-
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION
Sebastian Zillien, Tobias Schmidbauer, Mario Kubek, Jörg Keller, Steffen Wendzel
In Proc. of: Asia CCS, 2024, ACM
-
Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape
Diwen Xue, Anna Ablove, Reethika Ramesh, Grace Kwak Danciu, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2024, USENIX
-
SpotProxy: Rediscovering the Cloud for Censorship Circumvention
Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung
In Proc. of: USENIX Security Symposium, 2024, USENIX
-
Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy
In: Privacy Enhancing Technologies, 2024
-
Automatic Generation of Web Censorship Probe Lists
Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin
In: Privacy Enhancing Technologies, 2024
-
Extended Abstract: The Impact of Online Censorship on LLMs
Mohamed Ahmed, Jeffrey Knockel
In Proc. of: Free and Open Communications on the Internet, 2024
-
Extended Abstract: Leveraging Large Language Models to Identify Internet Censorship through Network Data
Tianyu Gao, Ping Ji
In Proc. of: Free and Open Communications on the Internet, 2024
-
Toward Automated DNS Tampering Detection Using Machine Learning
Paola Calle, Larissa Savitsky, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Shinyoung Cho
In Proc. of: Free and Open Communications on the Internet, 2024
-
Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention
Michael Pu, Andrew Wang, Anthony Chang, Kieran Quan, Yi Wei Zhou
In Proc. of: Free and Open Communications on the Internet, 2024
-
Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels
Afonso Vilalonga, João S. Resende, Henrique Domingos
In Proc. of: Free and Open Communications on the Internet, 2024
-
Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burdens
Paul Vines
In Proc. of: Free and Open Communications on the Internet, 2024
-
Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling
Philipp Müller, Niklas Niere, Felix Lange, Juraj Somorovsky
In Proc. of: Free and Open Communications on the Internet, 2024
-
Detecting VPN Traffic through Encapsulated TCP Behavior
Michelina Hanlon, Gerry Wan, Anna Ascheman, Zakir Durumeric
In Proc. of: Free and Open Communications on the Internet, 2024
-
Analyzing Prominent Mobile Apps in Latin America
Beau Kujath, Jeffrey Knockel, Paul Aguilar, Diego Morabito, Masashi Crete-Nishihata, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2024
-
Lost in Translation: Characterizing Automated Censorship in Online Translation Services
Samuel Ruo, Jeffrey Knockel, Zoë Reichert
In Proc. of: Free and Open Communications on the Internet, 2024
-
Identifying VPN Servers through Graph-Represented Behaviors
Chenxu Wang, Jiangyi Yin, Zhao Li, Hongbo Xu, Zhongyi Zhang, Qingyun Liu
In Proc. of: The International World Wide Web Conference, 2024, ACM
-
GFWeb: Measuring the Great Firewall’s Web Censorship at Scale
Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster
In Proc. of: USENIX Security Symposium, 2024, USENIX
-
Digital Repression in Palestine
Ghadeer Awwad, Kentaro Toyama
In Proc. of: CHI, 2024, ACM
-
How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censorship by Local Governments in China
Tony Huiquan Zhang, Jianhua Xu, Jinjin Liu
In: The China Quarterly, 2024, SOAS University of London
-
Snowflake, a censorship circumvention system using temporary WebRTC proxies
Cecylia Bocovich, Arlo Breault, David Fifield, Serene, Xiaokang Wang
In Proc. of: USENIX Security Symposium, 2024, USENIX
-
Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments
Soo-Jin Moon, Milind Srivastava, Yves Bieri, Ruben Martins, Vyas Sekar
In Proc. of: Symposium on Security & Privacy, 2024, IEEE
-
Out in the Open: On the Implementation of Mobile App Filtering in India
Devashish Gosain, Kartikey Singh, Rishi Sharma, Jithin S, Sambuddho Chakravaty
In Proc. of: Passive and Active Measurement Conference, 2024, Springer
-
Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy
In: Privacy Enhancing Technologies, 2024
-
Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model
Sultan Almutairi, Yogev Neumann, Khaled Harfoush
In Proc. of: Consumer Communications & Networking Conference, 2024, IEEE
-
Modeling and Detecting Internet Censorship Events
Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi
In Proc. of: Network and Distributed System Security, 2024, The Internet Society
-
Internet Sanctions on Russian Media: Actions and Effects
John Kristoff, Moritz Müller, Arturo Filastò, Max Resing, Chris Kanich, Niels ten Oever
In Proc. of: Free and Open Communications on the Internet, 2024
-
Bleeding Wall: A Hematologic Examination on the Great Firewall
Sakamoto, Elson Wedwards
In Proc. of: Free and Open Communications on the Internet, 2024
-
Just add WATER: WebAssembly-based Circumvention Transports
Erik Chi, Gaukas Wang, J. Alex Halderman, Eric Wustrow, Jack Wampler
In Proc. of: Free and Open Communications on the Internet, 2024
-
Extended Abstract: Traffic Splitting for Pluggable Transports
Anna Harbluk Lorimer, Rob Jansen, Nick Feamster
In Proc. of: Free and Open Communications on the Internet, 2024
-
Extended Abstract: Oscur0: One-shot Circumvention without Registration
Mingye Chen, Jack Wampler, Abdulrahman Alaraj, Gaukas Wang, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2024
-
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2024, USENIX
-
NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge
Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich
In Proc. of: Symposium on Security & Privacy, 2024, IEEE
-
On Precisely Detecting Censorship Circumvention in Real-World Networks
Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen
In Proc. of: Network and Distributed System Security, 2024, The Internet Society
-
Discop: Provably secure steganography in practice based on “distribution copies”
Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, Nenghai Yu
In Proc. of: Symposium on Security & Privacy, 2023, IEEE
-
Poster: Circumventing the GFW with TLS Record Fragmentation
Niklas Niere, Sven Hebrok, Juraj Somorovsky, Robert Merget
In Proc. of: Computer and Communications Security, 2023, ACM
-
Website blocking in the European Union: Network interference from the perspective of Open Internet
Vasilis Ververis, Lucas Lasota, Tatiana Ermakova, Benjamin Fabian
In: Policy & Internet, 2023
-
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
David Fifield
2023
-
Destination Unreachable: Characterizing Internet Outages and Shutdowns
Zachary S. Bischof, Kennedy Pitcher, Esteban Carisimo, Amanda Meng, Rafael Bezerra Nunes, Ramakrishna Padmanabhan, Margaret E. Roberts, Alex C. Snoeren, Alberto Dainotti
In Proc. of: SIGCOMM, 2023, ACM
-
Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran
In Proc. of: Knowledge Discovery And Data Mining, 2023, ACM
-
A Study of China’s Censorship and Its Evasion Through the Lens of Online Gaming
Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar
In Proc. of: USENIX Security Symposium, 2023, USENIX
-
DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang
In Proc. of: USENIX Security Symposium, 2023, USENIX
-
TELEPATH: A Minecraft-based Covert Communication System
Zhen Sun, Vitaly Shmatikov
In Proc. of: Symposium on Security & Privacy, 2023, IEEE
-
Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation
Mizhang Streisand, Eric Wustrow, Amir Houmansadr
In Proc. of: Free and Open Communications on the Internet, 2023
-
Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law
Mona Wang, Jonathan Mayer
In Proc. of: Free and Open Communications on the Internet, 2023
-
A Worldwide View of Nation-state Internet Censorship
Alexander Master, Christina Garman
In Proc. of: Free and Open Communications on the Internet, 2023
-
The Use of Push Notification in Censorship Circumvention
Diwen Xue, Roya Ensafi
In Proc. of: Free and Open Communications on the Internet, 2023
-
Measuring and Evading Turkmenistan’s Internet Censorship
Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin
In Proc. of: The International World Wide Web Conference, 2023, ACM
-
Detecting Network Interference Without Endpoint Participation
Sadia Nourin, Kevin Bock, Nguyen Phong Hoang, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2023
-
Running a high-performance pluggable transports Tor bridge
David Fifield, Linus Nordberg
In Proc. of: Free and Open Communications on the Internet, 2023
-
Towards a Comprehensive Understanding of Russian Transit Censorship
Aaron Ortwein, Kevin Bock, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2023
-
Proteus: Programmable Protocols for Censorship Circumvention
Ryan Wails, Rob Jansen, Aaron Johnson, Micah Sherr
In Proc. of: Free and Open Communications on the Internet, 2023
-
Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
Watson Jia, Joseph Eichenhofer, Liang Wang, Prateek Mittal
In Proc. of: Free and Open Communications on the Internet, 2023
-
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies
Nhi Tran, Kevin Bock, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2023
-
Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom
Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2023, USENIX
-
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
In Proc. of: USENIX Security Symposium, 2023, USENIX
-
Lox: Protecting the Social Graph in Bridge Distribution
Lindsey Tulloch, Ian Goldberg
In: Privacy Enhancing Technologies, 2023
-
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty
In: Privacy Enhancing Technologies, 2023
-
CensorWatch: On the Implementation of Online Censorship in India
Divyank Katira, Gurshabad Grover, Kushagra Singh, Varun Bansal
In Proc. of: Free and Open Communications on the Internet, 2023
-
Chasing Shadows: A security analysis of the ShadowTLS proxy
Gaukas Wang, Anonymous, Jackson Sippe, Hai Chi, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2023
-
Security Notions for Fully Encrypted Protocols
Ellis Fenske, Aaron Johnson
In Proc. of: Free and Open Communications on the Internet, 2023
-
Advancing the Art of Censorship Data Analysis
Ram Sundara Raman, Apurva Virkud, Sarah Laplante, Vinicius Fortuna, Roya Ensafi
In Proc. of: Free and Open Communications on the Internet, 2023
-
Global, Passive Detection of Connection Tampering
Ram Sundara Raman, Louis-Henri Merino, Kevin Bock, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta
In Proc. of: SIGCOMM, 2023, ACM
-
In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolvers over Space and Time
Yanan Cheng, Yali Liu, Chao Li, Zhaoxin Zhang, Ning Li, Yuejin Du
In: Electronics, 2022, MDPI
-
Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models
Asim Waheed, Sara Qunaibi, Diogo Barradas, Zachary Weinberg
In Proc. of: Workshop on Privacy in the Electronic Society, 2022, ACM
-
Network Measurement Methods for Locating and Examining Censorship Devices
Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan Mayer, Roya Ensafi
In Proc. of: Emerging Networking Experiments and Technologies, 2022, ACM
-
TSPU: Russia’s Decentralized Censorship System
Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2022, ACM
-
Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
Abhishek Bhaskar, Paul Pearce
In Proc. of: USENIX Security Symposium, 2022, USENIX
