Selected Research Papers in Internet Censorship

open access logo

CensorBib is an online archive of selected research papers in the field of Internet censorship. Most papers on CensorBib approach the topic from a technical angle, by proposing designs that circumvent censorship systems, or by measuring how censorship works. The icons next to each paper make it easy to download, cite, and link to papers. If you think I missed a paper, let me know. You can sort papers by year, reverse year (default), author, and reverse author. Finally, the net4people/bbs forum has reading groups for many of the papers listed below.

onion service icon Onion service mirror
source code icon CensorBib code
update icon Last update: 2023-02-26
donate icon Donate
  • CensorWatch: On the Implementation of Online Censorship in India PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Divyank Katira, Gurshabad Grover, Kushagra Singh, Varun Bansal
    In Proc. of: Free and Open Communications on the Internet, 2023,
  • Chasing Shadows: A security analysis of the ShadowTLS proxy PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Gaukas Wang, Anonymous, Jackson Sippe, Hai Chi, Eric Wustrow
    In Proc. of: Free and Open Communications on the Internet, 2023,
  • Security Notions for Fully Encrypted Protocols PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ellis Fenske, Aaron Johnson
    In Proc. of: Free and Open Communications on the Internet, 2023,
  • Advancing the Art of Censorship Data Analysis PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ram Sundara Raman, Apurva Virkud, Sarah Laplante, Vinicius Fortuna, Roya Ensafi
    In Proc. of: Free and Open Communications on the Internet, 2023,
  • Lox: Protecting the Social Graph in Bridge Distribution PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Lindsey Tulloch, Ian Goldberg
    Article in: Privacy Enhancing Technologies 2023.1, 2023,
  • Dolphin: A Cellular Voice Based Internet Shutdown Resistance System PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty
    Article in: Privacy Enhancing Technologies 2023.1, 2023,
  • Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Abhishek Bhaskar, Paul Pearce
    In Proc. of: USENIX Security Symposium, 2022, USENIX
  • GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin
    In Proc. of: USENIX Security Symposium, 2022, USENIX
  • OpenVPN is Open to VPN Fingerprinting PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
    In Proc. of: USENIX Security Symposium, 2022, USENIX
  • Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Nguyen Phong Hoang, Michalis Polychronakis, Phillipa Gill
    In Proc. of: Passive and Active Measurement Conference, 2022, Springer
  • TSPU: Russia's Decentralized Censorship System File download iconCached PDF download iconBibTeX download iconLink to paper
    Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi
    In Proc. of: Internet Measurement Conference, 2022, ACM
  • Network Measurement Methods for Locating and Examining Censorship Devices File download iconCached PDF download iconBibTeX download iconLink to paper
    Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan Mayer, Roya Ensafi
    In Proc. of: Emerging Networking Experiments and Technologies, 2022, ACM
  • Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention File download iconCached PDF download iconBibTeX download iconLink to paper
    Gabriel Figueira, Diogo Barradas, Nuno Santos
    In Proc. of: Asia CCS, 2022, ACM
  • COVID-19 increased censorship circumvention and access to sensitive topics in China PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Keng-Chi Chang, William R. Hobbs, Margaret E. Roberts, Zachary C. Steinert-Threlkeld
    Article in: PNAS 119.4, 2022, National Academy of Sciences
  • OUStralopithecus: Overt User Simulation for Censorship Circumvention PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg
    In Proc. of: Workshop on Privacy in the Electronic Society, 2021, ACM
  • Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin
    In Proc. of: Workshop on Offensive Technologies, 2021, IEEE
  • Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Raymond Rambert, Zachary Weinberg, Diogo Barradas, Nicolas Christin
    In Proc. of: WWW, 2021, ACM
  • Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Mingkui Wei
    In Proc. of: USENIX Security Symposium, 2021, USENIX
  • Weaponizing Middleboxes for TCP Reflected Amplification PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
    In Proc. of: USENIX Security Symposium, 2021, USENIX
  • How Great is the Great Firewall? Measuring China's DNS Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis
    In Proc. of: USENIX Security Symposium, 2021, USENIX
  • Balboa: Bobbing and Weaving around Network Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Marc B. Rosen, James Parker, Alex J. Malozemoff
    In Proc. of: USENIX Security Symposium, 2021, USENIX
  • Throttling Twitter: an emerging censorship technique in Russia File download iconCached PDF download iconBibTeX download iconLink to paper
    Diwen Xue, Reethika Ramesh, ValdikSS, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi
    In Proc. of: Internet Measurement Conference, 2021, ACM
  • Web censorship measurements of HTTP/3 over QUIC File download iconCached PDF download iconBibTeX download iconLink to paper
    Kathrin Elmenhorst, Bertram Schütz, Nils Aschenbruck, Simone Basso
    In Proc. of: Internet Measurement Conference, 2021, ACM
  • A multi-perspective view of Internet censorship in Myanmar File download iconCached PDF download iconBibTeX download iconLink to paper
    Ramakrishna Padmanabhan, Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Doug Madory, Molly Roberts, Alberto Dainotti
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • Measuring QQMail's Automated Email Censorship in China File download iconCached PDF download iconBibTeX download iconLink to paper
    Jeffrey Knockel, Lotus Ruan
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels File download iconCached PDF download iconBibTeX download iconLink to paper
    Carmen Kwan, Paul Janiszewski, Shela Qiu, Cathy Wang, Cecylia Bocovich
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • Even Censors Have a Backup: Examining China's Double HTTPS Censorship Middleboxes File download iconCached PDF download iconBibTeX download iconLink to paper
    Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • BlindTLS: Circumventing TLS-Based HTTPS Censorship File download iconCached PDF download iconBibTeX download iconLink to paper
    Sambhav Satija, Rahul Chatterjee
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • Measuring DoT/DoH blocking using OONI Probe: a preliminary study PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simone Basso
    In Proc. of: DNS Privacy Workshop, 2021, The Internet Society
  • Meteor: Cryptographically Secure Steganography for Realistic Distributions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin
    In Proc. of: Computer and Communications Security, 2021, ACM
  • Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty
    In Proc. of: Asia CCS, 2021, ACM
  • Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty
    Article in: Privacy Enhancing Technologies 2021.2, 2021, Sciendo
  • How India Censors the Web PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kushagra Singh, Gurshabad Grover, Varun Bansal
    In Proc. of: Web Science, 2020, ACM
  • ICLab: A Global, Longitudinal Internet Censorship Measurement Platform PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill
    In Proc. of: Symposium on Security & Privacy, 2020, IEEE
  • Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin
    In Proc. of: SIGCOMM, 2020, ACM
  • SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • MassBrowser: Unblocking the Censored Web for the Masses, by the Masses PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • Detecting Probe-resistant Proxies PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sergey Frolov, Jack Wampler, Eric Wustrow
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • Measuring the Deployment of Network Censorship Filters at Global Scale PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • Decentralized Control: A Case Study of Russia PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • How China Detects and Blocks Shadowsocks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr
    In Proc. of: Internet Measurement Conference, 2020, ACM
  • Investigating Large Scale HTTPS Interception in Kazakhstan File download iconCached PDF download iconBibTeX download iconLink to paper
    Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi
    In Proc. of: Internet Measurement Conference, 2020, ACM
  • Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Fatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Slitheen++: Stealth TLS-based Decoy Routing PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Benedikt Birtel, Christian Rossow
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Turbo Tunnel, a good way to design censorship circumvention protocols PDF download iconCached PDF download iconBibTeX download iconLink to paper
    David Fifield
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • HTTPT: A Probe-Resistant Proxy PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sergey Frolov, Eric Wustrow
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diogo Barradas, Nuno Santos
    In Proc. of: Distributed Infrastructure for Common Good, 2020, ACM
  • Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diogo Barradas, Nuno Santos, Luís Rodrigues, Vítor Nunes
    In Proc. of: Computer and Communications Security, 2020, ACM
  • Censored Planet: An Internet-wide, Longitudinal Censorship Observatory PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi
    In Proc. of: Computer and Communications Security, 2020, ACM
  • Characterizing Transnational Internet Performance and the Great Bottleneck of China File download iconCached PDF download iconBibTeX download iconLink to paper
    Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Haixin Duan
    Article in: Measurement and Analysis of Computing Systems 4.1, 2020, ACM
  • SiegeBreaker: An SDN Based Practical Decoy Routing System PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, H. B. Acharya, Sambuddho Chakravarty
    Article in: Privacy Enhancing Technologies 2020.3, 2020, Sciendo
  • Running Refraction Networking for Real PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow
    Article in: Privacy Enhancing Technologies 2020.3, 2020, Sciendo
  • MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
    Article in: Privacy Enhancing Technologies 2020.3, 2020, Sciendo
  • Protocol Proxy: An FTE-based covert channel PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard Brooks
    Article in: Computers & Security 92., 2020, Elsevier
  • Shedding Light on Mobile App Store Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Vasilis Ververis, Marios Isaakidis, Valentin Weber, Benjamin Fabian
    In Proc. of: User Modeling, Adaptation and Personalization, 2019, ACM
  • Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags
    In Proc. of: Network and Distributed System Security, 2019, The Internet Society
  • The use of TLS in Censorship Circumvention PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sergey Frolov, Eric Wustrow
    In Proc. of: Network and Distributed System Security, 2019, The Internet Society
  • Distributed Detection of Tor Directory Authorities Censorship in Mexico PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Gunnar Eyal Wolf Iszaevich
    In Proc. of: International Conference on Networks, 2019, IARIA
  • Improving Meek With Adversarial Techniques PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Steven R. Sheffey, Ferrol Aderholdt
    In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
  • On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Zimo Chai, Amirhossein Ghafari, Amir Houmansadr
    In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
  • An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ruohan Xiong, Jeffrey Knockel
    In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
  • Measuring I2P Censorship at a Global Scale PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
    In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
  • Conjure: Summoning Proxies from Unused Address Space PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow
    In Proc. of: Computer and Communications Security, 2019, ACM
