: an emerging censorship technique in Russia
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3487552.3487858'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Xue2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L718'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Xue2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diwen Xue, Reethika Ramesh, ValdikSS, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Elmenhorst2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Web censorship measurements of HTTP/3 over QUIC
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/113'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3487552.3487836'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Elmenhorst2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L727'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Elmenhorst2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kathrin Elmenhorst, Bertram Schütz, Nils Aschenbruck, Simone Basso
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Basso2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Measuring DoT/DoH blocking using OONI Probe: a preliminary study
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.ndss-symposium.org/wp-content/uploads/dnspriv21-02-paper.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Basso2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L737'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Basso2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Simone Basso
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">DNS Privacy Workshop</span>, 2021, The Internet Society
|
||
</span>
|
||
</li><li id='Padmanabhan2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
A multi-perspective view of Internet censorship in Myanmar
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3473604.3474562'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Padmanabhan2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L746'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Padmanabhan2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ramakrishna Padmanabhan, Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Doug Madory, Molly Roberts, Alberto Dainotti
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Knockel2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Measuring QQMail’s Automated Email Censorship in China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://doi.org/10.1145/3473604.3474560'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Knockel2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L755'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Knockel2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jeffrey Knockel, Lotus Ruan
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Kwan2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/94'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://doi.org/10.1145/3473604.3474563'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Kwan2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L765'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Kwan2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Carmen Kwan, Paul Janiszewski, Shela Qiu, Cathy Wang, Cecylia Bocovich
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Bock2021c'>
|
||
<div>
|
||
<span class="paper">
|
||
Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://doi.org/10.1145/3473604.3474559'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bock2021c.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L775'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bock2021c'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Satija2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
BlindTLS: Circumventing TLS-Based HTTPS Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/86'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://doi.org/10.1145/3473604.3474564'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Satija2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L784'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Satija2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sambhav Satija, Rahul Chatterjee
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2021, ACM
|
||
</span>
|
||
</li><li id='Wei2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/73'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/sec21-wei.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wei2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L794'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wei2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Mingkui Wei
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2021, USENIX
|
||
</span>
|
||
</li><li id='Bock2021b'>
|
||
<div>
|
||
<span class="paper">
|
||
Weaponizing Middleboxes for TCP Reflected Amplification
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/sec21-bock.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bock2021b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L804'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bock2021b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2021, USENIX
|
||
</span>
|
||
</li><li id='Hoang2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
How Great is the Great Firewall? Measuring China’s DNS Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/sec21-hoang.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hoang2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L814'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hoang2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2021, USENIX
|
||
</span>
|
||
</li><li id='Rosen2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Balboa: Bobbing and Weaving around Network Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/112'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/sec21-rosen.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Rosen2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L823'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Rosen2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Marc B. Rosen, James Parker, Alex J. Malozemoff
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2021, USENIX
|
||
</span>
|
||
</li><li id='Bock2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://www.cs.umd.edu/~dml/papers/weaponizing_woot21.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bock2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L833'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bock2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Offensive Technologies</span>, 2021, IEEE
|
||
</span>
|
||
</li><li id='Gosain2021a'>
|
||
<div>
|
||
<span class="paper">
|
||
Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/90'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://petsymposium.org/2021/files/papers/issue2/popets-2021-0023.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Gosain2021a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L842'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Gosain2021a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2021, Sciendo
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Barradas2020b'>
|
||
<div>
|
||
<span class="paper">
|
||
Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/258'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.gsd.inesc-id.pt/~nsantos/papers/barradas_dicg20.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Barradas2020b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L854'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Barradas2020b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diogo Barradas, Nuno Santos
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Distributed Infrastructure for Common Good</span>, 2020, ACM
|
||
</span>
|
||
</li><li id='Barradas2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/55'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.gsd.inesc-id.pt/~nsantos/papers/barradas_ccs20.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Barradas2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L864'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Barradas2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diogo Barradas, Nuno Santos, Luís Rodrigues, Vítor Nunes
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2020, ACM
|
||
</span>
|
||
</li><li id='Raman2020c'>
|
||
<div>
|
||
<span class="paper">
|
||
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/283'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.ramakrishnansr.com/assets/censoredplanet.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Raman2020c.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L874'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Raman2020c'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2020, ACM
|
||
</span>
|
||
</li><li id='Alice2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
How China Detects and Blocks Shadowsocks
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Alice2020a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Alice2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L884'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Alice2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2020, ACM
|
||
</span>
|
||
</li><li id='Raman2020b'>
|
||
<div>
|
||
<span class="paper">
|
||
Investigating Large Scale HTTPS Interception in Kazakhstan
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/66'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3419394.3423665'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Raman2020b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L893'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Raman2020b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2020, ACM
|
||
</span>
|
||
</li><li id='Bock2020b'>
|
||
<div>
|
||
<span class="paper">
|
||
Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://geneva.cs.umd.edu/papers/come-as-you-are.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bock2020b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L903'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bock2020b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">SIGCOMM</span>, 2020, ACM
|
||
</span>
|
||
</li><li id='Govil2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
MIMIQ: Masking IPs with Migration in QUIC
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/foci20-paper-govil.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Govil2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L912'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Govil2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Yashodhar Govil, Liang Wang, Jennifer Rexford
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2020, USENIX
|
||
</span>
|
||
</li><li id='Alharbi2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/48'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/foci20-paper-alharbi_0.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Alharbi2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L921'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Alharbi2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Fatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2020, USENIX
|
||
</span>
|
||
</li><li id='Anonymous2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/47'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/foci20-paper-anonymous_0.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Anonymous2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L931'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Anonymous2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2020, USENIX
|
||
</span>
|
||
</li><li id='Birtel2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Slitheen++: Stealth TLS-based Decoy Routing
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/51'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/foci20-paper-birtel_0.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Birtel2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L941'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Birtel2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Benedikt Birtel, Christian Rossow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2020, USENIX
|
||
</span>
|
||
</li><li id='Bock2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/49'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/foci20-paper-bock.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bock2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L951'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bock2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2020, USENIX
|
||
</span>
|
||
</li><li id='Fifield2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Turbo Tunnel, a good way to design censorship circumvention protocols
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/foci20-paper-fifield.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Fifield2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L961'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Fifield2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
David Fifield
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2020, USENIX
|
||
</span>
|
||
</li><li id='Frolov2020b'>
|
||
<div>
|
||
<span class="paper">
|
||
HTTPT: A Probe-Resistant Proxy
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/50'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/foci20-paper-frolov.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Frolov2020b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L970'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Frolov2020b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sergey Frolov, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2020, USENIX
|
||
</span>
|
||
</li><li id='Singh2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
How India Censors the Web
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Singh2020a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Singh2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L980'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Singh2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kushagra Singh, Gurshabad Grover, Varun Bansal
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Web Science</span>, 2020, ACM
|
||
</span>
|
||
</li><li id='Zhu2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Characterizing Transnational Internet Performance and the Great Bottleneck of China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/96'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://dl.acm.org/doi/pdf/10.1145/3379479'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Zhu2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L989'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Zhu2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Haixin Duan
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Measurement and Analysis of Computing Systems</span>, 2020, ACM
|
||
</span>
|
||
</li><li id='Sharma2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
SiegeBreaker: An SDN Based Practical Decoy Routing System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/62'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://petsymposium.org/2020/files/papers/issue3/popets-2020-0051.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Sharma2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1001'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Sharma2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, H. B. Acharya, Sambuddho Chakravarty
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2020, Sciendo
|
||
</span>
|
||
</li><li id='VanderSloot2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Running Refraction Networking for Real