-
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies
Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin
In Proc. of: USENIX Security Symposium, 2022, USENIX
-
OpenVPN is Open to VPN Fingerprinting
Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2022, USENIX
-
Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
Gabriel Figueira, Diogo Barradas, Nuno Santos
In Proc. of: Asia CCS, 2022, ACM
-
COVID-19 increased censorship circumvention and access to sensitive topics in China
Keng-Chi Chang, William R. Hobbs, Margaret E. Roberts, Zachary C. Steinert-Threlkeld
In: PNAS, 2022, National Academy of Sciences
-
Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering
Nguyen Phong Hoang, Michalis Polychronakis, Phillipa Gill
In Proc. of: Passive and Active Measurement Conference, 2022, Springer
-
Understanding Internet Censorship in Europe: The Case of Spain
Vasilis Ververis, Tatiana Ermakova, Marios Isaakidis, Simone Basso, Benjamin Fabian, Stefania Milan
In Proc. of: Web Science Conference, 2021, ACM
-
OUStralopithecus: Overt User Simulation for Censorship Circumvention
Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg
In Proc. of: Workshop on Privacy in the Electronic Society, 2021, ACM
-
Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty
In Proc. of: Asia CCS, 2021, ACM
-
Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China
Raymond Rambert, Zachary Weinberg, Diogo Barradas, Nicolas Christin
In Proc. of: WWW, 2021, ACM
-
Meteor: Cryptographically Secure Steganography for Realistic Distributions
Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin
In Proc. of: Computer and Communications Security, 2021, ACM
-
Throttling Twitter: an emerging censorship technique in Russia
Diwen Xue, Reethika Ramesh, ValdikSS, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2021, ACM
-
Web censorship measurements of HTTP/3 over QUIC
Kathrin Elmenhorst, Bertram Schütz, Nils Aschenbruck, Simone Basso
In Proc. of: Internet Measurement Conference, 2021, ACM
-
Measuring DoT/DoH blocking using OONI Probe: a preliminary study
Simone Basso
In Proc. of: DNS Privacy Workshop, 2021, The Internet Society
-
A multi-perspective view of Internet censorship in Myanmar
Ramakrishna Padmanabhan, Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Doug Madory, Molly Roberts, Alberto Dainotti
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
Measuring QQMail’s Automated Email Censorship in China
Jeffrey Knockel, Lotus Ruan
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels
Carmen Kwan, Paul Janiszewski, Shela Qiu, Cathy Wang, Cecylia Bocovich
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes
Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
BlindTLS: Circumventing TLS-Based HTTPS Censorship
Sambhav Satija, Rahul Chatterjee
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications
Mingkui Wei
In Proc. of: USENIX Security Symposium, 2021, USENIX
-
Weaponizing Middleboxes for TCP Reflected Amplification
Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
In Proc. of: USENIX Security Symposium, 2021, USENIX
-
How Great is the Great Firewall? Measuring China’s DNS Censorship
Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis
In Proc. of: USENIX Security Symposium, 2021, USENIX
-
Balboa: Bobbing and Weaving around Network Censorship
Marc B. Rosen, James Parker, Alex J. Malozemoff
In Proc. of: USENIX Security Symposium, 2021, USENIX
-
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin
In Proc. of: Workshop on Offensive Technologies, 2021, IEEE
-
Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs
Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty
In: Privacy Enhancing Technologies, 2021, Sciendo
-
Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels
Diogo Barradas, Nuno Santos
In Proc. of: Distributed Infrastructure for Common Good, 2020, ACM
-
Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC
Diogo Barradas, Nuno Santos, Luís Rodrigues, Vítor Nunes
In Proc. of: Computer and Communications Security, 2020, ACM
-
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi
In Proc. of: Computer and Communications Security, 2020, ACM
-
How China Detects and Blocks Shadowsocks
Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr
In Proc. of: Internet Measurement Conference, 2020, ACM
-
Investigating Large Scale HTTPS Interception in Kazakhstan
Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2020, ACM
-
Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin
In Proc. of: SIGCOMM, 2020, ACM
-
MIMIQ: Masking IPs with Migration in QUIC
Yashodhar Govil, Liang Wang, Jennifer Rexford
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia
Fatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior
Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Slitheen++: Stealth TLS-based Decoy Routing
Benedikt Birtel, Christian Rossow
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter
Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Turbo Tunnel, a good way to design censorship circumvention protocols
David Fifield
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
HTTPT: A Probe-Resistant Proxy
Sergey Frolov, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
How India Censors the Web
Kushagra Singh, Gurshabad Grover, Varun Bansal
In Proc. of: Web Science, 2020, ACM
-
Characterizing Transnational Internet Performance and the Great Bottleneck of China
Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Haixin Duan
In: Measurement and Analysis of Computing Systems, 2020, ACM
-
SiegeBreaker: An SDN Based Practical Decoy Routing System
Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, H. B. Acharya, Sambuddho Chakravarty
In: Privacy Enhancing Technologies, 2020, Sciendo
-
Running Refraction Networking for Real
Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow
In: Privacy Enhancing Technologies, 2020, Sciendo
-
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
In: Privacy Enhancing Technologies, 2020, Sciendo
-
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill
In Proc. of: Symposium on Security & Privacy, 2020, IEEE
-
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery
Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
Detecting Probe-resistant Proxies
Sergey Frolov, Jack Wampler, Eric Wustrow
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
Measuring the Deployment of Network Censorship Filters at Global Scale
Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
Decentralized Control: A Case Study of Russia
Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
Protocol Proxy: An FTE-based covert channel
Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard Brooks
In: Computers & Security, 2020, Elsevier
-
Conjure: Summoning Proxies from Unused Address Space
Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow
In Proc. of: Computer and Communications Security, 2019, ACM
-
Geneva: Evolving Censorship Evasion Strategies
Kevin Bock, George Hughey, Xiao Qiang, Dave Levin
In Proc. of: Computer and Communications Security, 2019, ACM
-
Distributed Detection of Tor Directory Authorities Censorship in Mexico
Gunnar Eyal Wolf Iszaevich
In Proc. of: International Conference on Networks, 2019, IARIA
-
Shedding Light on Mobile App Store Censorship
Vasilis Ververis, Marios Isaakidis, Valentin Weber, Benjamin Fabian
In Proc. of: User Modeling, Adaptation and Personalization, 2019, ACM
-
Improving Meek With Adversarial Techniques
Steven R. Sheffey, Ferrol Aderholdt
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
-
On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention
Zimo Chai, Amirhossein Ghafari, Amir Houmansadr
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
-
An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message
Ruohan Xiong, Jeffrey Knockel
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
-
Measuring I2P Censorship at a Global Scale
Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
-
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags
In Proc. of: Network and Distributed System Security, 2019, The Internet Society
-
The use of TLS in Censorship Circumvention
Sergey Frolov, Eric Wustrow
In Proc. of: Network and Distributed System Security, 2019, The Internet Society
-
On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship
Joss Wright, Alexander Darer, Oliver Farnan
In Proc. of: Web Science, 2018, ACM
-
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty
In Proc. of: Internet Measurement Conference, 2018, ACM
-
403 Forbidden: A Global View of CDN Geoblocking
Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2018, ACM
-
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis
In Proc. of: Internet Measurement Conference, 2018, ACM
-
Secure asymmetry and deployability for decoy routing systems
Cecylia Bocovich, Ian Goldberg
In: Privacy Enhancing Technologies, 2018, De Gruyter Open
-
Effective Detection of Multimedia Protocol Tunneling using Machine Learning
Diogo Barradas, Nuno Santos, Luís Rodrigues
In Proc. of: USENIX Security Symposium, 2018, USENIX
-
Quack: Scalable Remote Measurement of Application-Layer Censorship
Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2018, USENIX
-
Incentivizing Censorship Measurements via Circumvention
Aqib Nisar, Aqsa Kashaf, Ihsan Ayyub Qazi, Zartash Afzal Uzmi
In Proc. of: SIGCOMM, 2018, ACM
-
Analyzing China’s Blocking of Unpublished Tor Bridges
Arun Dunna, Ciarán O’Brien, Phillipa Gill
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
Victoria Manfredi, Pi Songkuntham
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
An analysis of automatic image filtering on WeChat Moments
Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
Automatically Generating a Large, Culture-Specific Blocklist for China
Austin Hounsel, Prateek Mittal, Nick Feamster
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
How Sudden Censorship Can Increase Access to Information
William R. Hobbs, Margaret E. Roberts
In: American Political Science Review, 2018, Cambridge University Press
-
Detecting Censorable Content on Sina Weibo: A Pilot Study
Kei Yin Ng, Anna Feldman, Chris Leberknight
In Proc. of: Hellenic Conference on Artificial Intelligence, 2018, ACM
-
Proof-of-Censorship: Enabling centralized censorship-resistant content providers
Ian Martiny, Ian Miers, Eric Wustrow
In Proc. of: Financial Cryptography and Data Security, 2018, Springer
-
The Devil’s in The Details: Placing Decoy Routers in the Internet
Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, H. B. Acharya
In Proc. of: ACSAC, 2017, ACM
-
Lavinia: An audit-payment protocol for censorship-resistant storage
Cecylia Bocovich, John A. Doucette, Ian Goldberg
In Proc. of: Financial Cryptography and Data Security, 2017, Springer
-
The Random Forest based Detection of Shadowsock’s Traffic
Ziye Deng, Zihan Liu, Zhouguo Chen, Yubin Guo
In Proc. of: Intelligent Human-Machine Systems and Cybernetics, 2017, IEEE
-
DeTor: Provably Avoiding Geographic Regions in Tor
Zhihao Li, Stephen Herwig, Dave Levin
In Proc. of: USENIX Security Symposium, 2017, USENIX
-
Mending Wall: On the Implementation of Censorship in India
Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty
In Proc. of: SecureComm, 2017, Springer
-
Online Advertising under Internet Censorship
Hira Javaid, Hafiz Kamran Khalil, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
In Proc. of: Hot Topics in Networks, 2017, ACM
-
Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Blocklisting
Vasilis Ververis, Marios Isaakidis, Chrystalleni Loizidou, Benjamin Fabian
In Proc. of: E-Democracy, 2017, Springer
-
Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue
Zhen Lu, Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson
In Proc. of: Middleware, 2017, ACM
-
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography
Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill
In Proc. of: Emerging Networking Experiments and Technologies, 2017, ACM
-
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
Milad Nasr, Hadi Zolfaghari, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2017, ACM
-
Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy
In Proc. of: Internet Measurement Conference, 2017, ACM
-
lib·erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David Choffnes, Phillipa Gill, Alan Mislove
In Proc. of: Internet Measurement Conference, 2017, ACM
-
When the Internet Goes Down in Bangladesh
Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, Neha Kumar
In Proc. of: Computer-Supported Cooperative Work and Social Computing, 2017, ACM
-
Characterizing the Nature and Dynamics of Tor Exit Blocking
Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
In Proc. of: USENIX Security Symposium, 2017, USENIX
-
Global Measurement of DNS Manipulation
Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
In Proc. of: USENIX Security Symposium, 2017, USENIX
-
FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs
Alexander Darer, Oliver Farnan, Joss Wright
In Proc. of: Network Traffic Measurement and Analysis, 2017, IFIP
-
Measuring Decentralization of Chinese Keyword Censorship via Mobile Games
Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
-
The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup
Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
-
Autosonda: Discovering Rules and Triggers of Censorship Devices
Jill Jermyn, Nicholas Weaver
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
-
An ISP-Scale Deployment of TapDance
Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
-
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
Diogo Barradas, Nuno Santos, Luís Rodrigues
In: Privacy Enhancing Technologies, 2017, De Gruyter Open
-
Topics of Controversy: An Empirical Analysis of Web Censorship Lists
Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin
In: Privacy Enhancing Technologies, 2017, De Gruyter Open
-
A Usability Evaluation of Tor Launcher
Linda Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David Wagner
In: Privacy Enhancing Technologies, 2017, De Gruyter Open
-
Augur: Internet-Wide Detection of Connectivity Disruptions
Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson
In Proc. of: Symposium on Security & Privacy, 2017, IEEE
-
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
Vahid Heydari, Sun-il Kim, Seong-Moo Yoo
In: Transactions on Information Forensics and Security, 2017, IEEE
-
Internet Censorship in Thailand: User Practices and Potential Threats
Genevieve Gebhart, Anonymous Author, Tadayoshi Kohno
In Proc. of: European Symposium on Security & Privacy, 2017, IEEE
-
Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
Srdjan Matic, Carmela Troncoso, Juan Caballero
In Proc. of: Network and Distributed System Security, 2017, The Internet Society
-
Fingerprintability of WebRTC
David Fifield, Mia Gil Epner
2016
-
Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses
Oliver Farnan, Alexander Darer, Joss Wright
In Proc. of: Workshop on Privacy in the Electronic Society, 2016, ACM
-
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
Cecylia Bocovich, Ian Goldberg
In Proc. of: Computer and Communications Security, 2016, ACM
-
Game of Decoys: Optimal Decoy Routing Through Game Theory
Milad Nasr, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2016, ACM
-
Practical Censorship Evasion Leveraging Content Delivery Networks
Hadi Zolfaghari, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2016, ACM
-
DNS-sly: Avoiding Censorship through Network Complexity
Qurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
Matryoshka: Hiding Secret Communication in Plain Sight
Iris Safaka, Christina Fragouli, Katerina Argyraki
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
GhostPost: Seamless Restoration of Censored Social Media Posts
Frederick Douglas, Matthew Caesar
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
Censors’ Delay in Blocking Circumvention Proxies
David Fifield, Lynn Tsai
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom
Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
A Framework for the Game-theoretic Analysis of Censorship Resistance
Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
-
SoK: Making Sense of Censorship Resistance Systems
Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
-
Salmon: Robust Proxy Distribution for Censorship Circumvention
Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
-
Satellite: Joint Analysis of CDNs and Network-Level Interference
Will Scott, Thomas Anderson, Tadayoshi Kohno, Arvind Krishnamurthy
In Proc. of: USENIX Annual Technical Conference, 2016, USENIX
-
Analyzing Internet Censorship in Pakistan
Giuseppe Aceto, Alessio Botta, Antonio Pescapè, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
In Proc. of: Research and Technologies for Society and Industry, 2016, IEEE