  • Geneva: Evolving Censorship Evasion Strategies PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kevin Bock, George Hughey, Xiao Qiang, Dave Levin
    In Proc. of: Computer and Communications Security, 2019, ACM
  • On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship File download iconCached PDF download iconBibTeX download iconLink to paper
    Joss Wright, Alexander Darer, Oliver Farnan
    In Proc. of: Web Science, 2018, ACM
  • Effective Detection of Multimedia Protocol Tunneling using Machine Learning PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diogo Barradas, Nuno Santos, Luís Rodrigues
    In Proc. of: USENIX Security Symposium, 2018, USENIX
  • Quack: Scalable Remote Measurement of Application-Layer Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
    In Proc. of: USENIX Security Symposium, 2018, USENIX
  • Incentivizing Censorship Measurements via Circumvention File download iconCached PDF download iconBibTeX download iconLink to paper
    Aqib Nisar, Aqsa Kashaf, Ihsan Ayyub Qazi, Zartash Afzal Uzmi
    In Proc. of: SIGCOMM, 2018, ACM
  • Where The Light Gets In: Analyzing Web Censorship Mechanisms in India PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty
    In Proc. of: Internet Measurement Conference, 2018, ACM
  • 403 Forbidden: A Global View of CDN Geoblocking PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi
    In Proc. of: Internet Measurement Conference, 2018, ACM
  • An Empirical Study of the I2P Anonymity Network and its Censorship Resistance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis
    In Proc. of: Internet Measurement Conference, 2018, ACM
  • Detecting Censorable Content on Sina Weibo: A Pilot Study PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kei Yin Ng, Anna Feldman, Chris Leberknight
    In Proc. of: Hellenic Conference on Artificial Intelligence, 2018, ACM
  • Analyzing China's Blocking of Unpublished Tor Bridges PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Arun Dunna, Ciarán O'Brien, Phillipa Gill
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Victoria Manfredi, Pi Songkuntham
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • An analysis of automatic image filtering on WeChat Moments PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • Automatically Generating a Large, Culture-Specific Blocklist for China PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Austin Hounsel, Prateek Mittal, Nick Feamster
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • Proof-of-Censorship: Enabling centralized censorship-resistant content providers PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ian Martiny, Ian Miers, Eric Wustrow
    In Proc. of: Financial Cryptography and Data Security, 2018, Springer
  • Secure asymmetry and deployability for decoy routing systems PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cecylia Bocovich, Ian Goldberg
    Article in: Privacy Enhancing Technologies 2018.3, 2018, De Gruyter Open
  • How Sudden Censorship Can Increase Access to Information PDF download iconCached PDF download iconBibTeX download iconLink to paper
    William R. Hobbs, Margaret E. Roberts
    Article in: American Political Science Review 112.3, 2018, Cambridge University Press
  • DeTor: Provably Avoiding Geographic Regions in Tor PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Zhihao Li, Stephen Herwig, Dave Levin
    In Proc. of: USENIX Security Symposium, 2017, USENIX
  • Characterizing the Nature and Dynamics of Tor Exit Blocking PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
    In Proc. of: USENIX Security Symposium, 2017, USENIX
  • Global Measurement of DNS Manipulation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
    In Proc. of: USENIX Security Symposium, 2017, USENIX
  • Augur: Internet-Wide Detection of Connectivity Disruptions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson
    In Proc. of: Symposium on Security & Privacy, 2017, IEEE
  • Mending Wall: On the Implementation of Censorship in India PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty
    In Proc. of: SecureComm, 2017, Springer
  • Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Srdjan Matic, Carmela Troncoso, Juan Caballero
    In Proc. of: Network and Distributed System Security, 2017, The Internet Society
  • FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Alexander Darer, Oliver Farnan, Joss Wright
    In Proc. of: Network Traffic Measurement and Analysis, 2017, IFIP
  • Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Zhen Lu, Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson
    In Proc. of: Middleware, 2017, ACM
  • Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy
    In Proc. of: Internet Measurement Conference, 2017, ACM
  • lib·erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David Choffnes, Phillipa Gill, Alan Mislove
    In Proc. of: Internet Measurement Conference, 2017, ACM
  • The Random Forest based Detection of Shadowsock's Traffic PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ziye Deng, Zihan Liu, Zhouguo Chen, Yubin Guo
    In Proc. of: Intelligent Human-Machine Systems and Cybernetics, 2017, IEEE
  • Online Advertising under Internet Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Hira Javaid, Hafiz Kamran Khalil, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
    In Proc. of: Hot Topics in Networks, 2017, ACM
  • Measuring Decentralization of Chinese Keyword Censorship via Mobile Games PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
    In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
  • The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall
    In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
  • Autosonda: Discovering Rules and Triggers of Censorship Devices PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jill Jermyn, Nicholas Weaver
    In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
  • An ISP-Scale Deployment of TapDance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow
    In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
  • Lavinia: An audit-payment protocol for censorship-resistant storage PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cecylia Bocovich, John A. Doucette, Ian Goldberg
    In Proc. of: Financial Cryptography and Data Security, 2017, Springer