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/75'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://petsymposium.org/2020/files/papers/issue4/popets-2020-0073.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/VanderSloot2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1014'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#VanderSloot2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2020, Sciendo
|
||
</span>
|
||
</li><li id='Minaei2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/71'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://petsymposium.org/2020/files/papers/issue3/popets-2020-0058.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Minaei2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1027'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Minaei2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2020, Sciendo
|
||
</span>
|
||
</li><li id='Niaki2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/52'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://people.cs.umass.edu/~phillipa/papers/oakland2020.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Niaki2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1048'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Niaki2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Symposium on Security & Privacy</span>, 2020, IEEE
|
||
</span>
|
||
</li><li id='Wang2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/31'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.ndss-symposium.org/wp-content/uploads/2020/02/24083.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1058'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wang2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2020, The Internet Society
|
||
</span>
|
||
</li><li id='Nasr2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/32'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.ndss-symposium.org/wp-content/uploads/2020/02/24340.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nasr2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1068'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nasr2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2020, The Internet Society
|
||
</span>
|
||
</li><li id='Frolov2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Detecting Probe-resistant Proxies
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/26'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.ndss-symposium.org/wp-content/uploads/2020/02/23087.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Frolov2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1078'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Frolov2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sergey Frolov, Jack Wampler, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2020, The Internet Society
|
||
</span>
|
||
</li><li id='Raman2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Measuring the Deployment of Network Censorship Filters at Global Scale
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/34'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Raman2020a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Raman2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1088'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Raman2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2020, The Internet Society
|
||
</span>
|
||
</li><li id='Ramesh2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Decentralized Control: A Case Study of Russia
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/20'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.ndss-symposium.org/wp-content/uploads/2020/02/23098.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ramesh2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1098'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ramesh2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2020, The Internet Society
|
||
</span>
|
||
</li><li id='Oakley2020a'>
|
||
<div>
|
||
<span class="paper">
|
||
Protocol Proxy: An FTE-based covert channel
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Oakley2020a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Oakley2020a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1108'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Oakley2020a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard Brooks
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Computers & Security</span>, 2020, Elsevier
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Frolov2019b'>
|
||
<div>
|
||
<span class="paper">
|
||
Conjure: Summoning Proxies from Unused Address Space
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/18'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://jhalderm.com/pub/papers/conjure-ccs19.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Frolov2019b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1134'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Frolov2019b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2019, ACM
|
||
</span>
|
||
</li><li id='Bock2019a'>
|
||
<div>
|
||
<span class="paper">
|
||
Geneva: Evolving Censorship Evasion Strategies
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/23'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bock2019a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bock2019a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1144'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bock2019a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kevin Bock, George Hughey, Xiao Qiang, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2019, ACM
|
||
</span>
|
||
</li><li id='Iszaevich2019a'>
|
||
<div>
|
||
<span class="paper">
|
||
Distributed Detection of Tor Directory Authorities Censorship in Mexico
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://tics.site/proceedings/2019a/icn_2019_6_20_38010.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Iszaevich2019a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1154'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Iszaevich2019a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Gunnar Eyal Wolf Iszaevich
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">International Conference on Networks</span>, 2019, IARIA
|
||
</span>
|
||
</li><li id='Ververis2019a'>
|
||
<div>
|
||
<span class="paper">
|
||
Shedding Light on Mobile App Store Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/hack66/appavail/blob/master/AppStoreCensorship.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ververis2019a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1163'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ververis2019a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Vasilis Ververis, Marios Isaakidis, Valentin Weber, Benjamin Fabian
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">User Modeling, Adaptation and Personalization</span>, 2019, ACM
|
||
</span>
|
||
</li><li id='Sheffey2019a'>
|
||
<div>
|
||
<span class="paper">
|
||
Improving Meek With Adversarial Techniques
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/13'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/foci19-paper_sheffey.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Sheffey2019a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1181'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Sheffey2019a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Steven R. Sheffey, Ferrol Aderholdt
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2019, USENIX
|
||
</span>
|
||
</li><li id='Chai2019a'>
|
||
<div>
|
||
<span class="paper">
|
||
On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/10'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/foci19-paper_chai_update.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Chai2019a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1191'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Chai2019a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zimo Chai, Amirhossein Ghafari, Amir Houmansadr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2019, USENIX
|
||
</span>
|
||
</li><li id='Knockel2019a'>
|
||
<div>
|
||
<span class="paper">
|
||
An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/foci19-paper_xiong.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Knockel2019a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1201'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Knockel2019a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ruohan Xiong, Jeffrey Knockel
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2019, USENIX
|
||
</span>
|
||
</li><li id='Hoang2019a'>
|
||
<div>
|
||
<span class="paper">
|
||
Measuring I2P Censorship at a Global Scale
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/12'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/foci19-paper_hoang.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hoang2019a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1210'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hoang2019a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2019, USENIX
|
||
</span>
|
||
</li><li id='Nasr2019a'>
|
||
<div>
|
||
<span class="paper">
|
||
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://people.cs.umass.edu/~amir/papers/TorGame.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nasr2019a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1229'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nasr2019a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2019, The Internet Society
|
||
</span>
|
||
</li><li id='Frolov2019a'>
|
||
<div>
|
||
<span class="paper">
|
||
The use of TLS in Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/54'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://tlsfingerprint.io/static/frolov2019.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Frolov2019a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1238'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Frolov2019a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sergey Frolov, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2019, The Internet Society
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Wright2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://sci-hub.se/https://dl.acm.org/citation.cfm?id=3201093'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wright2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1172'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wright2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Joss Wright, Alexander Darer, Oliver Farnan
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Web Science</span>, 2018, ACM
|
||
</span>
|
||
</li><li id='Yadav2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://delivery.acm.org/10.1145/3280000/3278555/p252-Yadav.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Yadav2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1257'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Yadav2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2018, ACM
|
||
</span>
|
||
</li><li id='McDonald2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
403 Forbidden: A Global View of CDN Geoblocking
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://delivery.acm.org/10.1145/3280000/3278552/p218-McDonald.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/McDonald2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1266'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#McDonald2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2018, ACM
|
||
</span>
|
||
</li><li id='Hoang2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://arxiv.org/pdf/1809.09086.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hoang2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1275'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hoang2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2018, ACM
|
||
</span>
|
||
</li><li id='Bocovich2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
Secure asymmetry and deployability for decoy routing systems
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://groups.google.com/g/traffic-obf/c/76xh3oS6wkE/m/pUroVpICGAAJ'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.petsymposium.org/2018/files/papers/issue3/popets-2018-0020.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bocovich2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1284'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bocovich2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Cecylia Bocovich, Ian Goldberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2018, De Gruyter Open
|
||
</span>
|
||
</li><li id='Barradas2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
Effective Detection of Multimedia Protocol Tunneling using Machine Learning
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://groups.google.com/g/traffic-obf/c/qAFtEo2pj1M/m/uZDLGYhjBgAJ'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-barradas.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Barradas2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1297'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Barradas2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diogo Barradas, Nuno Santos, Luís Rodrigues
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2018, USENIX
|
||
</span>
|
||
</li><li id='VanderSloot2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
Quack: Scalable Remote Measurement of Application-Layer Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/2'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-vandersloot.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/VanderSloot2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1307'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#VanderSloot2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2018, USENIX
|
||
</span>
|
||
</li><li id='Nisar2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
Incentivizing Censorship Measurements via Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/authorize?N666961'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nisar2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1317'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nisar2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Aqib Nisar, Aqsa Kashaf, Ihsan Ayyub Qazi, Zartash Afzal Uzmi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">SIGCOMM</span>, 2018, ACM
|
||
</span>
|
||
</li><li id='Dunna2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
Analyzing China’s Blocking of Unpublished Tor Bridges
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://groups.google.com/g/traffic-obf/c/-z0gzKONGtI'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/conference/foci18/foci18-paper-dunna.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Dunna2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1326'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Dunna2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Arun Dunna, Ciarán O’Brien, Phillipa Gill
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2018, USENIX
|
||
</span>
|
||
</li><li id='Manfredi2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://groups.google.com/g/traffic-obf/c/X6fE99hinMU/m/OwbH7TldBgAJ'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/conference/foci18/foci18-paper-manfredi.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Manfredi2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1336'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Manfredi2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Victoria Manfredi, Pi Songkuntham
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2018, USENIX
|
||
</span>
|
||
</li><li id='Knockel2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
An analysis of automatic image filtering on WeChat Moments
