Selected Research Papers
in Internet Censorship

CensorBib is an archive of selected academic research papers on Internet censorship. If you think I missed a paper, make a pull request. Finally, the net4people/bbs forum has reading groups for many of the papers listed below.
source code icon CensorBib code
update icon Updated: 2025-02-28
Are you a researcher? You may like my book Research Power Tools.
  • Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Shencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedwards, Eric Wustrow
    In Proc. of: Network and Distributed System Security, 2025, The Internet Society
  • The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic Download icon Cached download icon BibTeX download icon Paper link icon
    Diwen Xue, Robert Stanley, Piyush Kumar, Roya Ensafi
    In Proc. of: Network and Distributed System Security, 2025, The Internet Society
  • Is Custom Congestion Control a Bad Idea for Circumvention Tools? Download icon Cached download icon BibTeX download icon Paper link icon
    Wayne Wang, Diwen Xue, Piyush Kumar, Ayush Mishra, Anonymous, Roya Ensafi
    In Proc. of: Free and Open Communications on the Internet, 2025
  • I(ra)nconsistencies: Novel Insights into Iran’s Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Felix Lange, Niklas Niere, Jonathan von Niessen, Dennis Suermann, Nico Heitmann, Juraj Somorovsky
    In Proc. of: Free and Open Communications on the Internet, 2025
  • Extended Abstract: Using TURN Servers for Censorship Evasion Download icon Cached download icon BibTeX download icon Paper link icon
    Afonso Vilalonga, Kevin Gallagher, Osman Yaǧan, João S. Resende, Henrique Domingos
    In Proc. of: Free and Open Communications on the Internet, 2025
  • Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks Download icon Cached download icon BibTeX download icon Paper link icon
    Esther Rodriguez, Lobsang Gyatso, Tenzin Thayai, Jedidiah R. Crandall
    In Proc. of: Free and Open Communications on the Internet, 2025
  • Examining Leading Pakistani Mobile Apps Download icon Cached download icon BibTeX download icon Paper link icon
    Sana Habib, Mohammad Taha Khan, Jedidiah R. Crandall
    In Proc. of: Free and Open Communications on the Internet, 2025
  • Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing Download icon Cached download icon BibTeX download icon Paper link icon
    Sina Kamali, Diogo Barradas
    In Proc. of: Symposium on Security & Privacy, 2025, IEEE
  • Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION Download icon Cached download icon BibTeX download icon Paper link icon
    Sebastian Zillien, Tobias Schmidbauer, Mario Kubek, Jörg Keller, Steffen Wendzel
    In Proc. of: Asia CCS, 2024, ACM
  • Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape Download icon Cached download icon BibTeX download icon Paper link icon
    Diwen Xue, Anna Ablove, Reethika Ramesh, Grace Kwak Danciu, Roya Ensafi
    In Proc. of: USENIX Security Symposium, 2024, USENIX
  • SpotProxy: Rediscovering the Cloud for Censorship Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung
    In Proc. of: USENIX Security Symposium, 2024, USENIX
  • Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy
    In: Privacy Enhancing Technologies, 2024
  • Automatic Generation of Web Censorship Probe Lists Download icon Cached download icon BibTeX download icon Paper link icon
    Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin
    In: Privacy Enhancing Technologies, 2024
  • Extended Abstract: The Impact of Online Censorship on LLMs Download icon Cached download icon BibTeX download icon Paper link icon
    Mohamed Ahmed, Jeffrey Knockel
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Extended Abstract: Leveraging Large Language Models to Identify Internet Censorship through Network Data Download icon Cached download icon BibTeX download icon Paper link icon
    Tianyu Gao, Ping Ji
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Toward Automated DNS Tampering Detection Using Machine Learning Download icon Cached download icon BibTeX download icon Paper link icon
    Paola Calle, Larissa Savitsky, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Shinyoung Cho
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    Michael Pu, Andrew Wang, Anthony Chang, Kieran Quan, Yi Wei Zhou
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels Download icon Cached download icon BibTeX download icon Paper link icon
    Afonso Vilalonga, João S. Resende, Henrique Domingos
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burdens Download icon Cached download icon BibTeX download icon Paper link icon