  • Internet Censorship in Thailand: User Practices and Potential Threats PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Genevieve Gebhart, Anonymous Author, Tadayoshi Kohno
    In Proc. of: European Symposium on Security & Privacy, 2017, IEEE
  • A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill
    In Proc. of: Emerging Networking Experiments and Technologies, 2017, ACM
  • Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Blocklisting PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Vasilis Ververis, Marios Isaakidis, Chrystalleni Loizidou, Benjamin Fabian
    In Proc. of: E-Democracy, 2017, Springer
  • When the Internet Goes Down in Bangladesh PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, Neha Kumar
    In Proc. of: Computer-Supported Cooperative Work and Social Computing, 2017, ACM
  • The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Milad Nasr, Hadi Zolfaghari, Amir Houmansadr
    In Proc. of: Computer and Communications Security, 2017, ACM
  • The Devil's in The Details: Placing Decoy Routers in the Internet PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, H. B. Acharya
    In Proc. of: ACSAC, 2017, ACM
  • DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Diogo Barradas, Nuno Santos, Luís Rodrigues
    Article in: Privacy Enhancing Technologies 2017.4, 2017, De Gruyter Open
  • Topics of Controversy: An Empirical Analysis of Web Censorship Lists PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin
    Article in: Privacy Enhancing Technologies 2017.1, 2017, De Gruyter Open
  • A Usability Evaluation of Tor Launcher PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Linda Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David Wagner
    Article in: Privacy Enhancing Technologies 2017.3, 2017, De Gruyter Open
  • Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Vahid Heydari, Sun-il Kim, Seong-Moo Yoo
    Article in: Transactions on Information Forensics and Security 12.5, 2017, IEEE
  • Poisoning the Well – Exploring the Great Firewall's Poisoned DNS Responses File download iconCached PDF download iconBibTeX download iconLink to paper
    Oliver Farnan, Alexander Darer, Joss Wright
    In Proc. of: Workshop on Privacy in the Electronic Society, 2016, ACM
  • Satellite: Joint Analysis of CDNs and Network-Level Interference PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Will Scott, Thomas Anderson, Tadayoshi Kohno, Arvind Krishnamurthy
    In Proc. of: USENIX Annual Technical Conference, 2016, USENIX
  • SoK: Towards Grounding Censorship Circumvention in Empiricism PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michael Carl Tschantz, Sadia Afroz, Anonymous, Vern Paxson
    In Proc. of: Symposium on Security & Privacy, 2016, IEEE
  • Analyzing Internet Censorship in Pakistan PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Giuseppe Aceto, Alessio Botta, Antonio Pescapè, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
    In Proc. of: Research and Technologies for Society and Industry, 2016, IEEE
  • Leveraging Internet Services to Evade Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Apostolis Zarras
    In Proc. of: Information Security Conference, 2016, Springer
  • DNS-sly: Avoiding Censorship through Network Complexity PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Qurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • Matryoshka: Hiding Secret Communication in Plain Sight PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Iris Safaka, Christina Fragouli, Katerina Argyraki
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • GhostPost: Seamless Restoration of Censored Social Media Posts PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Frederick Douglas, Matthew Caesar
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • Censors' Delay in Blocking Circumvention Proxies PDF download iconCached PDF download iconBibTeX download iconLink to paper
    David Fifield, Lynn Tsai
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • Games Without Frontiers: Investigating Video Games as a Covert Channel PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
    In Proc. of: European Symposium on Security & Privacy, 2016, IEEE
  • Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Cecylia Bocovich, Ian Goldberg
    In Proc. of: Computer and Communications Security, 2016, ACM
  • Game of Decoys: Optimal Decoy Routing Through Game Theory PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Milad Nasr, Amir Houmansadr
    In Proc. of: Computer and Communications Security, 2016, ACM
  • Practical Censorship Evasion Leveraging Content Delivery Networks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Hadi Zolfaghari, Amir Houmansadr
    In Proc. of: Computer and Communications Security, 2016, ACM
  • SkypeLine: Robust Hidden Data Transmission for VoIP PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
    In Proc. of: ASIA Computer and Communications Security, 2016, ACM
  • Fingerprintability of WebRTC PDF download iconCached PDF download iconBibTeX download iconLink to paper
    David Fifield, Mia Gil Epner
    Technical Report, 2016, University of California, Berkeley
  • A Framework for the Game-theoretic Analysis of Censorship Resistance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg
    Article in: Privacy Enhancing Technologies 2016.4, 2016, De Gruyter Open
  • SoK: Making Sense of Censorship Resistance Systems PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg
    Article in: Privacy Enhancing Technologies 2016.4, 2016, De Gruyter Open
  • Salmon: Robust Proxy Distribution for Censorship Circumvention PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar
    Article in: Privacy Enhancing Technologies 2016.4, 2016, De Gruyter Open
  • Mailet: Instant Social Networking under Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Shuai Li, Nicholas Hopper
    Article in: Privacy Enhancing Technologies 2016.2, 2016, De Gruyter Open
  • CovertCast: Using Live Streaming to Evade Internet Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Richard McPherson, Amir Houmansadr, Vitaly Shmatikov
    Article in: Privacy Enhancing Technologies 2016.3, 2016, De Gruyter Open
  • Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime File download iconCached PDF download iconBibTeX download iconLink to paper
    Walid Al-Saqaf