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci18/foci18-paper-knockel.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Knockel2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1346'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Knockel2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2018, USENIX
|
||
</span>
|
||
</li><li id='Tschantz2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci18/foci18-paper-tschantz.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Tschantz2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1355'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Tschantz2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2018, USENIX
|
||
</span>
|
||
</li><li id='Hounsel2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
Automatically Generating a Large, Culture-Specific Blocklist for China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci18/foci18-paper-hounsel.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hounsel2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1364'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hounsel2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Austin Hounsel, Prateek Mittal, Nick Feamster
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2018, USENIX
|
||
</span>
|
||
</li><li id='Hobbs2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
How Sudden Censorship Can Increase Access to Information
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://www.margaretroberts.net/wp-content/uploads/2016/08/selfiecensorship.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hobbs2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1373'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hobbs2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
William R. Hobbs, Margaret E. Roberts
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">American Political Science Review</span>, 2018, Cambridge University Press
|
||
</span>
|
||
</li><li id='Ng2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
Detecting Censorable Content on Sina Weibo: A Pilot Study
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Ng2018a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ng2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1403'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ng2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kei Yin Ng, Anna Feldman, Chris Leberknight
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Hellenic Conference on Artificial Intelligence</span>, 2018, ACM
|
||
</span>
|
||
</li><li id='Martiny2018a'>
|
||
<div>
|
||
<span class="paper">
|
||
Proof-of-Censorship: Enabling centralized censorship-resistant content providers
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://fc18.ifca.ai/preproceedings/95.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Martiny2018a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1429'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Martiny2018a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ian Martiny, Ian Miers, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Financial Cryptography and Data Security</span>, 2018, Springer
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Gosain2017b'>
|
||
<div>
|
||
<span class="paper">
|
||
The Devil’s in The Details: Placing Decoy Routers in the Internet
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Gosain2017b.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Gosain2017b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L660'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Gosain2017b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, H. B. Acharya
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">ACSAC</span>, 2017, ACM
|
||
</span>
|
||
</li><li id='Bocovich2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Lavinia: An audit-payment protocol for censorship-resistant storage
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://ifca.ai/fc17/preproceedings/paper_19.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bocovich2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1220'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bocovich2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Cecylia Bocovich, John A. Doucette, Ian Goldberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Financial Cryptography and Data Security</span>, 2017, Springer
|
||
</span>
|
||
</li><li id='Deng2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Random Forest based Detection of Shadowsock’s Traffic
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Deng2017a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Deng2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1248'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Deng2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ziye Deng, Zihan Liu, Zhouguo Chen, Yubin Guo
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Intelligent Human-Machine Systems and Cybernetics</span>, 2017, IEEE
|
||
</span>
|
||
</li><li id='Li2017b'>
|
||
<div>
|
||
<span class="paper">
|
||
DeTor: Provably Avoiding Geographic Regions in Tor
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-li.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Li2017b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1385'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Li2017b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zhihao Li, Stephen Herwig, Dave Levin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2017, USENIX
|
||
</span>
|
||
</li><li id='Gosain2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Mending Wall: On the Implementation of Censorship in India
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Gosain2017a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Gosain2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1420'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Gosain2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">SecureComm</span>, 2017, Springer
|
||
</span>
|
||
</li><li id='Javaid2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Online Advertising under Internet Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://conferences.sigcomm.org/hotnets/2017/papers/hotnets17-final110.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Javaid2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1438'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Javaid2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Hira Javaid, Hafiz Kamran Khalil, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Hot Topics in Networks</span>, 2017, ACM
|
||
</span>
|
||
</li><li id='Ververis2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Blocklisting
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Ververis2017a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ververis2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1447'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ververis2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Vasilis Ververis, Marios Isaakidis, Chrystalleni Loizidou, Benjamin Fabian
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">E-Democracy</span>, 2017, Springer
|
||
</span>
|
||
</li><li id='Lu2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Lu2017a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Lu2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1456'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Lu2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zhen Lu, Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Middleware</span>, 2017, ACM
|
||
</span>
|
||
</li><li id='Cho2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://people.cs.umass.edu/~phillipa/papers/conext2017_churn_paper.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Cho2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1465'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Cho2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Emerging Networking Experiments and Technologies</span>, 2017, ACM
|
||
</span>
|
||
</li><li id='Nasr2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://acmccs.github.io/papers/p2037-nasrA.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nasr2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1483'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nasr2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Milad Nasr, Hadi Zolfaghari, Amir Houmansadr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2017, ACM
|
||
</span>
|
||
</li><li id='Wang2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://www.cs.ucr.edu/~krish/imc17.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1501'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wang2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2017, ACM
|
||
</span>
|
||
</li><li id='Li2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
lib·erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://people.cs.umass.edu/~phillipa/papers/imc2017_liberate_paper.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Li2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1510'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Li2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David Choffnes, Phillipa Gill, Alan Mislove
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2017, ACM
|
||
</span>
|
||
</li><li id='Morshed2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
When the Internet Goes Down in Bangladesh
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://nehakumardotorg.files.wordpress.com/2014/03/p1591-bin-morshed.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Morshed2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1519'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Morshed2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, Neha Kumar
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer-Supported Cooperative Work and Social Computing</span>, 2017, ACM
|
||
</span>
|
||
</li><li id='Singh2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Characterizing the Nature and Dynamics of Tor Exit Blocking
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-singh.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Singh2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1528'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Singh2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2017, USENIX
|
||
</span>
|
||
</li><li id='Pearce2017b'>
|
||
<div>
|
||
<span class="paper">
|
||
Global Measurement of DNS Manipulation
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-pearce.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Pearce2017b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1537'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Pearce2017b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2017, USENIX
|
||
</span>
|
||
</li><li id='Darer2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://tma.ifip.org/wordpress/wp-content/uploads/2017/06/tma2017_paper32.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Darer2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1546'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Darer2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Alexander Darer, Oliver Farnan, Joss Wright
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network Traffic Measurement and Analysis</span>, 2017, IFIP
|
||
</span>
|
||
</li><li id='Knockel2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Measuring Decentralization of Chinese Keyword Censorship via Mobile Games
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci17/foci17-paper-knockel.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Knockel2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1555'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Knockel2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2017, USENIX
|
||
</span>
|
||
</li><li id='Tanash2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci17/foci17-paper-tanash.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Tanash2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1564'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Tanash2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2017, USENIX
|
||
</span>
|
||
</li><li id='Jermyn2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Autosonda: Discovering Rules and Triggers of Censorship Devices
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://groups.google.com/g/traffic-obf/c/HkmVtobDHmM/m/UNjeyVujCAAJ'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://www.usenix.org/system/files/conference/foci17/foci17-paper-jermyn.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Jermyn2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1573'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Jermyn2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jill Jermyn, Nicholas Weaver
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2017, USENIX
|
||
</span>
|
||
</li><li id='Frolov2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
An ISP-Scale Deployment of TapDance
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci17/foci17-paper-frolov_0.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Frolov2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1583'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Frolov2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2017, USENIX
|
||
</span>
|
||
</li><li id='Barradas2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/2017/papers/issue4/paper15-2017-4-source.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Barradas2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1592'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Barradas2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Diogo Barradas, Nuno Santos, Luís Rodrigues
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2017, De Gruyter Open
|
||
</span>
|
||
</li><li id='Weinberg2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Topics of Controversy: An Empirical Analysis of Web Censorship Lists
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/2017/papers/issue1/paper06-2017-1-source.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Weinberg2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1604'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Weinberg2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2017, De Gruyter Open
|
||
</span>
|
||
</li><li id='Lee2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Usability Evaluation of Tor Launcher
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/2017/papers/issue3/paper2-2017-3-source.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Lee2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1616'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Lee2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Linda Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David Wagner
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2017, De Gruyter Open
|
||
</span>
|
||
</li><li id='Pearce2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Augur: Internet-Wide Detection of Connectivity Disruptions
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.ieee-security.org/TC/SP2017/papers/586.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Pearce2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1628'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Pearce2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Symposium on Security & Privacy</span>, 2017, IEEE
|
||
</span>
|
||
</li><li id='Heydari2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Heydari2017a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Heydari2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1637'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Heydari2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Vahid Heydari, Sun-il Kim, Seong-Moo Yoo
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Transactions on Information Forensics and Security</span>, 2017, IEEE