    Paul Vines
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling Download icon Cached download icon BibTeX download icon Paper link icon
    Philipp Müller, Niklas Niere, Felix Lange, Juraj Somorovsky
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Detecting VPN Traffic through Encapsulated TCP Behavior Download icon Cached download icon BibTeX download icon Paper link icon
    Michelina Hanlon, Gerry Wan, Anna Ascheman, Zakir Durumeric
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Analyzing Prominent Mobile Apps in Latin America Download icon Cached download icon BibTeX download icon Paper link icon
    Beau Kujath, Jeffrey Knockel, Paul Aguilar, Diego Morabito, Masashi Crete-Nishihata, Jedidiah R. Crandall
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Lost in Translation: Characterizing Automated Censorship in Online Translation Services Download icon Cached download icon BibTeX download icon Paper link icon
    Samuel Ruo, Jeffrey Knockel, Zoë Reichert
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Identifying VPN Servers through Graph-Represented Behaviors Download icon Cached download icon BibTeX download icon Paper link icon
    Chenxu Wang, Jiangyi Yin, Zhao Li, Hongbo Xu, Zhongyi Zhang, Qingyun Liu
    In Proc. of: The International World Wide Web Conference, 2024, ACM
  • GFWeb: Measuring the Great Firewall’s Web Censorship at Scale Download icon Cached download icon BibTeX download icon Paper link icon
    Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster
    In Proc. of: USENIX Security Symposium, 2024, USENIX
  • Digital Repression in Palestine Download icon Cached download icon BibTeX download icon Paper link icon
    Ghadeer Awwad, Kentaro Toyama
    In Proc. of: CHI, 2024, ACM
  • How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censorship by Local Governments in China Download icon Cached download icon BibTeX download icon Paper link icon
    Tony Huiquan Zhang, Jianhua Xu, Jinjin Liu
    In: The China Quarterly, 2024, SOAS University of London
  • Snowflake, a censorship circumvention system using temporary WebRTC proxies Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Cecylia Bocovich, Arlo Breault, David Fifield, Serene, Xiaokang Wang
    In Proc. of: USENIX Security Symposium, 2024, USENIX
  • Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments Download icon Cached download icon BibTeX download icon Paper link icon
    Soo-Jin Moon, Milind Srivastava, Yves Bieri, Ruben Martins, Vyas Sekar
    In Proc. of: Symposium on Security & Privacy, 2024, IEEE
  • Out in the Open: On the Implementation of Mobile App Filtering in India Download icon Cached download icon BibTeX download icon Paper link icon
    Devashish Gosain, Kartikey Singh, Rishi Sharma, Jithin S, Sambuddho Chakravaty
    In Proc. of: Passive and Active Measurement Conference, 2024, Springer
  • Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy
    In: Privacy Enhancing Technologies, 2024
  • Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model Download icon Cached download icon BibTeX download icon Paper link icon
    Sultan Almutairi, Yogev Neumann, Khaled Harfoush
    In Proc. of: Consumer Communications & Networking Conference, 2024, IEEE
  • Modeling and Detecting Internet Censorship Events Download icon Cached download icon BibTeX download icon Paper link icon
    Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi
    In Proc. of: Network and Distributed System Security, 2024, The Internet Society
  • Internet Sanctions on Russian Media: Actions and Effects Download icon Cached download icon BibTeX download icon Paper link icon
    John Kristoff, Moritz Müller, Arturo Filastò, Max Resing, Chris Kanich, Niels ten Oever
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Bleeding Wall: A Hematologic Examination on the Great Firewall Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Sakamoto, Elson Wedwards
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Just add WATER: WebAssembly-based Circumvention Transports Download icon Cached download icon BibTeX download icon Paper link icon
    Erik Chi, Gaukas Wang, J. Alex Halderman, Eric Wustrow, Jack Wampler
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Extended Abstract: Traffic Splitting for Pluggable Transports Download icon Cached download icon BibTeX download icon Paper link icon
    Anna Harbluk Lorimer, Rob Jansen, Nick Feamster
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Extended Abstract: Oscur0: One-shot Circumvention without Registration Download icon Cached download icon BibTeX download icon Paper link icon
    Mingye Chen, Jack Wampler, Abdulrahman Alaraj, Gaukas Wang, Eric Wustrow