-
Leveraging Internet Services to Evade Censorship
Apostolis Zarras
In Proc. of: Information Security Conference, 2016, Springer
-
Games Without Frontiers: Investigating Video Games as a Covert Channel
Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
In Proc. of: European Symposium on Security & Privacy, 2016, IEEE
-
Mailet: Instant Social Networking under Censorship
Shuai Li, Nicholas Hopper
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
-
CovertCast: Using Live Streaming to Evade Internet Censorship
Richard McPherson, Amir Houmansadr, Vitaly Shmatikov
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
-
SkypeLine: Robust Hidden Data Transmission for VoIP
Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
In Proc. of: ASIA Computer and Communications Security, 2016, ACM
-
Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
Walid Al-Saqaf
In: Media and Communication, 2016, Cogitatio
-
SoK: Towards Grounding Censorship Circumvention in Empiricism
Michael Carl Tschantz, Sadia Afroz, Anonymous, Vern Paxson
In Proc. of: Symposium on Security & Privacy, 2016, IEEE
-
Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee
In Proc. of: SIGCOMM, 2015, ACM
-
No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement
Arvind Narayanan, Bendert Zevenbergen
In: Technology Science, 2015
-
Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
Daniel Ellard, Alden Jackson, Christine Jones, Victoria Ursula Manfredi, Timothy Strayer, Bishal Thapa, Megan Van Welie
In Proc. of: Local Computer Networks, 2015, IEEE
-
Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions
Chaya Hiruncharoenvate, Zhiyuan Lin, Eric Gilbert
In Proc. of: International Conference on Web and Social Media, 2015, AAAI
-
A Case for Marrying Censorship Measurements with Circumvention
Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
In Proc. of: Hot Topics in Networks, 2015, ACM
-
Can Censorship Measurements Be Safe(r)?
Ben Jones, Nick Feamster
In Proc. of: Hot Topics in Networks, 2015, ACM
-
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
Paul Vines, Tadayoshi Kohno
In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
-
Known Unknowns: An Analysis of Twitter Censorship in Turkey
Rima S. Tanash, Zhouhan Chen, Tanmay Thakur, Dan S. Wallach, Devika Subramanian
In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
-
Examining How the Great Firewall Discovers Hidden Circumvention Servers
Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson
In Proc. of: Internet Measurement Conference, 2015, ACM
-
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
John Holowczak, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2015, ACM
-
Seeing through Network-Protocol Obfuscation
Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: Computer and Communications Security, 2015, ACM
-
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering
Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel
In Proc. of: Ethics in Networked Systems Research, 2015, ACM
-
Understanding Internet Censorship Policy: The Case of Greece
Vasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
-
Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China
Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
-
An Analysis of China’s “Great Cannon”
Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
-
Marionette: A Programmable Network-Traffic Obfuscation System
Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton
In Proc. of: USENIX Security Symposium, 2015, USENIX
-
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
Sam Burnett, Nick Feamster
In Proc. of: SIGCOMM, 2015, ACM
-
Ethical Concerns for Censorship Measurement
Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver
In Proc. of: Ethics in Networked Systems Research, 2015, ACM
-
Analyzing the Great Firewall of China Over Space and Time
Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
In: Privacy Enhancing Technologies, 2015, De Gruyter Open
-
Blocking-resistant communication through domain fronting
David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
In: Privacy Enhancing Technologies, 2015, De Gruyter Open
-
Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data
Phillipa Gill, Masashi Crete-Nishihata, Jakub Dalek, Sharon Goldberg, Adam Senft, Greg Wiseman
In: Transactions on the Web, 2015, ACM
-
Internet Censorship detection: A survey
Giuseppe Aceto, Antonio Pescapè
In: Computer Networks, 2015, Elsevier
-
Monitoring Internet Censorship with UBICA
Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
In Proc. of: Traffic Monitoring and Analysis, 2015, Springer
-
GoHop: Personal VPN to Defend from Censorship
Yuzhi Wang, Ping Ji, Borui Ye, Pengjun Wang, Rong Luo, Huazhong Yang
In Proc. of: International Conference on Advanced Communication Technology, 2014, IEEE
-
Global Network Interference Detection over the RIPE Atlas Network
Collin Anderson, Philipp Winter, Roya
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
-
Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship
Anonymous
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
-
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
-
Censorship in the Wild: Analyzing Internet Filtering in Syria
Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar
In Proc. of: Internet Measurement Conference, 2014, ACM
-
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
-
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels
Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall
In Proc. of: Passive and Active Measurement Conference, 2014, Springer
-
No Direction Home: The True Cost of Routing Around Decoys
Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov
In Proc. of: Network and Distributed System Security, 2014, The Internet Society
-
Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
-
Automated Detection and Fingerprinting of Censorship Block Pages
Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill
In Proc. of: Internet Measurement Conference, 2014, ACM
-
A Look at the Consequences of Internet Censorship Through an ISP Lens
Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson
In Proc. of: Internet Measurement Conference, 2014, ACM
-
Reverse-engineering censorship in China: Randomized experimentation and participant observation
Gary King, Jennifer Pan, Margaret E. Roberts
In: Science, 2014, AAAS
-
Facet: Streaming over Videoconferencing for Censorship Circumvention
Shuai Li, Mike Schliep, Nick Hopper
In Proc. of: Workshop on Privacy in the Electronic Society, 2014, ACM
-
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: USENIX Security Symposium, 2014, USENIX
-
Toward automatic censorship detection in microblogs
Donn Morrison
In Proc. of: Data Mining in Social Networks, 2014
-
VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls
Daiyuu Nobori, Yasushi Shinjo
In Proc. of: Networked Systems Design and Implementation, 2014, USENIX
-
Measuring Freenet in the Wild: Censorship-resilience under Observation
Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
-
Censorship Resistance as a Side-Effect
Henry Tan, Micah Sherr
In Proc. of: Security Protocols, 2014, Springer
-
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
Matthias Wachs, Martin Schanzenbach, Christian Grothoff
In Proc. of: Cryptology and Network Security, 2014, Springer
-
TapDance: End-to-Middle Anticensorship without Flow Blocking
Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
In Proc. of: USENIX Security Symposium, 2014, USENIX
-
Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship
David Robinson, Harlan Yu, Anne An
2013
-
Self-Censorship on Facebook
Sauvik Das, Adam Kramer
In Proc. of: Conference on Weblogs and Social Media, 2013, AAAI
-
Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran
Collin Anderson
2013
-
Internet Censorship in Iran: A First Look
Simurgh Aryan, Homa Aryan, J. Alex Halderman
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation
Karyn Benson, Alberto Dainotti, KC Claffy, Emile Aben
In Proc. of: Traffic Monitoring and Analysis, 2013, IEEE
-
Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo
Le Chen, Chi Zhang, Christo Wilson
In Proc. of: Conference on Online Social Networks, 2013, ACM
-
A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship
Jakub Dalek, Bennett Haselton, Helmi Noman, Adam Senft, Masashi Crete-Nishihata, Phillipa Gill, Ronald J. Deibert
In Proc. of: Internet Measurement Conference, 2013, ACM
-
Revealing Middlebox Interference with Tracebox
Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet
In Proc. of: Internet Measurement Conference, 2013, ACM
-
Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: Computer and Communications Security, 2013, ACM
-
OSS: Using Online Scanning Services for Censorship Circumvention
David Fifield, Gabi Nakibly, Dan Boneh
In Proc. of: Privacy Enhancing Technologies Symposium, 2013, Springer
-
Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
John Geddes, Max Schuchard, Nicholas Hopper
In Proc. of: Computer and Communications Security, 2013, ACM
-
Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
Shaddi Hasan, Yahel Ben-David, Giulia Fanti, Eric Brewer, Scott Shenker
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer
In Proc. of: Network and Distributed System Security, 2013, The Internet Society
-
The Parrot is Dead: Observing Unobservable Network Communications
Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov
In Proc. of: Symposium on Security & Privacy, 2013, IEEE
-
Message In A Bottle: Sailing Past Censorship
Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
In Proc. of: Annual Computer Security Applications Conference, 2013, ACM
-
Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion
Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
The Anatomy of Web Censorship in Pakistan
Zubair Nabi
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
Identity-Based Steganography and Its Applications to Censorship Resistance
Tim Ruffing, Jonas Schneider, Aniket Kate
In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
-
Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest
John-Paul Verkamp, Minaxi Gupta
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
On the Feasibility of a Censorship Resistant Decentralized Name System
Matthias Wachs, Martin Schanzenbach, Christian Grothoff
In Proc. of: Foundations & Practice of Security, 2013, Springer
-
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas J. Hopper
In Proc. of: Network and Distributed System Security, 2013, The Internet Society
-
Towards a Censorship Analyser for Tor
Philipp Winter
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
Philipp Winter, Tobias Pulls, Juergen Fuss
In Proc. of: Workshop on Privacy in the Electronic Society, 2013, ACM
-
SWEET: Serving the Web by Exploiting Email Tunnels
Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, Nikita Borisov
In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
-
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions
Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
In Proc. of: USENIX Security Symposium, 2013, USENIX
-
Technical analysis of the Ultrasurf proxying software
Jacob Appelbaum
2012
-
