-
CensorWatch: On the Implementation of Online Censorship in India



Divyank Katira, Gurshabad Grover, Kushagra Singh, Varun Bansal
In Proc. of: Free and Open Communications on the Internet, 2023,
-
Chasing Shadows: A security analysis of the ShadowTLS proxy



Gaukas Wang, Anonymous, Jackson Sippe, Hai Chi, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2023,
-
Security Notions for Fully Encrypted Protocols



Ellis Fenske, Aaron Johnson
In Proc. of: Free and Open Communications on the Internet, 2023,
-
Advancing the Art of Censorship Data Analysis



Ram Sundara Raman, Apurva Virkud, Sarah Laplante, Vinicius Fortuna, Roya Ensafi
In Proc. of: Free and Open Communications on the Internet, 2023,
-
Lox: Protecting the Social Graph in Bridge Distribution



Lindsey Tulloch, Ian Goldberg
Article in: Privacy Enhancing Technologies 2023.1, 2023,
-
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System



Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty
Article in: Privacy Enhancing Technologies 2023.1, 2023,
-
Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement



Abhishek Bhaskar, Paul Pearce
In Proc. of: USENIX Security Symposium, 2022, USENIX
-
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies



Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin
In Proc. of: USENIX Security Symposium, 2022, USENIX
-
OpenVPN is Open to VPN Fingerprinting



Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2022, USENIX
-
Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering



Nguyen Phong Hoang, Michalis Polychronakis, Phillipa Gill
In Proc. of: Passive and Active Measurement Conference, 2022, Springer
-
TSPU: Russia's Decentralized Censorship System



Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2022, ACM
-
Network Measurement Methods for Locating and Examining Censorship Devices



Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan Mayer, Roya Ensafi
In Proc. of: Emerging Networking Experiments and Technologies, 2022, ACM
-
Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention



Gabriel Figueira, Diogo Barradas, Nuno Santos
In Proc. of: Asia CCS, 2022, ACM
-
COVID-19 increased censorship circumvention and access to sensitive topics in China



Keng-Chi Chang, William R. Hobbs, Margaret E. Roberts, Zachary C. Steinert-Threlkeld
Article in: PNAS 119.4, 2022, National Academy of Sciences
-
OUStralopithecus: Overt User Simulation for Censorship Circumvention



Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg
In Proc. of: Workshop on Privacy in the Electronic Society, 2021, ACM
-
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks



Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin
In Proc. of: Workshop on Offensive Technologies, 2021, IEEE
-
Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China



Raymond Rambert, Zachary Weinberg, Diogo Barradas, Nicolas Christin
In Proc. of: WWW, 2021, ACM
-
Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications



Mingkui Wei
In Proc. of: USENIX Security Symposium, 2021, USENIX
-
Weaponizing Middleboxes for TCP Reflected Amplification



Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
In Proc. of: USENIX Security Symposium, 2021, USENIX
-
How Great is the Great Firewall? Measuring China's DNS Censorship



Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis
In Proc. of: USENIX Security Symposium, 2021, USENIX
-
Balboa: Bobbing and Weaving around Network Censorship



Marc B. Rosen, James Parker, Alex J. Malozemoff
In Proc. of: USENIX Security Symposium, 2021, USENIX
-
Throttling Twitter: an emerging censorship technique in Russia



Diwen Xue, Reethika Ramesh, ValdikSS, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2021, ACM
-
Web censorship measurements of HTTP/3 over QUIC



Kathrin Elmenhorst, Bertram Schütz, Nils Aschenbruck, Simone Basso
In Proc. of: Internet Measurement Conference, 2021, ACM
-
A multi-perspective view of Internet censorship in Myanmar



Ramakrishna Padmanabhan, Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Doug Madory, Molly Roberts, Alberto Dainotti
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
Measuring QQMail's Automated Email Censorship in China



Jeffrey Knockel, Lotus Ruan
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels



Carmen Kwan, Paul Janiszewski, Shela Qiu, Cathy Wang, Cecylia Bocovich
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
Even Censors Have a Backup: Examining China's Double HTTPS Censorship Middleboxes



Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
BlindTLS: Circumventing TLS-Based HTTPS Censorship



Sambhav Satija, Rahul Chatterjee
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
-
Measuring DoT/DoH blocking using OONI Probe: a preliminary study