|
||
</span>
|
||
</li><li id='Gebhart2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Internet Censorship in Thailand: User Practices and Potential Threats
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://homes.cs.washington.edu/~yoshi/papers/GebhartEtAl-IEEEEuroSP.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Gebhart2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1649'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Gebhart2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Genevieve Gebhart, Anonymous Author, Tadayoshi Kohno
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">European Symposium on Security & Privacy</span>, 2017, IEEE
|
||
</span>
|
||
</li><li id='Matic2017a'>
|
||
<div>
|
||
<span class="paper">
|
||
Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://software.imdea.org/~juanca/papers/torbridges_ndss17.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Matic2017a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1675'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Matic2017a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Srdjan Matic, Carmela Troncoso, Juan Caballero
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2017, The Internet Society
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Fifield2016b'>
|
||
<div>
|
||
<span class="paper">
|
||
Fingerprintability of WebRTC
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://arxiv.org/pdf/1605.08805.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Fifield2016b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1118'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Fifield2016b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
David Fifield, Mia Gil Epner
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2016
|
||
</span>
|
||
</li><li id='Farnan2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dl.acm.org/authorize?N25517'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Farnan2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1694'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Farnan2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Oliver Farnan, Alexander Darer, Joss Wright
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2016, ACM
|
||
</span>
|
||
</li><li id='Bocovich2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cypherpunks.ca/~iang/pubs/slitheen-ccs16.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bocovich2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1703'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bocovich2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Cecylia Bocovich, Ian Goldberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2016, ACM
|
||
</span>
|
||
</li><li id='Nasr2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Game of Decoys: Optimal Decoy Routing Through Game Theory
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://people.cs.umass.edu/~amir/papers/GameOfDecoys.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nasr2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1712'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nasr2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Milad Nasr, Amir Houmansadr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2016, ACM
|
||
</span>
|
||
</li><li id='Zolfaghari2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Practical Censorship Evasion Leveraging Content Delivery Networks
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://people.cs.umass.edu/~amir/papers/CDNReaper.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Zolfaghari2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1721'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Zolfaghari2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Hadi Zolfaghari, Amir Houmansadr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2016, ACM
|
||
</span>
|
||
</li><li id='Akbar2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
DNS-sly: Avoiding Censorship through Network Complexity
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci16/foci16-paper-akbar.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Akbar2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1730'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Akbar2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Qurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2016, USENIX
|
||
</span>
|
||
</li><li id='Safaka2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Matryoshka: Hiding Secret Communication in Plain Sight
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci16/foci16-paper-safaka-revised.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Safaka2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1739'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Safaka2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Iris Safaka, Christina Fragouli, Katerina Argyraki
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2016, USENIX
|
||
</span>
|
||
</li><li id='Douglas2016b'>
|
||
<div>
|
||
<span class="paper">
|
||
GhostPost: Seamless Restoration of Censored Social Media Posts
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci16/foci16-paper-douglas.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Douglas2016b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1748'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Douglas2016b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Frederick Douglas, Matthew Caesar
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2016, USENIX
|
||
</span>
|
||
</li><li id='Fifield2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Censors’ Delay in Blocking Circumvention Proxies
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci16/foci16-paper-fifield.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Fifield2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1757'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Fifield2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
David Fifield, Lynn Tsai
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2016, USENIX
|
||
</span>
|
||
</li><li id='Singh2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci16/foci16-paper-singh.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Singh2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1766'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Singh2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2016, USENIX
|
||
</span>
|
||
</li><li id='Elahi2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Framework for the Game-theoretic Analysis of Censorship Resistance
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://discovery.ucl.ac.uk/id/eprint/1503846/1/popets2016gametheoretic.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Elahi2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1775'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Elahi2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2016, De Gruyter Open
|
||
</span>
|
||
</li><li id='Khattak2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
SoK: Making Sense of Censorship Resistance Systems
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://murdoch.is/papers/popets16makingsense.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Khattak2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1787'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Khattak2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2016, De Gruyter Open
|
||
</span>
|
||
</li><li id='Douglas2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Salmon: Robust Proxy Distribution for Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/33'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Douglas2016a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Douglas2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1799'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Douglas2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2016, De Gruyter Open
|
||
</span>
|
||
</li><li id='Scott2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Satellite: Joint Analysis of CDNs and Network-Level Interference
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/atc16/atc16_paper-scott.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Scott2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1812'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Scott2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Will Scott, Thomas Anderson, Tadayoshi Kohno, Arvind Krishnamurthy
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Annual Technical Conference</span>, 2016, USENIX
|
||
</span>
|
||
</li><li id='Aceto2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Analyzing Internet Censorship in Pakistan
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://wpage.unina.it/giuseppe.aceto/pub/aceto2016analyzing.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Aceto2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1821'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Aceto2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Giuseppe Aceto, Alessio Botta, Antonio Pescapè, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Research and Technologies for Society and Industry</span>, 2016, IEEE
|
||
</span>
|
||
</li><li id='Zarras2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Leveraging Internet Services to Evade Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Zarras2016a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Zarras2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1830'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Zarras2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Apostolis Zarras
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Information Security Conference</span>, 2016, Springer
|
||
</span>
|
||
</li><li id='Hahn2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Games Without Frontiers: Investigating Video Games as a Covert Channel
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://people.cs.umass.edu/~phillipa/papers/castle.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hahn2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1839'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hahn2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">European Symposium on Security & Privacy</span>, 2016, IEEE
|
||
</span>
|
||
</li><li id='Li2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Mailet: Instant Social Networking under Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www-users.cse.umn.edu/~hoppernj/mailet_popets.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Li2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1857'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Li2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Shuai Li, Nicholas Hopper
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2016, De Gruyter Open
|
||
</span>
|
||
</li><li id='McPherson2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
CovertCast: Using Live Streaming to Evade Internet Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.cornell.edu/~shmat/covertcast/covertcast.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/McPherson2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1869'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#McPherson2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Richard McPherson, Amir Houmansadr, Vitaly Shmatikov
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2016, De Gruyter Open
|
||
</span>
|
||
</li><li id='Kohls2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
SkypeLine: Robust Hidden Data Transmission for VoIP
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://poepper.net/papers/SkypeLine-AsiaCCS16.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Kohls2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1881'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Kohls2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">ASIA Computer and Communications Security</span>, 2016, ACM
|
||
</span>
|
||
</li><li id='Al-Saqaf2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://www.cogitatiopress.com/ojs/index.php/mediaandcommunication/article/download/357/357'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Al-Saqaf2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1890'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Al-Saqaf2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Walid Al-Saqaf
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Media and Communication</span>, 2016, Cogitatio
|
||
</span>
|
||
</li><li id='Tschantz2016a'>
|
||
<div>
|
||
<span class="paper">
|
||
SoK: Towards Grounding Censorship Circumvention in Empiricism
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.eecs.berkeley.edu/~sa499/papers/oakland2016.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Tschantz2016a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1901'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Tschantz2016a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Michael Carl Tschantz, Sadia Afroz, Anonymous, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Symposium on Security & Privacy</span>, 2016, IEEE
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Levin2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Alibi Routing
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p611.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Levin2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1394'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Levin2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">SIGCOMM</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Narayanan2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Narayanan2015a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Narayanan2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1412'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Narayanan2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Arvind Narayanan, Bendert Zevenbergen
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Technology Science</span>, 2015
|
||
</span>
|
||
</li><li id='Ellard2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.victoriamanfredi.com/publications/lcn15.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ellard2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1848'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ellard2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Daniel Ellard, Alden Jackson, Christine Jones, Victoria Ursula Manfredi, Timothy Strayer, Bishal Thapa, Megan Van Welie
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Local Computer Networks</span>, 2015, IEEE
|
||
</span>
|
||
</li><li id='Hiruncharoenvate2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Hiruncharoenvate2015a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hiruncharoenvate2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1910'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hiruncharoenvate2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Chaya Hiruncharoenvate, Zhiyuan Lin, Eric Gilbert
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">International Conference on Web and Social Media</span>, 2015, AAAI
|
||
</span>
|
||
</li><li id='Nisar2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Case for Marrying Censorship Measurements with Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences.sigcomm.org/hotnets/2015/papers/nisar.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nisar2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1919'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nisar2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Hot Topics in Networks</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Jones2015b'>
|
||
<div>
|
||
<span class="paper">
|
||
Can Censorship Measurements Be Safe(r)?