    Article in: Media and Communication 4.1, 2016, Cogitatio
  • Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Paul Vines, Tadayoshi Kohno
    In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
  • Known Unknowns: An Analysis of Twitter Censorship in Turkey PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rima S. Tanash, Zhouhan Chen, Tanmay Thakur, Dan S. Wallach, Devika Subramanian
    In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
  • Marionette: A Programmable Network-Traffic Obfuscation System PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton
    In Proc. of: USENIX Security Symposium, 2015, USENIX
  • Monitoring Internet Censorship with UBICA PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
    In Proc. of: Traffic Monitoring and Analysis, 2015, Springer
  • Alibi Routing PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee
    In Proc. of: SIGCOMM, 2015, ACM
  • Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Burnett, Nick Feamster
    In Proc. of: SIGCOMM, 2015, ACM
  • Rebound: Decoy Routing on Asymmetric Routes Via Error Messages PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Daniel Ellard, Alden Jackson, Christine Jones, Victoria Ursula Manfredi, Timothy Strayer, Bishal Thapa, Megan Van Welie
    In Proc. of: Local Computer Networks, 2015, IEEE
  • Examining How the Great Firewall Discovers Hidden Circumvention Servers PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson
    In Proc. of: Internet Measurement Conference, 2015, ACM
  • Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Chaya Hiruncharoenvate, Zhiyuan Lin, Eric Gilbert
    In Proc. of: International Conference on Web and Social Media, 2015, AAAI
  • A Case for Marrying Censorship Measurements with Circumvention PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
    In Proc. of: Hot Topics in Networks, 2015, ACM
  • Can Censorship Measurements Be Safe(r)? PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ben Jones, Nick Feamster
    In Proc. of: Hot Topics in Networks, 2015, ACM
  • Understanding Internet Censorship Policy: The Case of Greece PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Vasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros
    In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
  • Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall
    In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
  • An Analysis of China's “Great Cannon” PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson
    In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
  • Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel
    In Proc. of: Ethics in Networked Systems Research, 2015, ACM
  • Ethical Concerns for Censorship Measurement PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver
    In Proc. of: Ethics in Networked Systems Research, 2015, ACM
  • CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content PDF download iconCached PDF download iconBibTeX download iconLink to paper
    John Holowczak, Amir Houmansadr
    In Proc. of: Computer and Communications Security, 2015, ACM
  • Seeing through Network-Protocol Obfuscation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton
    In Proc. of: Computer and Communications Security, 2015, ACM
  • No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Arvind Narayanan, Bendert Zevenbergen
    Article in: Technology Science ., 2015,
  • Analyzing the Great Firewall of China Over Space and Time PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
    Article in: Privacy Enhancing Technologies 2015.1, 2015, De Gruyter Open
  • Blocking-resistant communication through domain fronting PDF download iconCached PDF download iconBibTeX download iconLink to paper
    David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
    Article in: Privacy Enhancing Technologies 2015.2, 2015, De Gruyter Open
  • Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Phillipa Gill, Masashi Crete-Nishihata, Jakub Dalek, Sharon Goldberg, Adam Senft, Greg Wiseman
    Article in: Transactions on the Web 9.1, 2015, ACM
  • Internet Censorship detection: A survey PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Giuseppe Aceto, Antonio Pescapè
    Article in: Computer Networks 83., 2015, Elsevier
  • Facet: Streaming over Videoconferencing for Censorship Circumvention PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Shuai Li, Mike Schliep, Nick Hopper
    In Proc. of: Workshop on Privacy in the Electronic Society, 2014, ACM
  • LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
    In Proc. of: USENIX Security Symposium, 2014, USENIX
  • TapDance: End-to-Middle Anticensorship without Flow Blocking PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
    In Proc. of: USENIX Security Symposium, 2014, USENIX
  • Censorship Resistance as a Side-Effect PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Henry Tan, Micah Sherr
    In Proc. of: Security Protocols, 2014, Springer
  • CloudTransport: Using Cloud Storage for Censorship-Resistant Networking PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
    In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
  • Measuring Freenet in the Wild: Censorship-resilience under Observation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
    In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
  • Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall
    In Proc. of: Passive and Active Measurement Conference, 2014, Springer
  • VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Daiyuu Nobori, Yasushi Shinjo
    In Proc. of: Networked Systems Design and Implementation, 2014, USENIX
  • No Direction Home: The True Cost of Routing Around Decoys PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov
    In Proc. of: Network and Distributed System Security, 2014, The Internet Society
  • Censorship in the Wild: Analyzing Internet Filtering in Syria PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar
    In Proc. of: Internet Measurement Conference, 2014, ACM
  • Automated Detection and Fingerprinting of Censorship Block Pages PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill
    In Proc. of: Internet Measurement Conference, 2014, ACM
  • A Look at the Consequences of Internet Censorship Through an ISP Lens PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson
    In Proc. of: Internet Measurement Conference, 2014, ACM
  • GoHop: Personal VPN to Defend from Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yuzhi Wang, Ping Ji, Borui Ye, Pengjun Wang, Rong Luo, Huazhong Yang
    In Proc. of: International Conference on Advanced Communication Technology, 2014, IEEE
  • Global Network Interference Detection over the RIPE Atlas Network PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Collin Anderson, Philipp Winter, Roya
    In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
  • Towards a Comprehensive Picture of the Great Firewall's DNS Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Anonymous
    In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
  • TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
    In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
  • Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
    In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
  • Toward automatic censorship detection in microblogs PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Donn Morrison
    In Proc. of: Data Mining in Social Networks, 2014,
  • A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Matthias Wachs, Martin Schanzenbach, Christian Grothoff
    In Proc. of: Cryptology and Network Security, 2014, Springer
  • Reverse-engineering censorship in China: Randomized experimentation and participant observation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Gary King, Jennifer Pan, Margaret E. Roberts
    Article in: Science 345.6199, 2014, AAAS
  • ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Philipp Winter, Tobias Pulls, Juergen Fuss
    In Proc. of: Workshop on Privacy in the Electronic Society, 2013, ACM
  • The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
    In Proc. of: USENIX Security Symposium, 2013, USENIX
  • Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karyn Benson, Alberto Dainotti, KC Claffy, Emile Aben
    In Proc. of: Traffic Monitoring and Analysis, 2013, IEEE
  • The Parrot is Dead: Observing Unobservable Network Communications PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov
    In Proc. of: Symposium on Security & Privacy, 2013, IEEE
  • OSS: Using Online Scanning Services for Censorship Circumvention PDF download iconCached PDF download iconBibTeX download iconLink to paper
    David Fifield, Gabi Nakibly, Dan Boneh
    In Proc. of: Privacy Enhancing Technologies Symposium, 2013, Springer
  • I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer
    In Proc. of: Network and Distributed System Security, 2013, The Internet Society
  • rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas J. Hopper
    In Proc. of: Network and Distributed System Security, 2013, The Internet Society
  • A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jakub Dalek, Bennett Haselton, Helmi Noman, Adam Senft, Masashi Crete-Nishihata, Phillipa Gill, Ronald J. Deibert
    In Proc. of: Internet Measurement Conference, 2013, ACM
  • Revealing Middlebox Interference with Tracebox PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet
    In Proc. of: Internet Measurement Conference, 2013, ACM
  • Identity-Based Steganography and Its Applications to Censorship Resistance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Tim Ruffing, Jonas Schneider, Aniket Kate
    In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
  • SWEET: Serving the Web by Exploiting Email Tunnels PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, Nikita Borisov
    In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
  • Internet Censorship in Iran: A First Look PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Simurgh Aryan, Homa Aryan, J. Alex Halderman
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Shaddi Hasan, Yahel Ben-David, Giulia Fanti, Eric Brewer, Scott Shenker
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • The Anatomy of Web Censorship in Pakistan PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Zubair Nabi
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest PDF download iconCached PDF download iconBibTeX download iconLink to paper
    John-Paul Verkamp, Minaxi Gupta
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • Towards a Censorship Analyser for Tor PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Philipp Winter
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • On the Feasibility of a Censorship Resistant Decentralized Name System PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Matthias Wachs, Martin Schanzenbach, Christian Grothoff
    In Proc. of: Foundations & Practice of Security, 2013, Springer
  • Self-Censorship on Facebook File download iconCached PDF download iconBibTeX download iconLink to paper
    Sauvik Das, Adam Kramer
    In Proc. of: Conference on Weblogs and Social Media, 2013, AAAI
  • Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Le Chen, Chi Zhang, Christo Wilson
    In Proc. of: Conference on Online Social Networks, 2013, ACM
  • Protocol Misidentification Made Easy with Format-Transforming Encryption PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
    In Proc. of: Computer and Communications Security, 2013, ACM
  • Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention PDF download iconCached PDF download iconBibTeX download iconLink to paper
    John Geddes, Max Schuchard, Nicholas Hopper
    In Proc. of: Computer and Communications Security, 2013, ACM
  • Message In A Bottle: Sailing Past Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
    In Proc. of: Annual Computer Security Applications Conference, 2013, ACM
  • Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    David Robinson, Harlan Yu, Anne An
    Technical Report, 2013, OpenITP
  • Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Collin Anderson
    Technical Report, 2013, University of Pennsylvania
  • Secure Communication over Diverse Transports PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michael Rogers, Eleanor Saitta
    In Proc. of: Workshop on Privacy in the Electronic Society, 2012, ACM
  • Hold-On: Protecting Against On-Path DNS Poisoning PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li, Vern Paxson
    In Proc. of: Securing and Trusting Internet Names, 2012, National Physical Laboratory