    In Proc. of: Free and Open Communications on the Internet, 2024
  • Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes Download icon Cached download icon BibTeX download icon Paper link icon
    Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi
    In Proc. of: USENIX Security Symposium, 2024, USENIX
  • NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge Download icon Cached download icon BibTeX download icon Paper link icon
    Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich
    In Proc. of: Symposium on Security & Privacy, 2024, IEEE
  • On Precisely Detecting Censorship Circumvention in Real-World Networks Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen
    In Proc. of: Network and Distributed System Security, 2024, The Internet Society
  • Discop: Provably secure steganography in practice based on “distribution copies” Download icon Cached download icon BibTeX download icon Paper link icon
    Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, Nenghai Yu
    In Proc. of: Symposium on Security & Privacy, 2023, IEEE
  • Poster: Circumventing the GFW with TLS Record Fragmentation Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Niklas Niere, Sven Hebrok, Juraj Somorovsky, Robert Merget
    In Proc. of: Computer and Communications Security, 2023, ACM
  • Website blocking in the European Union: Network interference from the perspective of Open Internet Download icon Cached download icon BibTeX download icon Paper link icon
    Vasilis Ververis, Lucas Lasota, Tatiana Ermakova, Benjamin Fabian
    In: Policy & Internet, 2023
  • Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols Download icon Cached download icon BibTeX download icon Paper link icon
    David Fifield
    2023
  • Destination Unreachable: Characterizing Internet Outages and Shutdowns Download icon Cached download icon BibTeX download icon Paper link icon
    Zachary S. Bischof, Kennedy Pitcher, Esteban Carisimo, Amanda Meng, Rafael Bezerra Nunes, Ramakrishna Padmanabhan, Margaret E. Roberts, Alex C. Snoeren, Alberto Dainotti
    In Proc. of: SIGCOMM, 2023, ACM
  • Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning Download icon Cached download icon BibTeX download icon Paper link icon
    Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran
    In Proc. of: Knowledge Discovery And Data Mining, 2023, ACM
  • A Study of China’s Censorship and Its Evasion Through the Lens of Online Gaming Download icon Cached download icon BibTeX download icon Paper link icon
    Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar
    In Proc. of: USENIX Security Symposium, 2023, USENIX
  • DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang
    In Proc. of: USENIX Security Symposium, 2023, USENIX
  • TELEPATH: A Minecraft-based Covert Communication System Download icon Cached download icon BibTeX download icon Paper link icon
    Zhen Sun, Vitaly Shmatikov
    In Proc. of: Symposium on Security & Privacy, 2023, IEEE
  • Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation Download icon Cached download icon BibTeX download icon Paper link icon
    Mizhang Streisand, Eric Wustrow, Amir Houmansadr
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law Download icon Cached download icon BibTeX download icon Paper link icon
    Mona Wang, Jonathan Mayer
    In Proc. of: Free and Open Communications on the Internet, 2023
  • A Worldwide View of Nation-state Internet Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Alexander Master, Christina Garman
    In Proc. of: Free and Open Communications on the Internet, 2023
  • The Use of Push Notification in Censorship Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    Diwen Xue, Roya Ensafi
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Measuring and Evading Turkmenistan’s Internet Censorship Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin
    In Proc. of: The International World Wide Web Conference, 2023, ACM
  • Detecting Network Interference Without Endpoint Participation Download icon Cached download icon BibTeX download icon Paper link icon
    Sadia Nourin, Kevin Bock, Nguyen Phong Hoang, Dave Levin
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Running a high-performance pluggable transports Tor bridge Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    David Fifield, Linus Nordberg
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Towards a Comprehensive Understanding of Russian Transit Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Aaron Ortwein, Kevin Bock, Dave Levin