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences.sigcomm.org/hotnets/2015/papers/jones.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Jones2015b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1928'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Jones2015b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ben Jones, Nick Feamster
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Hot Topics in Networks</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Vines2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Vines2015a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Vines2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1937'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Vines2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Paul Vines, Tadayoshi Kohno
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Tanash2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Known Unknowns: An Analysis of Twitter Censorship in Turkey
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Tanash2015a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Tanash2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1946'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Tanash2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Rima S. Tanash, Zhouhan Chen, Tanmay Thakur, Dan S. Wallach, Devika Subramanian
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Ensafi2015b'>
|
||
<div>
|
||
<span class="paper">
|
||
Examining How the Great Firewall Discovers Hidden Circumvention Servers
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/208'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='http://conferences2.sigcomm.org/imc/2015/papers/p445.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ensafi2015b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1955'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ensafi2015b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Holowczak2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://people.cs.umass.edu/~amir/papers/CacheBrowser.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Holowczak2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1965'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Holowczak2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
John Holowczak, Amir Houmansadr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Wang2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Seeing through Network-Protocol Obfuscation
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://pages.cs.wisc.edu/~liangw/pub/ccsfp653-wangA.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1974'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wang2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Crandall2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.unm.edu/~jeffk/publications/nsethics2015-syns.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Crandall2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1983'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Crandall2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Ethics in Networked Systems Research</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Ververis2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Understanding Internet Censorship Policy: The Case of Greece
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci15/foci15-paper-ververis-updated-2.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ververis2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2001'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ververis2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Vasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2015, USENIX
|
||
</span>
|
||
</li><li id='Knockel2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci15/foci15-paper-knockel.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Knockel2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2010'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Knockel2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2015, USENIX
|
||
</span>
|
||
</li><li id='Marczak2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
An Analysis of China’s “Great Cannon”
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci15/foci15-paper-marczak.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Marczak2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2019'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Marczak2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2015, USENIX
|
||
</span>
|
||
</li><li id='Dyer2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Marionette: A Programmable Network-Traffic Obfuscation System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Dyer2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2028'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Dyer2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2015, USENIX
|
||
</span>
|
||
</li><li id='Burnett2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p653.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Burnett2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2037'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Burnett2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sam Burnett, Nick Feamster
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">SIGCOMM</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Jones2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Ethical Concerns for Censorship Measurement
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.icir.org/vern/papers/censorship-meas.nsethics15.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Jones2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2055'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Jones2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Ethics in Networked Systems Research</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Ensafi2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Analyzing the Great Firewall of China Over Space and Time
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Ensafi2015a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ensafi2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2064'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ensafi2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2015, De Gruyter Open
|
||
</span>
|
||
</li><li id='Fifield2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Blocking-resistant communication through domain fronting
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.icir.org/vern/papers/meek-PETS-2015.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Fifield2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2075'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Fifield2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Privacy Enhancing Technologies</span>, 2015, De Gruyter Open
|
||
</span>
|
||
</li><li id='Gill2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Gill2015a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Gill2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2104'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Gill2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Phillipa Gill, Masashi Crete-Nishihata, Jakub Dalek, Sharon Goldberg, Adam Senft, Greg Wiseman
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Transactions on the Web</span>, 2015, ACM
|
||
</span>
|
||
</li><li id='Aceto2015b'>
|
||
<div>
|
||
<span class="paper">
|
||
Internet Censorship detection: A survey
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Aceto2015b.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Aceto2015b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2124'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Aceto2015b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Giuseppe Aceto, Antonio Pescapè
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Computer Networks</span>, 2015, Elsevier
|
||
</span>
|
||
</li><li id='Aceto2015a'>
|
||
<div>
|
||
<span class="paper">
|
||
Monitoring Internet Censorship with UBICA
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://wpage.unina.it/giuseppe.aceto/pub/aceto2015monitoring_TMA.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Aceto2015a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2135'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Aceto2015a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Traffic Monitoring and Analysis</span>, 2015, Springer
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Wang2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
GoHop: Personal VPN to Defend from Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2014a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2095'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wang2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Yuzhi Wang, Ping Ji, Borui Ye, Pengjun Wang, Rong Luo, Huazhong Yang
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">International Conference on Advanced Communication Technology</span>, 2014, IEEE
|
||
</span>
|
||
</li><li id='Anderson2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Global Network Interference Detection over the RIPE Atlas Network
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci14/foci14-anderson.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Anderson2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2170'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Anderson2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Collin Anderson, Philipp Winter, Roya
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2014, USENIX
|
||
</span>
|
||
</li><li id='Anonymous2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Anonymous2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2191'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Anonymous2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Anonymous
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2014, USENIX
|
||
</span>
|
||
</li><li id='Brubaker2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/2014/papers/paper_68.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Brubaker2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2248'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Brubaker2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Privacy Enhancing Technologies Symposium</span>, 2014, Springer
|
||
</span>
|
||
</li><li id='Chaabane2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Censorship in the Wild: Analyzing Internet Filtering in Syria
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences2.sigcomm.org/imc/2014/papers/p285.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Chaabane2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2276'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Chaabane2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2014, ACM
|
||
</span>
|
||
</li><li id='Connolly2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci14/foci14-connolly.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Connolly2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2314'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Connolly2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2014, USENIX
|
||
</span>
|
||
</li><li id='Ensafi2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://arxiv.org/pdf/1312.5739v1.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ensafi2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2403'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ensafi2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Passive and Active Measurement Conference</span>, 2014, Springer
|
||
</span>
|
||
</li><li id='Houmansadr2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
No Direction Home: The True Cost of Routing Around Decoys
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://dedis.cs.yale.edu/dissent/papers/nodirection.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Houmansadr2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2515'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Houmansadr2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2014, The Internet Society
|
||
</span>
|
||
</li><li id='Jones2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Jones2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2533'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Jones2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2014, USENIX
|
||
</span>
|
||
</li><li id='Jones2014b'>
|
||
<div>
|
||
<span class="paper">
|
||
Automated Detection and Fingerprinting of Censorship Block Pages
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Jones2014b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2542'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Jones2014b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2014, ACM
|
||
</span>
|
||
</li><li id='Khattak2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Look at the Consequences of Internet Censorship Through an ISP Lens
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences2.sigcomm.org/imc/2014/papers/p271.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Khattak2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2578'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Khattak2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2014, ACM
|
||
</span>
|
||
</li><li id='King2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Reverse-engineering censorship in China: Randomized experimentation and participant observation
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://cryptome.org/2014/08/reverse-eng-cn-censorship.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/King2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2587'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#King2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Gary King, Jennifer Pan, Margaret E. Roberts
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">Science</span>, 2014, AAAS
|
||
</span>
|
||
</li><li id='Li2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Facet: Streaming over Videoconferencing for Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Li2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2625'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Li2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Shuai Li, Mike Schliep, Nick Hopper
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2014, ACM
|
||
</span>
|
||
</li><li id='Luchaup2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-luchaup.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Luchaup2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2669'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Luchaup2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2014, USENIX
|
||
</span>
|
||
</li><li id='Morrison2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Toward automatic censorship detection in microblogs
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://arxiv.org/pdf/1402.5310v2.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Morrison2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2706'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Morrison2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Donn Morrison
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Data Mining in Social Networks</span>, 2014
|
||
</span>
|
||
</li><li id='Nobori2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/nsdi14/nsdi14-paper-nobori.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nobori2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2723'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nobori2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Daiyuu Nobori, Yasushi Shinjo
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Networked Systems Design and Implementation</span>, 2014, USENIX
|
||
</span>
|
||
</li><li id='Roos2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Measuring Freenet in the Wild: Censorship-resilience under Observation
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/2014/papers/paper_71.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Roos2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2771'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Roos2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Privacy Enhancing Technologies Symposium</span>, 2014, Springer
|
||
</span>
|
||
</li><li id='Tan2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
Censorship Resistance as a Side-Effect
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Tan2014a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Tan2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2852'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Tan2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Henry Tan, Micah Sherr
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Security Protocols</span>, 2014, Springer
|
||
</span>
|
||