Simone Basso
In Proc. of: DNS Privacy Workshop, 2021, The Internet Society
-
Meteor: Cryptographically Secure Steganography for Realistic Distributions



Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin
In Proc. of: Computer and Communications Security, 2021, ACM
-
Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels



Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty
In Proc. of: Asia CCS, 2021, ACM
-
Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs



Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty
Article in: Privacy Enhancing Technologies 2021.2, 2021, Sciendo
-
How India Censors the Web



Kushagra Singh, Gurshabad Grover, Varun Bansal
In Proc. of: Web Science, 2020, ACM
-
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform



Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill
In Proc. of: Symposium on Security & Privacy, 2020, IEEE
-
Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion



Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin
In Proc. of: SIGCOMM, 2020, ACM
-
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery



Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
MassBrowser: Unblocking the Censored Web for the Masses, by the Masses



Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
Detecting Probe-resistant Proxies



Sergey Frolov, Jack Wampler, Eric Wustrow
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
Measuring the Deployment of Network Censorship Filters at Global Scale



Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
Decentralized Control: A Case Study of Russia



Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
-
How China Detects and Blocks Shadowsocks



Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr
In Proc. of: Internet Measurement Conference, 2020, ACM
-
Investigating Large Scale HTTPS Interception in Kazakhstan



Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2020, ACM
-
Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia



Fatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior



Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Slitheen++: Stealth TLS-based Decoy Routing



Benedikt Birtel, Christian Rossow
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter



Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Turbo Tunnel, a good way to design censorship circumvention protocols



David Fifield
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
HTTPT: A Probe-Resistant Proxy



Sergey Frolov, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
-
Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels



Diogo Barradas, Nuno Santos
In Proc. of: Distributed Infrastructure for Common Good, 2020, ACM
-
Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC



Diogo Barradas, Nuno Santos, Luís Rodrigues, Vítor Nunes
In Proc. of: Computer and Communications Security, 2020, ACM
-
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory



Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi
In Proc. of: Computer and Communications Security, 2020, ACM
-
Characterizing Transnational Internet Performance and the Great Bottleneck of China



Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Haixin Duan
Article in: Measurement and Analysis of Computing Systems 4.1, 2020, ACM
-
SiegeBreaker: An SDN Based Practical Decoy Routing System



Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, H. B. Acharya, Sambuddho Chakravarty
Article in: Privacy Enhancing Technologies 2020.3, 2020, Sciendo
-
Running Refraction Networking for Real



Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow
Article in: Privacy Enhancing Technologies 2020.3, 2020, Sciendo
-
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies



Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
Article in: Privacy Enhancing Technologies 2020.3, 2020, Sciendo
-
Protocol Proxy: An FTE-based covert channel



Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard Brooks
Article in: Computers & Security 92., 2020, Elsevier
-
Shedding Light on Mobile App Store Censorship



Vasilis Ververis, Marios Isaakidis, Valentin Weber, Benjamin Fabian
In Proc. of: User Modeling, Adaptation and Personalization, 2019, ACM
-
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory



Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags
In Proc. of: Network and Distributed System Security, 2019, The Internet Society
-
The use of TLS in Censorship Circumvention



Sergey Frolov, Eric Wustrow
In Proc. of: Network and Distributed System Security, 2019, The Internet Society
-
Distributed Detection of Tor Directory Authorities Censorship in Mexico



Gunnar Eyal Wolf Iszaevich
In Proc. of: International Conference on Networks, 2019, IARIA
-
Improving Meek With Adversarial Techniques



Steven R. Sheffey, Ferrol Aderholdt
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
-
On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention



Zimo Chai, Amirhossein Ghafari, Amir Houmansadr
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
-
An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message



Ruohan Xiong, Jeffrey Knockel
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
-
Measuring I2P Censorship at a Global Scale



Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
-
Conjure: Summoning Proxies from Unused Address Space



Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow
In Proc. of: Computer and Communications Security, 2019, ACM
-
Geneva: Evolving Censorship Evasion Strategies



Kevin Bock, George Hughey, Xiao Qiang, Dave Levin
In Proc. of: Computer and Communications Security, 2019, ACM
-
On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship



Joss Wright, Alexander Darer, Oliver Farnan
In Proc. of: Web Science, 2018, ACM
-
Effective Detection of Multimedia Protocol Tunneling using Machine Learning