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Proteus: Programmable Protocols for Censorship Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    Ryan Wails, Rob Jansen, Aaron Johnson, Micah Sherr
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling Download icon Cached download icon BibTeX download icon Paper link icon
    Watson Jia, Joseph Eichenhofer, Liang Wang, Prateek Mittal
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies Download icon Cached download icon BibTeX download icon Paper link icon
    Nhi Tran, Kevin Bock, Dave Levin
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom Download icon Cached download icon BibTeX download icon Paper link icon
    Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi
    In Proc. of: USENIX Security Symposium, 2023, USENIX
  • How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic Download icon Cached download icon BibTeX download icon Paper link icon
    Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
    In Proc. of: USENIX Security Symposium, 2023, USENIX
  • Lox: Protecting the Social Graph in Bridge Distribution Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Lindsey Tulloch, Ian Goldberg
    In: Privacy Enhancing Technologies, 2023
  • Dolphin: A Cellular Voice Based Internet Shutdown Resistance System Download icon Cached download icon BibTeX download icon Paper link icon
    Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty
    In: Privacy Enhancing Technologies, 2023
  • CensorWatch: On the Implementation of Online Censorship in India Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Divyank Katira, Gurshabad Grover, Kushagra Singh, Varun Bansal
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Chasing Shadows: A security analysis of the ShadowTLS proxy Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Gaukas Wang, Anonymous, Jackson Sippe, Hai Chi, Eric Wustrow
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Security Notions for Fully Encrypted Protocols Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Ellis Fenske, Aaron Johnson
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Advancing the Art of Censorship Data Analysis Download icon Cached download icon BibTeX download icon Paper link icon
    Ram Sundara Raman, Apurva Virkud, Sarah Laplante, Vinicius Fortuna, Roya Ensafi
    In Proc. of: Free and Open Communications on the Internet, 2023
  • Global, Passive Detection of Connection Tampering Download icon Cached download icon BibTeX download icon Paper link icon
    Ram Sundara Raman, Louis-Henri Merino, Kevin Bock, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta
    In Proc. of: SIGCOMM, 2023, ACM
  • In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolvers over Space and Time Download icon Cached download icon BibTeX download icon Paper link icon
    Yanan Cheng, Yali Liu, Chao Li, Zhaoxin Zhang, Ning Li, Yuejin Du
    In: Electronics, 2022, MDPI
  • Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models Download icon Cached download icon BibTeX download icon Paper link icon
    Asim Waheed, Sara Qunaibi, Diogo Barradas, Zachary Weinberg
    In Proc. of: Workshop on Privacy in the Electronic Society, 2022, ACM
  • Network Measurement Methods for Locating and Examining Censorship Devices Download icon Cached download icon BibTeX download icon Paper link icon
    Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan Mayer, Roya Ensafi
    In Proc. of: Emerging Networking Experiments and Technologies, 2022, ACM
  • TSPU: Russia’s Decentralized Censorship System Download icon Cached download icon BibTeX download icon Paper link icon
    Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi
    In Proc. of: Internet Measurement Conference, 2022, ACM
  • Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement Download icon Cached download icon BibTeX download icon Paper link icon
    Abhishek Bhaskar, Paul Pearce
    In Proc. of: USENIX Security Symposium, 2022, USENIX
  • GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies Download icon Cached download icon BibTeX download icon Paper link icon
    Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin
    In Proc. of: USENIX Security Symposium, 2022, USENIX
  • OpenVPN is Open to VPN Fingerprinting Download icon Cached download icon BibTeX download icon Paper link icon
    Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
    In Proc. of: USENIX Security Symposium, 2022, USENIX
  • Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Gabriel Figueira, Diogo Barradas, Nuno Santos
    In Proc. of: Asia CCS, 2022, ACM
  • COVID-19 increased censorship circumvention and access to sensitive topics in China Download icon Cached download icon BibTeX download icon Paper link icon