</li><li id='Wachs2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://git.gnunet.org/bibliography.git/plain/docs/paper_cans2014_camera_ready.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wachs2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2906'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wachs2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Matthias Wachs, Martin Schanzenbach, Christian Grothoff
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Cryptology and Network Security</span>, 2014, Springer
|
||
</span>
|
||
</li><li id='Wustrow2014a'>
|
||
<div>
|
||
<span class="paper">
|
||
TapDance: End-to-Middle Anticensorship without Flow Blocking
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-wustrow.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wustrow2014a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L3031'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wustrow2014a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2014, USENIX
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Robinson2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.upturn.org/static/files/CollateralFreedom.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Robinson2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1040'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Robinson2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
David Robinson, Harlan Yu, Anne An
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2013
|
||
</span>
|
||
</li><li id='Das2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Self-Censorship on Facebook
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.aaai.org/ocs/index.php/ICWSM/ICWSM13/paper/viewFile/6093/6350'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Das2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1474'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Das2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sauvik Das, Adam Kramer
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Conference on Weblogs and Social Media</span>, 2013, AAAI
|
||
</span>
|
||
</li><li id='Anderson2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://arxiv.org/pdf/1306.4361v1.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Anderson2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2162'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Anderson2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Collin Anderson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2013
|
||
</span>
|
||
</li><li id='Aryan2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Internet Censorship in Iran: A First Look
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/226'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Aryan2013a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Aryan2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2200'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Aryan2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Simurgh Aryan, Homa Aryan, J. Alex Halderman
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2013, USENIX
|
||
</span>
|
||
</li><li id='Benson2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://cseweb.ucsd.edu/~kbenson/papers/tma13.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Benson2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2230'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Benson2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Karyn Benson, Alberto Dainotti, KC Claffy, Emile Aben
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Traffic Monitoring and Analysis</span>, 2013, IEEE
|
||
</span>
|
||
</li><li id='Chen2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://cbw.sh/static/pdf/weibo-cosn13.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Chen2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2285'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Chen2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Le Chen, Chi Zhang, Christo Wilson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Conference on Online Social Networks</span>, 2013, ACM
|
||
</span>
|
||
</li><li id='Dalek2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Dalek2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2343'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Dalek2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jakub Dalek, Bennett Haselton, Helmi Noman, Adam Senft, Masashi Crete-Nishihata, Phillipa Gill, Ronald J. Deibert
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2013, ACM
|
||
</span>
|
||
</li><li id='Detal2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Revealing Middlebox Interference with Tracebox
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Detal2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2368'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Detal2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2013, ACM
|
||
</span>
|
||
</li><li id='Dyer2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Protocol Misidentification Made Easy with Format-Transforming Encryption
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://eprint.iacr.org/2012/494.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Dyer2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2394'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Dyer2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2013, ACM
|
||
</span>
|
||
</li><li id='Fifield2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
OSS: Using Online Scanning Services for Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.freehaven.net/anonbib/papers/pets2013/paper_29.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Fifield2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2450'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Fifield2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
David Fifield, Gabi Nakibly, Dan Boneh
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Privacy Enhancing Technologies Symposium</span>, 2013, Springer
|
||
</span>
|
||
</li><li id='Geddes2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Geddes2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2468'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Geddes2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
John Geddes, Max Schuchard, Nicholas Hopper
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2013, ACM
|
||
</span>
|
||
</li><li id='Hasan2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Hasan2013a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Hasan2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2477'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Hasan2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Shaddi Hasan, Yahel Ben-David, Giulia Fanti, Eric Brewer, Scott Shenker
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2013, USENIX
|
||
</span>
|
||
</li><li id='Houmansadr2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://people.cs.umass.edu/~amir/papers/FreeWave.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Houmansadr2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2496'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Houmansadr2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2013, The Internet Society
|
||
</span>
|
||
</li><li id='Houmansadr2013b'>
|
||
<div>
|
||
<span class="paper">
|
||
The Parrot is Dead: Observing Unobservable Network Communications
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://github.com/net4people/bbs/issues/244'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||
<a href='https://people.cs.umass.edu/~amir/papers/parrot.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Houmansadr2013b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2505'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Houmansadr2013b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Symposium on Security & Privacy</span>, 2013, IEEE
|
||
</span>
|
||
</li><li id='Invernizzi2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Message In A Bottle: Sailing Past Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://sites.cs.ucsb.edu/~chris/research/doc/acsac13_message.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Invernizzi2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2524'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Invernizzi2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Annual Computer Security Applications Conference</span>, 2013, ACM
|
||
</span>
|
||
</li><li id='Khattak2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Khattak2013a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Khattak2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2569'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Khattak2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2013, USENIX
|
||
</span>
|
||
</li><li id='Nabi2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Anatomy of Web Censorship in Pakistan
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Nabi2013a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Nabi2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2714'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Nabi2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zubair Nabi
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2013, USENIX
|
||
</span>
|
||
</li><li id='Ruffing2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Identity-Based Steganography and Its Applications to Censorship Resistance
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/2013/papers/ruffing-censorship.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ruffing2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2780'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ruffing2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Tim Ruffing, Jonas Schneider, Aniket Kate
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Hot Topics in Privacy Enhancing Technologies</span>, 2013, Springer
|
||
</span>
|
||
</li><li id='Verkamp2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Verkamp2013a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Verkamp2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2888'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Verkamp2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
John-Paul Verkamp, Minaxi Gupta
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2013, USENIX
|
||
</span>
|
||
</li><li id='Wachs2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
On the Feasibility of a Censorship Resistant Decentralized Name System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://grothoff.org/christian/fps2013wachs.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wachs2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2897'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wachs2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Matthias Wachs, Martin Schanzenbach, Christian Grothoff
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Foundations & Practice of Security</span>, 2013, Springer
|
||
</span>
|
||
</li><li id='Wang2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www-users.cs.umn.edu/~hopper/rbridge_ndss13.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2943'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wang2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas J. Hopper
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2013, The Internet Society
|
||
</span>
|
||
</li><li id='Winter2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
Towards a Censorship Analyser for Tor
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Winter2013a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Winter2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2987'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Winter2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Philipp Winter
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2013, USENIX
|
||
</span>
|
||
</li><li id='Winter2013b'>
|
||
<div>
|
||
<span class="paper">
|
||
ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Winter2013b.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Winter2013b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2996'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Winter2013b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Philipp Winter, Tobias Pulls, Juergen Fuss
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2013, ACM
|
||
</span>
|
||
</li><li id='Zhou2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
SWEET: Serving the Web by Exploiting Email Tunnels
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://petsymposium.org/2013/papers/zhou-censorship.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Zhou2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L3050'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Zhou2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, Nikita Borisov
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Hot Topics in Privacy Enhancing Technologies</span>, 2013, Springer
|
||
</span>
|
||
</li><li id='Zhu2013a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.unm.edu/~crandall/usenix13.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Zhu2013a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L3059'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Zhu2013a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2013, USENIX
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Appelbaum2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Technical analysis of the Ultrasurf proxying software
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://media.torproject.org/misc/2012-04-16-ultrasurf-analysis.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Appelbaum2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1126'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Appelbaum2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jacob Appelbaum
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2012
|
||
</span>
|
||
</li><li id='Aase2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resources and Motivations
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci12/foci12-final17.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Aase2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2115'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Aase2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nicholas Aase, Jedidiah R. Crandall, Álvaro Díaz, Jeffrey Knockel, Jorge Ocaña Molinero, Jared Saia, Dan Wallach, Tao Zhu
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2012, USENIX
|
||
</span>
|
||
</li><li id='Anderson2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Hidden Internet of Iran: Private Address Allocations on a National Network
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://arxiv.org/pdf/1209.6398v1.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Anderson2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2154'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Anderson2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Collin Anderson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2012
|
||
</span>
|
||
</li><li id='Sparks2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Collateral Damage of Internet Censorship by DNS Injection
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences.sigcomm.org/sigcomm/2012/paper/ccr-paper266.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Sparks2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2179'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Sparks2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sparks, Neo, Tank, Smith, Dozer
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">SIGCOMM Computer Communication Review</span>, 2012, ACM
|
||
</span>
|
||
</li><li id='Duan2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Hold-On: Protecting Against On-Path DNS Poisoning
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.albany.edu/~mariya/courses/csi516F19/papers/holdon.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Duan2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2385'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Duan2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Securing and Trusting Internet Names</span>, 2012, National Physical Laboratory
|
||
</span>
|
||
</li><li id='Fifield2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Evading Censorship with Browser-Based Proxies
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://crypto.stanford.edu/flashproxy/flashproxy.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Fifield2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2440'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Fifield2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Roger Dingledine, Phil Porras, Dan Boneh
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Privacy Enhancing Technologies Symposium</span>, 2012, Springer
|
||
</span>
|
||
</li><li id='Filasto2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
OONI: Open Observatory of Network Interference
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci12/foci12-final12.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Filasto2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2459'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Filasto2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Arturo Filastò, Jacob Appelbaum