  • Evading Censorship with Browser-Based Proxies PDF download iconCached PDF download iconBibTeX download iconLink to paper
    David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Roger Dingledine, Phil Porras, Dan Boneh
    In Proc. of: Privacy Enhancing Technologies Symposium, 2012, Springer
  • Adapting Social Spam Infrastructure for Political Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Kurt Thomas, Chris Grier, Vern Paxson
    In Proc. of: Large-Scale Exploits and Emergent Threats, 2012, USENIX
  • Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Zhen Ling, Xinwen Fu, Wei Yu, Junzhou Luo, Ming Yang
    In Proc. of: INFOCOM, 2012, IEEE
  • Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Nicholas Aase, Jedidiah R. Crandall, Álvaro Díaz, Jeffrey Knockel, Jorge Ocaña Molinero, Jared Saia, Dan Wallach, Tao Zhu
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • OONI: Open Observatory of Network Interference PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Arturo Filastò, Jacob Appelbaum
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • Bootstrapping Communications into an Anti-Censorship System PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Patrick Lincoln, Ian Mason, Phillip Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Simpson, Paul Vixie, Dan Boneh
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • One-way indexing for plausible deniability in censorship resistant storage PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • Inferring Mechanics of Web Censorship Around the World PDF download iconCached PDF download iconBibTeX download iconLink to paper
    John-Paul Verkamp, Minaxi Gupta
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • How the Great Firewall of China is Blocking Tor PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Philipp Winter, Stefan Lindskog
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • SkypeMorph: Protocol Obfuscation for Tor Bridges PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg
    In Proc. of: Computer and Communications Security, 2012, ACM
  • Routing Around Decoys PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper
    In Proc. of: Computer and Communications Security, 2012, ACM
  • CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov
    In Proc. of: Computer and Communications Security, 2012, ACM
  • StegoTorus: A Camouflage Proxy for the Tor Anonymity System PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh
    In Proc. of: Computer and Communications Security, 2012, ACM
  • Technical analysis of the Ultrasurf proxying software PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jacob Appelbaum
    Technical Report, 2012, The Tor Project
  • The Hidden Internet of Iran: Private Address Allocations on a National Network PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Collin Anderson
    Technical Report, 2012,
  • The Collateral Damage of Internet Censorship by DNS Injection PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sparks, Neo, Tank, Smith, Dozer
    Article in: SIGCOMM Computer Communication Review 42.3, 2012, ACM
  • How Censorship in China Allows Government Criticism but Silences Collective Expression PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Gary King, Jennifer Pan, Margaret E. Roberts
    Article in: American Political Science Review ., 2012,
  • Regional Variation in Chinese Internet Filtering File download iconCached PDF download iconBibTeX download iconLink to paper
    Joss Wright
    Technical Report, 2012, University of Oxford
  • BridgeSPA: Improving Tor Bridges with Single Packet Authorization PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner
    In Proc. of: Workshop on Privacy in the Electronic Society, 2011, ACM
  • Telex: Anticensorship in the Network Infrastructure PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
    In Proc. of: USENIX Security Symposium, 2011, USENIX
  • Scrambling for lightweight censorship resistance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Joseph Bonneau, Rubin Xu
    In Proc. of: Security Protocols, 2011, Springer
  • Internet Censorship in China: Where Does the Filtering Occur? PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Xueyang Xu, Z. Morley Mao, J. Alex Halderman
    In Proc. of: Passive and Active Measurement Conference, 2011, Springer
  • Analysis of Country-wide Internet Outages Caused by Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapè
    In Proc. of: Internet Measurement Conference, 2011, ACM
  • Tor Instead of IP PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Vincent Liu, Seungyeop Han, Arvind Krishnamurthy, Thomas Anderson
    In Proc. of: Hot Topics in Networks, 2011, ACM
  • Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Nicholas Jones, Matvey Arye, Jacopo Cesareo, Michael J. Freedman
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Automated Named Entity Extraction for Tracking Censorship of Current Events PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Antonio M. Espinoza, Jedidiah R. Crandall
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Decoy Routing: Toward Unblockable Internet Communication PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, W. Timothy Strayer
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Bypassing Internet Censorship for News Broadcasters PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Karl Kathuria
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Infrastructures of Censorship and Lessons from Copyright Resistance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Wendy Seltzer
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • CensMon: A Web Censorship Monitor PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Andreas Sfakianakis, Elias Athanasopoulos, Sotiris Ioannidis
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Joss Wright, Tulio Souza, Ian Brown
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Proximax: A Measurement Based System for Proxies Dissemination PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Damon McCoy, Jose Andre Morales, Kirill Levchenko
    In Proc. of: Financial Cryptography and Data Security, 2011, Springer
  • Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
    In Proc. of: Computer and Communications Security, 2011, ACM