Diogo Barradas, Nuno Santos, Luís Rodrigues
In Proc. of: USENIX Security Symposium, 2018, USENIX
-
Quack: Scalable Remote Measurement of Application-Layer Censorship



Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2018, USENIX
-
Incentivizing Censorship Measurements via Circumvention



Aqib Nisar, Aqsa Kashaf, Ihsan Ayyub Qazi, Zartash Afzal Uzmi
In Proc. of: SIGCOMM, 2018, ACM
-
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India



Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty
In Proc. of: Internet Measurement Conference, 2018, ACM
-
403 Forbidden: A Global View of CDN Geoblocking



Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2018, ACM
-
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance



Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis
In Proc. of: Internet Measurement Conference, 2018, ACM
-
Detecting Censorable Content on Sina Weibo: A Pilot Study



Kei Yin Ng, Anna Feldman, Chris Leberknight
In Proc. of: Hellenic Conference on Artificial Intelligence, 2018, ACM
-
Analyzing China's Blocking of Unpublished Tor Bridges



Arun Dunna, Ciarán O'Brien, Phillipa Gill
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption



Victoria Manfredi, Pi Songkuntham
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
An analysis of automatic image filtering on WeChat Moments



Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability



Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
Automatically Generating a Large, Culture-Specific Blocklist for China



Austin Hounsel, Prateek Mittal, Nick Feamster
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
-
Proof-of-Censorship: Enabling centralized censorship-resistant content providers



Ian Martiny, Ian Miers, Eric Wustrow
In Proc. of: Financial Cryptography and Data Security, 2018, Springer
-
Secure asymmetry and deployability for decoy routing systems



Cecylia Bocovich, Ian Goldberg
Article in: Privacy Enhancing Technologies 2018.3, 2018, De Gruyter Open
-
How Sudden Censorship Can Increase Access to Information



William R. Hobbs, Margaret E. Roberts
Article in: American Political Science Review 112.3, 2018, Cambridge University Press
-
DeTor: Provably Avoiding Geographic Regions in Tor



Zhihao Li, Stephen Herwig, Dave Levin
In Proc. of: USENIX Security Symposium, 2017, USENIX
-
Characterizing the Nature and Dynamics of Tor Exit Blocking



Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
In Proc. of: USENIX Security Symposium, 2017, USENIX
-
Global Measurement of DNS Manipulation



Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
In Proc. of: USENIX Security Symposium, 2017, USENIX
-
Augur: Internet-Wide Detection of Connectivity Disruptions



Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson
In Proc. of: Symposium on Security & Privacy, 2017, IEEE
-
Mending Wall: On the Implementation of Censorship in India



Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty
In Proc. of: SecureComm, 2017, Springer
-
Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures



Srdjan Matic, Carmela Troncoso, Juan Caballero
In Proc. of: Network and Distributed System Security, 2017, The Internet Society
-
FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs



Alexander Darer, Oliver Farnan, Joss Wright
In Proc. of: Network Traffic Measurement and Analysis, 2017, IFIP
-
Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue



Zhen Lu, Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson
In Proc. of: Middleware, 2017, ACM
-
Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship



Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy
In Proc. of: Internet Measurement Conference, 2017, ACM
-
lib·erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently



Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David Choffnes, Phillipa Gill, Alan Mislove
In Proc. of: Internet Measurement Conference, 2017, ACM
-
The Random Forest based Detection of Shadowsock's Traffic



Ziye Deng, Zihan Liu, Zhouguo Chen, Yubin Guo
In Proc. of: Intelligent Human-Machine Systems and Cybernetics, 2017, IEEE
-
Online Advertising under Internet Censorship



Hira Javaid, Hafiz Kamran Khalil, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
In Proc. of: Hot Topics in Networks, 2017, ACM
-
Measuring Decentralization of Chinese Keyword Censorship via Mobile Games



Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
-
The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup



Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
-
Autosonda: Discovering Rules and Triggers of Censorship Devices



Jill Jermyn, Nicholas Weaver
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
-
An ISP-Scale Deployment of TapDance



Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
-
Lavinia: An audit-payment protocol for censorship-resistant storage



Cecylia Bocovich, John A. Doucette, Ian Goldberg
In Proc. of: Financial Cryptography and Data Security, 2017, Springer
-
Internet Censorship in Thailand: User Practices and Potential Threats