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2012, USENIX
|
||
</span>
|
||
</li><li id='King2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
How Censorship in China Allows Government Criticism but Silences Collective Expression
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://gking.harvard.edu/files/censored.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/King2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2598'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#King2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Gary King, Jennifer Pan, Margaret E. Roberts
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">American Political Science Review</span>, 2012
|
||
</span>
|
||
</li><li id='Lincoln2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Bootstrapping Communications into an Anti-Censorship System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Lincoln2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2634'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Lincoln2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Patrick Lincoln, Ian Mason, Phillip Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Simpson, Paul Vixie, Dan Boneh
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2012, USENIX
|
||
</span>
|
||
</li><li id='Ling2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Ling2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2643'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Ling2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zhen Ling, Xinwen Fu, Wei Yu, Junzhou Luo, Ming Yang
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">INFOCOM</span>, 2012, IEEE
|
||
</span>
|
||
</li><li id='Moghaddam2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
SkypeMorph: Protocol Obfuscation for Tor Bridges
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Moghaddam2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2697'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Moghaddam2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Hooman {Mohajeri Moghaddam}, Baiyu Li, Mohammad Derakhshani, Ian Goldberg
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2012, ACM
|
||
</span>
|
||
</li><li id='Rogers2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Secure Communication over Diverse Transports
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Rogers2012a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Rogers2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2761'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Rogers2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Michael Rogers, Eleanor Saitta
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2012, ACM
|
||
</span>
|
||
</li><li id='Schuchard2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Routing Around Decoys
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Schuchard2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2789'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Schuchard2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2012, ACM
|
||
</span>
|
||
</li><li id='Thomas2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Adapting Social Spam Infrastructure for Political Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/leet12/leet12-final13_0.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Thomas2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2861'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Thomas2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Kurt Thomas, Chris Grier, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Large-Scale Exploits and Emergent Threats</span>, 2012, USENIX
|
||
</span>
|
||
</li><li id='Vasserman2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
One-way indexing for plausible deniability in censorship resistant storage
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci12/foci12-final5.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Vasserman2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2870'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Vasserman2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2012, USENIX
|
||
</span>
|
||
</li><li id='Verkamp2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Inferring Mechanics of Web Censorship Around the World
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci12/foci12-final1.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Verkamp2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2879'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Verkamp2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
John-Paul Verkamp, Minaxi Gupta
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2012, USENIX
|
||
</span>
|
||
</li><li id='Wang2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2012a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wang2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2934'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wang2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2012, ACM
|
||
</span>
|
||
</li><li id='Weinberg2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
StegoTorus: A Camouflage Proxy for the Tor Anonymity System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.frankwang.org/files/papers/ccs2012.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Weinberg2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2961'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Weinberg2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2012, ACM
|
||
</span>
|
||
</li><li id='Winter2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
How the Great Firewall of China is Blocking Tor
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Winter2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2978'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Winter2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Philipp Winter, Stefan Lindskog
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2012, USENIX
|
||
</span>
|
||
</li><li id='Wright2012a'>
|
||
<div>
|
||
<span class="paper">
|
||
Regional Variation in Chinese Internet Filtering
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wright2012a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L3014'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wright2012a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Joss Wright
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2012
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Smits2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
BridgeSPA: Improving Tor Bridges with Single Packet Authorization
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Smits2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1992'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Smits2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2011, ACM
|
||
</span>
|
||
</li><li id='Jones2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.princeton.edu/~mfreed/docs/cor-foci11.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Jones2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2046'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Jones2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nicholas Jones, Matvey Arye, Jacopo Cesareo, Michael J. Freedman
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2011, USENIX
|
||
</span>
|
||
</li><li id='Bachrach2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
#h00t: Censorship Resistant Microblogging
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://arxiv.org/pdf/1109.6874v1.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bachrach2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2222'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bachrach2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2011
|
||
</span>
|
||
</li><li id='Bonneau2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Scrambling for lightweight censorship resistance
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://www.jbonneau.com/doc/BX11-SPW-scrambling_censorship.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Bonneau2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2239'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Bonneau2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Joseph Bonneau, Rubin Xu
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Security Protocols</span>, 2011, Springer
|
||
</span>
|
||
</li><li id='Dainotti2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Analysis of Country-wide Internet Outages Caused by Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences.sigcomm.org/imc/2011/docs/p1.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Dainotti2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2333'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Dainotti2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapè
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2011, ACM
|
||
</span>
|
||
</li><li id='Danezis2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
An anomaly-based censorship-detection system for Tor
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://research.torproject.org/techreports/detector-2011-09-09.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Danezis2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2360'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Danezis2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
George Danezis
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2011
|
||
</span>
|
||
</li><li id='Espinoza2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Automated Named Entity Extraction for Tracking Censorship of Current Events
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/legacy/events/foci11/tech/final_files/Espinoza.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Espinoza2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2412'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Espinoza2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Antonio M. Espinoza, Jedidiah R. Crandall
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2011, USENIX
|
||
</span>
|
||
</li><li id='Houmansadr2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://people.cs.umass.edu/~amir/papers/CCS11-Cirripede.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Houmansadr2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2486'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Houmansadr2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2011, ACM
|
||
</span>
|
||
</li><li id='Karlin2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Decoy Routing: Toward Unblockable Internet Communication
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/legacy/events/foci11/tech/final_files/Karlin.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Karlin2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2551'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Karlin2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, W. Timothy Strayer
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2011, USENIX
|
||
</span>
|
||
</li><li id='Kathuria2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Bypassing Internet Censorship for News Broadcasters
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/legacy/events/foci11/tech/final_files/Kathuria.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Kathuria2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2560'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Kathuria2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Karl Kathuria
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2011, USENIX
|
||
</span>
|
||
</li><li id='Knockel2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/legacy/events/foci11/tech/final_files/Knockel.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Knockel2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2606'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Knockel2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2011, USENIX
|
||
</span>
|
||
</li><li id='Liu2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Tor Instead of IP
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Liu2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2652'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Liu2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Vincent Liu, Seungyeop Han, Arvind Krishnamurthy, Thomas Anderson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Hot Topics in Networks</span>, 2011, ACM
|
||
</span>
|
||
</li><li id='McCoy2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Proximax: A Measurement Based System for Proxies Dissemination
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://cseweb.ucsd.edu/~klevchen/mml-fc11.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/McCoy2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2688'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#McCoy2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Damon McCoy, Jose Andre Morales, Kirill Levchenko
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Financial Cryptography and Data Security</span>, 2011, Springer
|
||
</span>
|
||
</li><li id='Roberts2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Mapping Local Internet Control
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://cyber.law.harvard.edu/netmaps/mlic_20110513.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Roberts2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2752'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Roberts2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Hal Roberts, David Larochelle, Rob Faris, John Palfrey
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer Communications Workshop</span>, 2011, IEEE
|
||
</span>
|
||
</li><li id='Seltzer2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Infrastructures of Censorship and Lessons from Copyright Resistance
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/legacy/events/foci11/tech/final_files/Seltzer.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Seltzer2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2798'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Seltzer2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Wendy Seltzer
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2011, USENIX
|
||
</span>
|
||
</li><li id='Sfakianakis2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
CensMon: A Web Censorship Monitor
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/legacy/events/foci11/tech/final_files/Sfakianakis.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Sfakianakis2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2817'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Sfakianakis2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Andreas Sfakianakis, Elias Athanasopoulos, Sotiris Ioannidis
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2011, USENIX
|
||
</span>
|
||
</li><li id='Shklovski2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Shklovski2011a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Shklovski2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2826'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Shklovski2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Irina Shklovski, Nalini P. Kotamraju
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">CHI</span>, 2011, ACM
|
||
</span>
|
||
</li><li id='Wiley2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Dust: A Blocking-Resistant Internet Transport Protocol
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://censorbib.nymity.ch/pdf/Wiley2011a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wiley2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2970'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wiley2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Brandon Wiley
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2011
|
||
</span>
|
||
</li><li id='Wright2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/legacy/events/foci11/tech/final_files/Wright.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wright2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L3005'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wright2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Joss Wright, Tulio de Souza, Ian Brown
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Free and Open Communications on the Internet</span>, 2011, USENIX
|
||
</span>
|
||
</li><li id='Wustrow2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Telex: Anticensorship in the Network Infrastructure
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wustrow2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L3022'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wustrow2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2011, USENIX
|
||
</span>
|
||
</li><li id='Xu2011a'>
|
||
<div>
|
||
<span class="paper">
|
||
Internet Censorship in China: Where Does the Filtering Occur?