  • Mapping Local Internet Control PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Hal Roberts, David Larochelle, Rob Faris, John Palfrey
    In Proc. of: Computer Communications Workshop, 2011, IEEE
  • Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Irina Shklovski, Nalini P. Kotamraju
    In Proc. of: CHI Conference on Human Factors in Computing Systems, 2011, ACM
  • #h00t: Censorship Resistant Microblogging PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright
    Technical Report, 2011, Rice University and University of Texas at Arlington
  • An anomaly-based censorship-detection system for Tor PDF download iconCached PDF download iconBibTeX download iconLink to paper
    George Danezis
    Technical Report, 2011, The Tor Project
  • Dust: A Blocking-Resistant Internet Transport Protocol PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Brandon Wiley
    Technical Report, 2011, University of Texas at Austin
  • Chipping Away at Censorship Firewalls with User-Generated Content PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Sam Burnett, Nick Feamster, Santosh Vempala
    In Proc. of: USENIX Security Symposium, 2010, USENIX
  • Fighting Censorship with Algorithms PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Mohammad Mahdian
    In Proc. of: International Conference on Fun with Algorithms, 2010, Springer
  • Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jong Chun Park, Jedidiah R. Crandall
    In Proc. of: Distributed Computing Systems, 2010, IEEE
  • A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Andreas Pfitzmann, Marit Hansen
    Miscellaneous, 2010 Version 0.34
  • On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jon McLachlan, Nicholas Hopper
    In Proc. of: Workshop on Privacy in the Electronic Society, 2009, ACM
  • Anonymity and Censorship Resistance in Unstructured Overlay Networks PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum
    In Proc. of: On the Move to Meaningful Internet Systems, 2009, Springer
  • Detecting Forged TCP Reset Packets PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Nicholas Weaver, Robin Sommer, Vern Paxson
    In Proc. of: Network and Distributed System Security, 2009, The Internet Society
  • SkyF2F: Censorship Resistant via Skype Overlay Network PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Shoufeng Cao, Longtao He, Zhongxian Li, Yixian Yang
    In Proc. of: International Conference on Information Engineering, 2009, IEEE
  • Pass it on: Social Networks Stymie Censors PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Yair Sovran, Alana Libonati, Jinyang Li
    In Proc. of: International Workshop on Peer-to-Peer Systems, 2008, USENIX
  • “Good” Worms and Human Rights File download iconCached PDF download iconBibTeX download iconLink to paper
    John Aycock, Alana Maurushat
    Article in: SIGCAS Computers & Society 38.1, 2008, ACM
  • ConceptDoppler: A Weather Tracker for Internet Censorship PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, Rich East
    In Proc. of: Computer and Communications Security, 2007, ACM
  • The Great DNS Wall of China PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Graham Lowe, Patrick Winters, Michael L. Marcus
    Technical Report, 2007, New York University
  • Ignoring the Great Firewall of China PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
    In Proc. of: Privacy Enhancing Technologies, 2006, Springer
  • Failures in a Hybrid Content Blocking System PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Richard Clayton
    In Proc. of: Privacy Enhancing Technologies, 2006, Springer
  • Investigating large-scale Internet content filtering File download iconCached PDF download iconBibTeX download iconLink to paper
    Sebastian Wolfgarten
    Technical Report, 2006, Dublin City University
  • Design of a blocking-resistant anonymity system PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Roger Dingledine, Nick Mathewson
    Technical Report, 2006, The Tor Project
  • Censorship Resistance Revisited PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ginger Perng, Michael K. Reiter, Chenxi Wang
    In Proc. of: International Conference on Information Hiding, 2005, Springer
  • How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Stefan Köpsell, Ulf Hillig
    In Proc. of: Workshop on Privacy in the Electronic Society, 2004, ACM
  • The Economics of Censorship Resistance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    George Danezis, Ross Anderson
    In Proc. of: Economics and Information Security, 2004,
  • Thwarting Web Censorship with Untrusted Messenger Discovery PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Nick Feamster, Magdalena Balazinska, Winston Wang, Hari Balakrishnan, David Karger
    In Proc. of: Privacy Enhancing Technologies, 2003, Springer
  • Government mandated blocking of foreign Web content PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Maximillian Dornseif
    In Proc. of: DFN-Arbeitstagung über Kommunikationsnetze, 2003, Gesellschaft für Informatik
  • Infranet: Circumventing Web Censorship and Surveillance PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger
    In Proc. of: USENIX Security Symposium, 2002, USENIX
  • Anonymizing Censorship Resistant Systems PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Andrei Serjantov
    In Proc. of: International Workshop on Peer-To-Peer Systems, 2002, Springer
  • Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements File download iconCached file download iconBibTeX download iconLink to paper
    Marc Waldman, David Mazières
    In Proc. of: Computer and Communications Security, 2001, ACM
  • Dagster: Censorship-Resistant Publishing Without Replication PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Adam Stubblefield, Dan S. Wallach
    Technical Report, 2001, Rice University
  • Publius: A robust, tamper-evident, censorship-resistant web publishing system PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
    In Proc. of: USENIX Security Symposium, 2000, USENIX
  • The Eternity Service PDF download iconCached PDF download iconBibTeX download iconLink to paper
    Ross J. Anderson
    In Proc. of: Theory and Applications of Cryptology, 1996, CTU Publishing House
Icons taken without modification from Font Awesome.