    Keng-Chi Chang, William R. Hobbs, Margaret E. Roberts, Zachary C. Steinert-Threlkeld
    In: PNAS, 2022, National Academy of Sciences
  • Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering Download icon Cached download icon BibTeX download icon Paper link icon
    Nguyen Phong Hoang, Michalis Polychronakis, Phillipa Gill
    In Proc. of: Passive and Active Measurement Conference, 2022, Springer
  • Understanding Internet Censorship in Europe: The Case of Spain Download icon Cached download icon BibTeX download icon Paper link icon
    Vasilis Ververis, Tatiana Ermakova, Marios Isaakidis, Simone Basso, Benjamin Fabian, Stefania Milan
    In Proc. of: Web Science Conference, 2021, ACM
  • OUStralopithecus: Overt User Simulation for Censorship Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg
    In Proc. of: Workshop on Privacy in the Electronic Society, 2021, ACM
  • Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels Download icon Cached download icon BibTeX download icon Paper link icon
    Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty
    In Proc. of: Asia CCS, 2021, ACM
  • Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China Download icon Cached download icon BibTeX download icon Paper link icon
    Raymond Rambert, Zachary Weinberg, Diogo Barradas, Nicolas Christin
    In Proc. of: WWW, 2021, ACM
  • Meteor: Cryptographically Secure Steganography for Realistic Distributions Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin
    In Proc. of: Computer and Communications Security, 2021, ACM
  • Throttling Twitter: an emerging censorship technique in Russia Download icon Cached download icon BibTeX download icon Paper link icon
    Diwen Xue, Reethika Ramesh, ValdikSS, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi
    In Proc. of: Internet Measurement Conference, 2021, ACM
  • Web censorship measurements of HTTP/3 over QUIC Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Kathrin Elmenhorst, Bertram Schütz, Nils Aschenbruck, Simone Basso
    In Proc. of: Internet Measurement Conference, 2021, ACM
  • Measuring DoT/DoH blocking using OONI Probe: a preliminary study Download icon Cached download icon BibTeX download icon Paper link icon
    Simone Basso
    In Proc. of: DNS Privacy Workshop, 2021, The Internet Society
  • A multi-perspective view of Internet censorship in Myanmar Download icon Cached download icon BibTeX download icon Paper link icon
    Ramakrishna Padmanabhan, Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Doug Madory, Molly Roberts, Alberto Dainotti
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • Measuring QQMail’s Automated Email Censorship in China Download icon Cached download icon BibTeX download icon Paper link icon
    Jeffrey Knockel, Lotus Ruan
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Carmen Kwan, Paul Janiszewski, Shela Qiu, Cathy Wang, Cecylia Bocovich
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes Download icon Cached download icon BibTeX download icon Paper link icon
    Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • BlindTLS: Circumventing TLS-Based HTTPS Censorship Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Sambhav Satija, Rahul Chatterjee
    In Proc. of: Free and Open Communications on the Internet, 2021, ACM
  • Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Mingkui Wei
    In Proc. of: USENIX Security Symposium, 2021, USENIX
  • Weaponizing Middleboxes for TCP Reflected Amplification Download icon Cached download icon BibTeX download icon Paper link icon
    Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
    In Proc. of: USENIX Security Symposium, 2021, USENIX
  • How Great is the Great Firewall? Measuring China’s DNS Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis
    In Proc. of: USENIX Security Symposium, 2021, USENIX
  • Balboa: Bobbing and Weaving around Network Censorship Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Marc B. Rosen, James Parker, Alex J. Malozemoff
    In Proc. of: USENIX Security Symposium, 2021, USENIX
  • Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks Download icon Cached download icon BibTeX download icon Paper link icon
    Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin
    In Proc. of: Workshop on Offensive Technologies, 2021, IEEE
  • Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty
    In: Privacy Enhancing Technologies, 2021, Sciendo
  • Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Diogo Barradas, Nuno Santos
    In Proc. of: Distributed Infrastructure for Common Good, 2020, ACM
  • Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Diogo Barradas, Nuno Santos, Luís Rodrigues, Vítor Nunes