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Xu2011a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L3040'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Xu2011a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Xueyang Xu, Z. Morley Mao, J. Alex Halderman
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Passive and Active Measurement Conference</span>, 2011, Springer
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Pfitzmann2010a'>
|
||
<div>
|
||
<span class="paper">
|
||
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Pfitzmann2010a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1666'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Pfitzmann2010a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Andreas Pfitzmann, Marit Hansen
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2010
|
||
</span>
|
||
</li><li id='Burnett2010a'>
|
||
<div>
|
||
<span class="paper">
|
||
Chipping Away at Censorship Firewalls with User-Generated Content
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Burnett2010a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2257'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Burnett2010a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sam Burnett, Nick Feamster, Santosh Vempala
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2010, USENIX
|
||
</span>
|
||
</li><li id='Mahdian2010a'>
|
||
<div>
|
||
<span class="paper">
|
||
Fighting Censorship with Algorithms
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Mahdian2010a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Mahdian2010a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2678'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Mahdian2010a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Mohammad Mahdian
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">International Conference on Fun with Algorithms</span>, 2010, Springer
|
||
</span>
|
||
</li><li id='Park2010a'>
|
||
<div>
|
||
<span class="paper">
|
||
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.unm.edu/~crandall/icdcs2010.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Park2010a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2732'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Park2010a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jong Chun Park, Jedidiah R. Crandall
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Distributed Computing Systems</span>, 2010, IEEE
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='McLachlan2009a'>
|
||
<div>
|
||
<span class="paper">
|
||
On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking resistance design
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www-users.cs.umn.edu/~hopper/surf_and_serve.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/McLachlan2009a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1492'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#McLachlan2009a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jon McLachlan, Nicholas Hopper
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2009, ACM
|
||
</span>
|
||
</li><li id='Backes2009a'>
|
||
<div>
|
||
<span class="paper">
|
||
Anonymity and Censorship Resistance in Unstructured Overlay Networks
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Backes2009a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Backes2009a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2086'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Backes2009a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">On the Move to Meaningful Internet Systems</span>, 2009, Springer
|
||
</span>
|
||
</li><li id='Cao2009a'>
|
||
<div>
|
||
<span class="paper">
|
||
SkyF2F: Censorship Resistant via Skype Overlay Network
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Cao2009a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Cao2009a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2266'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Cao2009a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Shoufeng Cao, Longtao He, Zhongxian Li, Yixian Yang
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">International Conference on Information Engineering</span>, 2009, IEEE
|
||
</span>
|
||
</li><li id='Weaver2009a'>
|
||
<div>
|
||
<span class="paper">
|
||
Detecting Forged TCP Reset Packets
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.ndss-symposium.org/wp-content/uploads/2017/09/weav.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Weaver2009a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2952'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Weaver2009a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nicholas Weaver, Robin Sommer, Vern Paxson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Network and Distributed System Security</span>, 2009, The Internet Society
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Aycock2008a'>
|
||
<div>
|
||
<span class="paper">
|
||
“Good” Worms and Human Rights
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Aycock2008a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2210'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Aycock2008a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
John Aycock, Alana Maurushat
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In: <span class="venue">SIGCAS Computers & Society</span>, 2008, ACM
|
||
</span>
|
||
</li><li id='Sovran2008a'>
|
||
<div>
|
||
<span class="paper">
|
||
Pass it on: Social Networks Stymie Censors
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.toronto.edu/iptps2008/final/73.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Sovran2008a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2835'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Sovran2008a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Yair Sovran, Alana Libonati, Jinyang Li
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">International Workshop on Peer-to-Peer Systems</span>, 2008, USENIX
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Crandall2007a'>
|
||
<div>
|
||
<span class="paper">
|
||
ConceptDoppler: A Weather Tracker for Internet Censorship
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://www.csd.uoc.gr/~hy558/papers/conceptdoppler.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Crandall2007a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2323'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Crandall2007a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, Rich East
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2007, ACM
|
||
</span>
|
||
</li><li id='Lowe2007a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Great DNS Wall of China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Lowe2007a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Lowe2007a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2661'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Lowe2007a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Graham Lowe, Patrick Winters, Michael L. Marcus
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2007
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Wolfgarten2006a'>
|
||
<div>
|
||
<span class="paper">
|
||
Investigating large-scale Internet content filtering
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.133.5778&rep=rep1&type=pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Wolfgarten2006a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1658'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Wolfgarten2006a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Sebastian Wolfgarten
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2006
|
||
</span>
|
||
</li><li id='Clayton2006a'>
|
||
<div>
|
||
<span class="paper">
|
||
Ignoring the Great Firewall of China
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cl.cam.ac.uk/~rnc1/ignoring.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Clayton2006a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2294'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Clayton2006a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Privacy Enhancing Technologies</span>, 2006, Springer
|
||
</span>
|
||
</li><li id='Clayton2006b'>
|
||
<div>
|
||
<span class="paper">
|
||
Failures in a Hybrid Content Blocking System
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Clayton2006b.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2304'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Clayton2006b'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Richard Clayton
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Privacy Enhancing Technologies</span>, 2006, Springer
|
||
</span>
|
||
</li><li id='Dingledine2006a'>
|
||
<div>
|
||
<span class="paper">
|
||
Design of a blocking-resistant anonymity system
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://svn.torproject.org/svn/projects/design-paper/blocking.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Dingledine2006a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2377'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Dingledine2006a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Roger Dingledine, Nick Mathewson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2006
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Perng2005a'>
|
||
<div>
|
||
<span class="paper">
|
||
Censorship Resistance Revisited
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Perng2005a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Perng2005a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2742'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Perng2005a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ginger Perng, Michael K. Reiter, Chenxi Wang
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">International Conference on Information Hiding</span>, 2005, Springer
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Danezis2004a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Economics of Censorship Resistance
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Danezis2004a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2352'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Danezis2004a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
George Danezis, Ross Anderson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Economics and Information Security</span>, 2004
|
||
</span>
|
||
</li><li id='Koepsell2004a'>
|
||
<div>
|
||
<span class="paper">
|
||
How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Koepsell2004a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Koepsell2004a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2615'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Koepsell2004a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Stefan Köpsell, Ulf Hillig
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</span>, 2004, ACM
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Dornseif2003a'>
|
||
<div>
|
||
<span class="paper">
|
||
Government mandated blocking of foreign Web content
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Dornseif2003a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Dornseif2003a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1684'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Dornseif2003a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Maximillian Dornseif
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">DFN-Arbeitstagung über Kommunikationsnetze</span>, 2003, Gesellschaft für Informatik
|
||
</span>
|
||
</li><li id='Feamster2003a'>
|
||
<div>
|
||
<span class="paper">
|
||
Thwarting Web Censorship with Untrusted Messenger Discovery
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://nms.csail.mit.edu/papers/disc-pet2003.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Feamster2003a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2430'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Feamster2003a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nick Feamster, Magdalena Balazinska, Winston Wang, Hari Balakrishnan, David Karger
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Privacy Enhancing Technologies</span>, 2003, Springer
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Feamster2002a'>
|
||
<div>
|
||
<span class="paper">
|
||
Infranet: Circumventing Web Censorship and Surveillance
|
||
</span>
|
||
<span class="icons">
|
||
<a href='http://wind.lcs.mit.edu/papers/usenixsec2002.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Feamster2002a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2421'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Feamster2002a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2002, USENIX
|
||
</span>
|
||
</li><li id='Serjantov2002a'>
|
||
<div>
|
||
<span class="paper">
|
||
Anonymizing Censorship Resistant Systems
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://censorbib.nymity.ch/pdf/Serjantov2002a.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Serjantov2002a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2807'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Serjantov2002a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Andrei Serjantov
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">International Workshop on Peer-To-Peer Systems</span>, 2002, Springer
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Stubblefield2001a'>
|
||
<div>
|
||
<span class="paper">
|
||
Dagster: Censorship-Resistant Publishing Without Replication
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Stubblefield2001a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2844'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Stubblefield2001a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Adam Stubblefield, Dan S. Wallach
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
2001
|
||
</span>
|
||
</li><li id='Waldman2001a'>
|
||
<div>
|
||
<span class="paper">
|
||
Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cs.nyu.edu/~waldman/tangler.ps'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Waldman2001a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2924'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Waldman2001a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Marc Waldman, David Mazières
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Computer and Communications Security</span>, 2001, ACM
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Waldman2000a'>
|
||
<div>
|
||
<span class="paper">
|
||
Publius: A robust, tamper-evident, censorship-resistant web publishing system
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.usenix.org/legacy/events/sec2000/waldman/waldman.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Waldman2000a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2915'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Waldman2000a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2000, USENIX
|
||
</span>
|
||
</li></ul>
|
||
<ul>
|
||
<li id='Anderson1996a'>
|
||
<div>
|
||
<span class="paper">
|
||
The Eternity Service
|
||
</span>
|
||
<span class="icons">
|
||
<a href='https://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf'>
|
||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||
</a>
|
||
<a href='https://censorbib.nymity.ch/pdf/Anderson1996a.pdf'>
|
||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||
</a>
|
||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L2144'>
|
||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||
</a>
|
||
<a href='#Anderson1996a'>
|
||
<img class="icon" title="Link to paper" src="assets/link-icon.svg" alt="Paper link icon">
|
||
</a>
|
||
</span>
|
||
</div>
|
||
<div>
|
||
<span class="author">
|
||
Ross J. Anderson
|
||
</span>
|
||
</div>
|
||
<span class="other">
|
||
In Proc. of: <span class="venue">Theory and Applications of Cryptology</span>, 1996, CTU Publishing House
|
||
</span>
|
||
</li></ul>
|
||
</div>
|
||
<div id="footer">
|
||
Icons taken without modification from
|
||
<a href="https://fontawesome.com/license">Font Awesome</a>.
|
||
</div>
|
||
|
||
</body>
|
||
</html> |