Genevieve Gebhart, Anonymous Author, Tadayoshi Kohno
In Proc. of: European Symposium on Security & Privacy, 2017, IEEE
-
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography



Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill
In Proc. of: Emerging Networking Experiments and Technologies, 2017, ACM
-
Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Blocklisting



Vasilis Ververis, Marios Isaakidis, Chrystalleni Loizidou, Benjamin Fabian
In Proc. of: E-Democracy, 2017, Springer
-
When the Internet Goes Down in Bangladesh



Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, Neha Kumar
In Proc. of: Computer-Supported Cooperative Work and Social Computing, 2017, ACM
-
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks



Milad Nasr, Hadi Zolfaghari, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2017, ACM
-
The Devil's in The Details: Placing Decoy Routers in the Internet



Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, H. B. Acharya
In Proc. of: ACSAC, 2017, ACM
-
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams



Diogo Barradas, Nuno Santos, Luís Rodrigues
Article in: Privacy Enhancing Technologies 2017.4, 2017, De Gruyter Open
-
Topics of Controversy: An Empirical Analysis of Web Censorship Lists



Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin
Article in: Privacy Enhancing Technologies 2017.1, 2017, De Gruyter Open
-
A Usability Evaluation of Tor Launcher



Linda Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David Wagner
Article in: Privacy Enhancing Technologies 2017.3, 2017, De Gruyter Open
-
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers



Vahid Heydari, Sun-il Kim, Seong-Moo Yoo
Article in: Transactions on Information Forensics and Security 12.5, 2017, IEEE
-
Poisoning the Well – Exploring the Great Firewall's Poisoned DNS Responses



Oliver Farnan, Alexander Darer, Joss Wright
In Proc. of: Workshop on Privacy in the Electronic Society, 2016, ACM
-
Satellite: Joint Analysis of CDNs and Network-Level Interference



Will Scott, Thomas Anderson, Tadayoshi Kohno, Arvind Krishnamurthy
In Proc. of: USENIX Annual Technical Conference, 2016, USENIX
-
SoK: Towards Grounding Censorship Circumvention in Empiricism



Michael Carl Tschantz, Sadia Afroz, Anonymous, Vern Paxson
In Proc. of: Symposium on Security & Privacy, 2016, IEEE
-
Analyzing Internet Censorship in Pakistan



Giuseppe Aceto, Alessio Botta, Antonio Pescapè, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
In Proc. of: Research and Technologies for Society and Industry, 2016, IEEE
-
Leveraging Internet Services to Evade Censorship



Apostolis Zarras
In Proc. of: Information Security Conference, 2016, Springer
-
DNS-sly: Avoiding Censorship through Network Complexity



Qurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
Matryoshka: Hiding Secret Communication in Plain Sight



Iris Safaka, Christina Fragouli, Katerina Argyraki
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
GhostPost: Seamless Restoration of Censored Social Media Posts



Frederick Douglas, Matthew Caesar
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
Censors' Delay in Blocking Circumvention Proxies



David Fifield, Lynn Tsai
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom



Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
-
Games Without Frontiers: Investigating Video Games as a Covert Channel



Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
In Proc. of: European Symposium on Security & Privacy, 2016, IEEE
-
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement



Cecylia Bocovich, Ian Goldberg
In Proc. of: Computer and Communications Security, 2016, ACM
-
Game of Decoys: Optimal Decoy Routing Through Game Theory



Milad Nasr, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2016, ACM
-
Practical Censorship Evasion Leveraging Content Delivery Networks



Hadi Zolfaghari, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2016, ACM
-
SkypeLine: Robust Hidden Data Transmission for VoIP



Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
In Proc. of: ASIA Computer and Communications Security, 2016, ACM
-
Fingerprintability of WebRTC



David Fifield, Mia Gil Epner
Technical Report, 2016, University of California, Berkeley
-
A Framework for the Game-theoretic Analysis of Censorship Resistance



Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg
Article in: Privacy Enhancing Technologies 2016.4, 2016, De Gruyter Open
-
SoK: Making Sense of Censorship Resistance Systems



Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg
Article in: Privacy Enhancing Technologies 2016.4, 2016, De Gruyter Open
-
Salmon: Robust Proxy Distribution for Censorship Circumvention



Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar
Article in: Privacy Enhancing Technologies 2016.4, 2016, De Gruyter Open
-
Mailet: Instant Social Networking under Censorship



Shuai Li, Nicholas Hopper
Article in: Privacy Enhancing Technologies 2016.2, 2016, De Gruyter Open
-
CovertCast: Using Live Streaming to Evade Internet Censorship



Richard McPherson, Amir Houmansadr, Vitaly Shmatikov
Article in: Privacy Enhancing Technologies 2016.3, 2016, De Gruyter Open
-
Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime



Walid Al-Saqaf
Article in: Media and Communication 4.1, 2016, Cogitatio
-
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform



Paul Vines, Tadayoshi Kohno
In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
-
Known Unknowns: An Analysis of Twitter Censorship in Turkey



Rima S. Tanash, Zhouhan Chen, Tanmay Thakur, Dan S. Wallach, Devika Subramanian
In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
-
Marionette: A Programmable Network-Traffic Obfuscation System



Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton
In Proc. of: USENIX Security Symposium, 2015, USENIX
-
Monitoring Internet Censorship with UBICA



Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
In Proc. of: Traffic Monitoring and Analysis, 2015, Springer
-
Alibi Routing



Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee
In Proc. of: SIGCOMM, 2015, ACM
-
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests



Sam Burnett, Nick Feamster
In Proc. of: SIGCOMM, 2015, ACM
-
Rebound: Decoy Routing on Asymmetric Routes Via Error Messages



Daniel Ellard, Alden Jackson, Christine Jones, Victoria Ursula Manfredi, Timothy Strayer, Bishal Thapa, Megan Van Welie
In Proc. of: Local Computer Networks, 2015, IEEE
-
Examining How the Great Firewall Discovers Hidden Circumvention Servers



Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson
In Proc. of: Internet Measurement Conference, 2015, ACM
-
Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions



Chaya Hiruncharoenvate, Zhiyuan Lin, Eric Gilbert
In Proc. of: International Conference on Web and Social Media, 2015, AAAI
-
A Case for Marrying Censorship Measurements with Circumvention



Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
In Proc. of: Hot Topics in Networks, 2015, ACM
-
Can Censorship Measurements Be Safe(r)?



Ben Jones, Nick Feamster
In Proc. of: Hot Topics in Networks, 2015, ACM
-
Understanding Internet Censorship Policy: The Case of Greece



Vasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
-
Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China



Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
-
An Analysis of China's “Great Cannon”



Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
-
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering



Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel
In Proc. of: Ethics in Networked Systems Research, 2015, ACM
-
Ethical Concerns for Censorship Measurement



Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver
In Proc. of: Ethics in Networked Systems Research, 2015, ACM
-
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content



John Holowczak, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2015, ACM
-
Seeing through Network-Protocol Obfuscation



Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: Computer and Communications Security, 2015, ACM
-
No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement



Arvind Narayanan, Bendert Zevenbergen
Article in: Technology Science ., 2015,
-
Analyzing the Great Firewall of China Over Space and Time



Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
Article in: Privacy Enhancing Technologies 2015.1, 2015, De Gruyter Open
-
Blocking-resistant communication through domain fronting



David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
Article in: Privacy Enhancing Technologies 2015.2, 2015, De Gruyter Open
-
Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data



Phillipa Gill, Masashi Crete-Nishihata, Jakub Dalek, Sharon Goldberg, Adam Senft, Greg Wiseman
Article in: Transactions on the Web 9.1, 2015, ACM
-
Internet Censorship detection: A survey



Giuseppe Aceto, Antonio Pescapè
Article in: Computer Networks 83., 2015, Elsevier
-
Facet: Streaming over Videoconferencing for Censorship Circumvention



Shuai Li, Mike Schliep, Nick Hopper
In Proc. of: Workshop on Privacy in the Electronic Society, 2014, ACM
-
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes



Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: USENIX Security Symposium, 2014, USENIX
-
TapDance: End-to-Middle Anticensorship without Flow Blocking



Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
In Proc. of: USENIX Security Symposium, 2014, USENIX
-
Censorship Resistance as a Side-Effect



Henry Tan, Micah Sherr
In Proc. of: Security Protocols, 2014, Springer
-
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking



Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
-
Measuring Freenet in the Wild: Censorship-resilience under Observation



Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
-
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels



Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall
In Proc. of: Passive and Active Measurement Conference, 2014, Springer
-
VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls



Daiyuu Nobori, Yasushi Shinjo
In Proc. of: Networked Systems Design and Implementation, 2014, USENIX
-
No Direction Home: The True Cost of Routing Around Decoys



Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov
In Proc. of: Network and Distributed System Security, 2014, The Internet Society
-
Censorship in the Wild: Analyzing Internet Filtering in Syria



Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar
In Proc. of: Internet Measurement Conference, 2014, ACM
-
Automated Detection and Fingerprinting of Censorship Block Pages



Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill
In Proc. of: Internet Measurement Conference, 2014, ACM
-
A Look at the Consequences of Internet Censorship Through an ISP Lens



Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson
In Proc. of: Internet Measurement Conference, 2014, ACM
-
GoHop: Personal VPN to Defend from Censorship



Yuzhi Wang, Ping Ji, Borui Ye, Pengjun Wang, Rong Luo, Huazhong Yang
In Proc. of: International Conference on Advanced Communication Technology, 2014, IEEE
-
Global Network Interference Detection over the RIPE Atlas Network



Collin Anderson, Philipp Winter, Roya
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
-
Towards a Comprehensive Picture of the Great Firewall's DNS Censorship



Anonymous
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
-
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography



Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
-
Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search



Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
-
Toward automatic censorship detection in microblogs



Donn Morrison
In Proc. of: Data Mining in Social Networks, 2014,
-
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System



Matthias Wachs, Martin Schanzenbach, Christian Grothoff
In Proc. of: Cryptology and Network Security, 2014, Springer
-
Reverse-engineering censorship in China: Randomized experimentation and participant observation



Gary King, Jennifer Pan, Margaret E. Roberts
Article in: Science 345.6199, 2014, AAAS
-
ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship



Philipp Winter, Tobias Pulls, Juergen Fuss
In Proc. of: Workshop on Privacy in the Electronic Society, 2013, ACM
-
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions



Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
In Proc. of: USENIX Security Symposium, 2013, USENIX
-
Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation



Karyn Benson, Alberto Dainotti, KC Claffy, Emile Aben
In Proc. of: Traffic Monitoring and Analysis, 2013, IEEE
-
The Parrot is Dead: Observing Unobservable Network Communications



Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov
In Proc. of: Symposium on Security & Privacy, 2013, IEEE
-
OSS: Using Online Scanning Services for Censorship Circumvention



David Fifield, Gabi Nakibly, Dan Boneh
In Proc. of: Privacy Enhancing Technologies Symposium, 2013, Springer
-
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention



Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer
In Proc. of: Network and Distributed System Security, 2013, The Internet Society
-
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation



Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas J. Hopper
In Proc. of: Network and Distributed System Security, 2013, The Internet Society
-
A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship



Jakub Dalek, Bennett Haselton, Helmi Noman, Adam Senft, Masashi Crete-Nishihata, Phillipa Gill, Ronald J. Deibert
In Proc. of: Internet Measurement Conference, 2013, ACM
-
Revealing Middlebox Interference with Tracebox



Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet
In Proc. of: Internet Measurement Conference, 2013, ACM
-
Identity-Based Steganography and Its Applications to Censorship Resistance



Tim Ruffing, Jonas Schneider, Aniket Kate
In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
-
SWEET: Serving the Web by Exploiting Email Tunnels



Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, Nikita Borisov
In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
-
Internet Censorship in Iran: A First Look



Simurgh Aryan, Homa Aryan, J. Alex Halderman
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts



Shaddi Hasan, Yahel Ben-David, Giulia Fanti, Eric Brewer, Scott Shenker
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion



Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
The Anatomy of Web Censorship in Pakistan



Zubair Nabi
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest



John-Paul Verkamp, Minaxi Gupta
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
Towards a Censorship Analyser for Tor



Philipp Winter
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
-
On the Feasibility of a Censorship Resistant Decentralized Name System



Matthias Wachs, Martin Schanzenbach, Christian Grothoff
In Proc. of: Foundations & Practice of Security, 2013, Springer
-
Self-Censorship on Facebook



Sauvik Das, Adam Kramer
In Proc. of: Conference on Weblogs and Social Media, 2013, AAAI
-
Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo



Le Chen, Chi Zhang, Christo Wilson
In Proc. of: Conference on Online Social Networks, 2013, ACM
-
Protocol Misidentification Made Easy with Format-Transforming Encryption



Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: Computer and Communications Security, 2013, ACM
-
Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention



John Geddes, Max Schuchard, Nicholas Hopper
In Proc. of: Computer and Communications Security, 2013, ACM
-
Message In A Bottle: Sailing Past Censorship



Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
In Proc. of: Annual Computer Security Applications Conference, 2013, ACM
-
Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship



David Robinson, Harlan Yu, Anne An
Technical Report, 2013, OpenITP
-
Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran



Collin Anderson
Technical Report, 2013, University of Pennsylvania
-
Secure Communication over Diverse Transports



Michael Rogers, Eleanor Saitta
In Proc. of: Workshop on Privacy in the Electronic Society, 2012, ACM
-
Hold-On: Protecting Against On-Path DNS Poisoning



Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li, Vern Paxson
In Proc. of: Securing and Trusting Internet Names, 2012, National Physical Laboratory
-
Evading Censorship with Browser-Based Proxies



David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Roger Dingledine, Phil Porras, Dan Boneh
In Proc. of: Privacy Enhancing Technologies Symposium, 2012, Springer
-
Adapting Social Spam Infrastructure for Political Censorship



Kurt Thomas, Chris Grier, Vern Paxson
In Proc. of: Large-Scale Exploits and Emergent Threats, 2012, USENIX
-
Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery



Zhen Ling, Xinwen Fu, Wei Yu, Junzhou Luo, Ming Yang
In Proc. of: INFOCOM, 2012, IEEE
-
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations



Nicholas Aase, Jedidiah R. Crandall, Álvaro Díaz, Jeffrey Knockel, Jorge Ocaña Molinero, Jared Saia, Dan Wallach, Tao Zhu
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
OONI: Open Observatory of Network Interference



Arturo Filastò, Jacob Appelbaum
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
Bootstrapping Communications into an Anti-Censorship System



Patrick Lincoln, Ian Mason, Phillip Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Simpson, Paul Vixie, Dan Boneh
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
One-way indexing for plausible deniability in censorship resistant storage



Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
Inferring Mechanics of Web Censorship Around the World



John-Paul Verkamp, Minaxi Gupta
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
How the Great Firewall of China is Blocking Tor



Philipp Winter, Stefan Lindskog
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
-
SkypeMorph: Protocol Obfuscation for Tor Bridges



Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg
In Proc. of: Computer and Communications Security, 2012, ACM
-
Routing Around Decoys



Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper
In Proc. of: Computer and Communications Security, 2012, ACM
-
CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing



Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov
In Proc. of: Computer and Communications Security, 2012, ACM
-
StegoTorus: A Camouflage Proxy for the Tor Anonymity System



Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh
In Proc. of: Computer and Communications Security, 2012, ACM
-
Technical analysis of the Ultrasurf proxying software



Jacob Appelbaum
Technical Report, 2012, The Tor Project
-
The Hidden Internet of Iran: Private Address Allocations on a National Network



Collin Anderson
Technical Report, 2012,
-
The Collateral Damage of Internet Censorship by DNS Injection



Sparks, Neo, Tank, Smith, Dozer
Article in: SIGCOMM Computer Communication Review 42.3, 2012, ACM
-
How Censorship in China Allows Government Criticism but Silences Collective Expression



Gary King, Jennifer Pan, Margaret E. Roberts
Article in: American Political Science Review ., 2012,
-
Regional Variation in Chinese Internet Filtering



Joss Wright
Technical Report, 2012, University of Oxford
-
BridgeSPA: Improving Tor Bridges with Single Packet Authorization



Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner
In Proc. of: Workshop on Privacy in the Electronic Society, 2011, ACM
-
Telex: Anticensorship in the Network Infrastructure



Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
In Proc. of: USENIX Security Symposium, 2011, USENIX
-
Scrambling for lightweight censorship resistance



Joseph Bonneau, Rubin Xu
In Proc. of: Security Protocols, 2011, Springer
-
Internet Censorship in China: Where Does the Filtering Occur?