    In Proc. of: Computer and Communications Security, 2020, ACM
  • Censored Planet: An Internet-wide, Longitudinal Censorship Observatory Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi
    In Proc. of: Computer and Communications Security, 2020, ACM
  • How China Detects and Blocks Shadowsocks Download icon Cached download icon BibTeX download icon Paper link icon
    Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr
    In Proc. of: Internet Measurement Conference, 2020, ACM
  • Investigating Large Scale HTTPS Interception in Kazakhstan Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi
    In Proc. of: Internet Measurement Conference, 2020, ACM
  • Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion Download icon Cached download icon BibTeX download icon Paper link icon
    Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin
    In Proc. of: SIGCOMM, 2020, ACM
  • MIMIQ: Masking IPs with Migration in QUIC Download icon Cached download icon BibTeX download icon Paper link icon
    Yashodhar Govil, Liang Wang, Jennifer Rexford
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Fatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Slitheen++: Stealth TLS-based Decoy Routing Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Benedikt Birtel, Christian Rossow
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • Turbo Tunnel, a good way to design censorship circumvention protocols Download icon Cached download icon BibTeX download icon Paper link icon
    David Fifield
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • HTTPT: A Probe-Resistant Proxy Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Sergey Frolov, Eric Wustrow
    In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
  • How India Censors the Web Download icon Cached download icon BibTeX download icon Paper link icon
    Kushagra Singh, Gurshabad Grover, Varun Bansal
    In Proc. of: Web Science, 2020, ACM
  • Characterizing Transnational Internet Performance and the Great Bottleneck of China Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Haixin Duan
    In: Measurement and Analysis of Computing Systems, 2020, ACM
  • SiegeBreaker: An SDN Based Practical Decoy Routing System Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, H. B. Acharya, Sambuddho Chakravarty
    In: Privacy Enhancing Technologies, 2020, Sciendo
  • Running Refraction Networking for Real Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow
    In: Privacy Enhancing Technologies, 2020, Sciendo
  • MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
    In: Privacy Enhancing Technologies, 2020, Sciendo
  • ICLab: A Global, Longitudinal Internet Censorship Measurement Platform Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill
    In Proc. of: Symposium on Security & Privacy, 2020, IEEE
  • SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • MassBrowser: Unblocking the Censored Web for the Masses, by the Masses Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • Detecting Probe-resistant Proxies Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Sergey Frolov, Jack Wampler, Eric Wustrow
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • Measuring the Deployment of Network Censorship Filters at Global Scale Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • Decentralized Control: A Case Study of Russia Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi
    In Proc. of: Network and Distributed System Security, 2020, The Internet Society
  • Protocol Proxy: An FTE-based covert channel Download icon Cached download icon BibTeX download icon Paper link icon
    Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard Brooks
    In: Computers & Security, 2020, Elsevier
  • Conjure: Summoning Proxies from Unused Address Space Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow
    In Proc. of: Computer and Communications Security, 2019, ACM
  • Geneva: Evolving Censorship Evasion Strategies Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Kevin Bock, George Hughey, Xiao Qiang, Dave Levin
    In Proc. of: Computer and Communications Security, 2019, ACM
  • Distributed Detection of Tor Directory Authorities Censorship in Mexico Download icon Cached download icon BibTeX download icon Paper link icon
    Gunnar Eyal Wolf Iszaevich
    In Proc. of: International Conference on Networks, 2019, IARIA
  • Shedding Light on Mobile App Store Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Vasilis Ververis, Marios Isaakidis, Valentin Weber, Benjamin Fabian
    In Proc. of: User Modeling, Adaptation and Personalization, 2019, ACM