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resources and Motivations
Nicholas Aase, Jedidiah R. Crandall, Álvaro Díaz, Jeffrey Knockel, Jorge Ocaña Molinero, Jared Saia, Dan Wallach, Tao Zhu
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
The Hidden Internet of Iran: Private Address Allocations on a National Network
Collin Anderson
2012
-
The Collateral Damage of Internet Censorship by DNS Injection
Sparks, Neo, Tank, Smith, Dozer
In: SIGCOMM Computer Communication Review, 2012, ACM
-
Hold-On: Protecting Against On-Path DNS Poisoning
Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li, Vern Paxson
In Proc. of: Securing and Trusting Internet Names, 2012, National Physical Laboratory
-
Evading Censorship with Browser-Based Proxies
David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Roger Dingledine, Phil Porras, Dan Boneh
In Proc. of: Privacy Enhancing Technologies Symposium, 2012, Springer
-
OONI: Open Observatory of Network Interference
Arturo Filastò, Jacob Appelbaum
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
How Censorship in China Allows Government Criticism but Silences Collective Expression
Gary King, Jennifer Pan, Margaret E. Roberts
In: American Political Science Review, 2012
-
Bootstrapping Communications into an Anti-Censorship System
Patrick Lincoln, Ian Mason, Phillip Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Simpson, Paul Vixie, Dan Boneh
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
Zhen Ling, Xinwen Fu, Wei Yu, Junzhou Luo, Ming Yang
In Proc. of: INFOCOM, 2012, IEEE
-
SkypeMorph: Protocol Obfuscation for Tor Bridges
Hooman {Mohajeri Moghaddam}, Baiyu Li, Mohammad Derakhshani, Ian Goldberg
In Proc. of: Computer and Communications Security, 2012, ACM
-
Secure Communication over Diverse Transports
Michael Rogers, Eleanor Saitta
In Proc. of: Workshop on Privacy in the Electronic Society, 2012, ACM
-
Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper
In Proc. of: Computer and Communications Security, 2012, ACM
-
Adapting Social Spam Infrastructure for Political Censorship
Kurt Thomas, Chris Grier, Vern Paxson
In Proc. of: Large-Scale Exploits and Emergent Threats, 2012, USENIX
-
One-way indexing for plausible deniability in censorship resistant storage
Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
Inferring Mechanics of Web Censorship Around the World
John-Paul Verkamp, Minaxi Gupta
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov
In Proc. of: Computer and Communications Security, 2012, ACM
-
StegoTorus: A Camouflage Proxy for the Tor Anonymity System
Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh
In Proc. of: Computer and Communications Security, 2012, ACM
-
How the Great Firewall of China is Blocking Tor
Philipp Winter, Stefan Lindskog
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
Regional Variation in Chinese Internet Filtering
Joss Wright
2012
-
BridgeSPA: Improving Tor Bridges with Single Packet Authorization
Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner
In Proc. of: Workshop on Privacy in the Electronic Society, 2011, ACM
-
Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
Nicholas Jones, Matvey Arye, Jacopo Cesareo, Michael J. Freedman
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
#h00t: Censorship Resistant Microblogging
Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright
2011
-
Scrambling for lightweight censorship resistance
Joseph Bonneau, Rubin Xu
In Proc. of: Security Protocols, 2011, Springer
-
Analysis of Country-wide Internet Outages Caused by Censorship
Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapè
In Proc. of: Internet Measurement Conference, 2011, ACM
-
An anomaly-based censorship-detection system for Tor
George Danezis
2011
-
Automated Named Entity Extraction for Tracking Censorship of Current Events
Antonio M. Espinoza, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
In Proc. of: Computer and Communications Security, 2011, ACM
-
Decoy Routing: Toward Unblockable Internet Communication
Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, W. Timothy Strayer
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Bypassing Internet Censorship for News Broadcasters
Karl Kathuria
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Vincent Liu, Seungyeop Han, Arvind Krishnamurthy, Thomas Anderson
In Proc. of: Hot Topics in Networks, 2011, ACM
-
Proximax: A Measurement Based System for Proxies Dissemination
Damon McCoy, Jose Andre Morales, Kirill Levchenko
In Proc. of: Financial Cryptography and Data Security, 2011, Springer
-
Mapping Local Internet Control
Hal Roberts, David Larochelle, Rob Faris, John Palfrey
In Proc. of: Computer Communications Workshop, 2011, IEEE
-
Infrastructures of Censorship and Lessons from Copyright Resistance
Wendy Seltzer
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
CensMon: A Web Censorship Monitor
Andreas Sfakianakis, Elias Athanasopoulos, Sotiris Ioannidis
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship
Irina Shklovski, Nalini P. Kotamraju
In Proc. of: CHI, 2011, ACM
-
Dust: A Blocking-Resistant Internet Transport Protocol
Brandon Wiley
2011
-
Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
Joss Wright, Tulio de Souza, Ian Brown
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Telex: Anticensorship in the Network Infrastructure
Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
In Proc. of: USENIX Security Symposium, 2011, USENIX
-
Internet Censorship in China: Where Does the Filtering Occur?
Xueyang Xu, Z. Morley Mao, J. Alex Halderman
In Proc. of: Passive and Active Measurement Conference, 2011, Springer