Xueyang Xu, Z. Morley Mao, J. Alex Halderman
In Proc. of: Passive and Active Measurement Conference, 2011, Springer
-
Analysis of Country-wide Internet Outages Caused by Censorship



Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapè
In Proc. of: Internet Measurement Conference, 2011, ACM
-
Tor Instead of IP



Vincent Liu, Seungyeop Han, Arvind Krishnamurthy, Thomas Anderson
In Proc. of: Hot Topics in Networks, 2011, ACM
-
Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing



Nicholas Jones, Matvey Arye, Jacopo Cesareo, Michael J. Freedman
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Automated Named Entity Extraction for Tracking Censorship of Current Events



Antonio M. Espinoza, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Decoy Routing: Toward Unblockable Internet Communication



Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, W. Timothy Strayer
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Bypassing Internet Censorship for News Broadcasters



Karl Kathuria
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance



Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Infrastructures of Censorship and Lessons from Copyright Resistance



Wendy Seltzer
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
CensMon: A Web Censorship Monitor



Andreas Sfakianakis, Elias Athanasopoulos, Sotiris Ioannidis
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics



Joss Wright, Tulio Souza, Ian Brown
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
-
Proximax: A Measurement Based System for Proxies Dissemination



Damon McCoy, Jose Andre Morales, Kirill Levchenko
In Proc. of: Financial Cryptography and Data Security, 2011, Springer
-
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability



Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
In Proc. of: Computer and Communications Security, 2011, ACM
-
Mapping Local Internet Control



Hal Roberts, David Larochelle, Rob Faris, John Palfrey
In Proc. of: Computer Communications Workshop, 2011, IEEE
-
Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship



Irina Shklovski, Nalini P. Kotamraju
In Proc. of: CHI Conference on Human Factors in Computing Systems, 2011, ACM
-
#h00t: Censorship Resistant Microblogging



Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright
Technical Report, 2011, Rice University and University of Texas at Arlington
-
An anomaly-based censorship-detection system for Tor



George Danezis
Technical Report, 2011, The Tor Project
-
Dust: A Blocking-Resistant Internet Transport Protocol



Brandon Wiley
Technical Report, 2011, University of Texas at Austin
-
Chipping Away at Censorship Firewalls with User-Generated Content



Sam Burnett, Nick Feamster, Santosh Vempala
In Proc. of: USENIX Security Symposium, 2010, USENIX
-
Fighting Censorship with Algorithms



Mohammad Mahdian
In Proc. of: International Conference on Fun with Algorithms, 2010, Springer
-
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China



Jong Chun Park, Jedidiah R. Crandall
In Proc. of: Distributed Computing Systems, 2010, IEEE
-
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management



Andreas Pfitzmann, Marit Hansen
Miscellaneous, 2010
Version 0.34
-
On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design



Jon McLachlan, Nicholas Hopper
In Proc. of: Workshop on Privacy in the Electronic Society, 2009, ACM
-
Anonymity and Censorship Resistance in Unstructured Overlay Networks



Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum
In Proc. of: On the Move to Meaningful Internet Systems, 2009, Springer
-
Detecting Forged TCP Reset Packets



Nicholas Weaver, Robin Sommer, Vern Paxson
In Proc. of: Network and Distributed System Security, 2009, The Internet Society
-
SkyF2F: Censorship Resistant via Skype Overlay Network



Shoufeng Cao, Longtao He, Zhongxian Li, Yixian Yang
In Proc. of: International Conference on Information Engineering, 2009, IEEE
-
ConceptDoppler: A Weather Tracker for Internet Censorship



Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, Rich East
In Proc. of: Computer and Communications Security, 2007, ACM
-
The Great DNS Wall of China



Graham Lowe, Patrick Winters, Michael L. Marcus
Technical Report, 2007, New York University
-
Ignoring the Great Firewall of China



Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
In Proc. of: Privacy Enhancing Technologies, 2006, Springer
-
Failures in a Hybrid Content Blocking System



Richard Clayton
In Proc. of: Privacy Enhancing Technologies, 2006, Springer
-
Investigating large-scale Internet content filtering



Sebastian Wolfgarten
Technical Report, 2006, Dublin City University
-
Design of a blocking-resistant anonymity system



Roger Dingledine, Nick Mathewson
Technical Report, 2006, The Tor Project
-
The Eternity Service



Ross J. Anderson
In Proc. of: Theory and Applications of Cryptology, 1996, CTU Publishing House