  • Improving Meek With Adversarial Techniques Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Steven R. Sheffey, Ferrol Aderholdt
    In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
  • On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Zimo Chai, Amirhossein Ghafari, Amir Houmansadr
    In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
  • An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message Download icon Cached download icon BibTeX download icon Paper link icon
    Ruohan Xiong, Jeffrey Knockel
    In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
  • Measuring I2P Censorship at a Global Scale Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
    In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
  • Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory Download icon Cached download icon BibTeX download icon Paper link icon
    Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags
    In Proc. of: Network and Distributed System Security, 2019, The Internet Society
  • The use of TLS in Censorship Circumvention Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Sergey Frolov, Eric Wustrow
    In Proc. of: Network and Distributed System Security, 2019, The Internet Society
  • On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Joss Wright, Alexander Darer, Oliver Farnan
    In Proc. of: Web Science, 2018, ACM
  • Where The Light Gets In: Analyzing Web Censorship Mechanisms in India Download icon Cached download icon BibTeX download icon Paper link icon
    Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty
    In Proc. of: Internet Measurement Conference, 2018, ACM
  • 403 Forbidden: A Global View of CDN Geoblocking Download icon Cached download icon BibTeX download icon Paper link icon
    Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi
    In Proc. of: Internet Measurement Conference, 2018, ACM
  • An Empirical Study of the I2P Anonymity Network and its Censorship Resistance Download icon Cached download icon BibTeX download icon Paper link icon
    Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis
    In Proc. of: Internet Measurement Conference, 2018, ACM
  • Secure asymmetry and deployability for decoy routing systems Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Cecylia Bocovich, Ian Goldberg
    In: Privacy Enhancing Technologies, 2018, De Gruyter Open
  • Effective Detection of Multimedia Protocol Tunneling using Machine Learning Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Diogo Barradas, Nuno Santos, Luís Rodrigues
    In Proc. of: USENIX Security Symposium, 2018, USENIX
  • Quack: Scalable Remote Measurement of Application-Layer Censorship Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
    In Proc. of: USENIX Security Symposium, 2018, USENIX
  • Incentivizing Censorship Measurements via Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    Aqib Nisar, Aqsa Kashaf, Ihsan Ayyub Qazi, Zartash Afzal Uzmi
    In Proc. of: SIGCOMM, 2018, ACM
  • Analyzing China’s Blocking of Unpublished Tor Bridges Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Arun Dunna, Ciarán O’Brien, Phillipa Gill
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Victoria Manfredi, Pi Songkuntham
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • An analysis of automatic image filtering on WeChat Moments Download icon Cached download icon BibTeX download icon Paper link icon
    Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability Download icon Cached download icon BibTeX download icon Paper link icon
    Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • Automatically Generating a Large, Culture-Specific Blocklist for China Download icon Cached download icon BibTeX download icon Paper link icon
    Austin Hounsel, Prateek Mittal, Nick Feamster
    In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
  • How Sudden Censorship Can Increase Access to Information Download icon Cached download icon BibTeX download icon Paper link icon
    William R. Hobbs, Margaret E. Roberts
    In: American Political Science Review, 2018, Cambridge University Press
  • Detecting Censorable Content on Sina Weibo: A Pilot Study Download icon Cached download icon BibTeX download icon Paper link icon
    Kei Yin Ng, Anna Feldman, Chris Leberknight
    In Proc. of: Hellenic Conference on Artificial Intelligence, 2018, ACM
  • Proof-of-Censorship: Enabling centralized censorship-resistant content providers Download icon Cached download icon BibTeX download icon Paper link icon
    Ian Martiny, Ian Miers, Eric Wustrow
    In Proc. of: Financial Cryptography and Data Security, 2018, Springer
  • The Devil’s in The Details: Placing Decoy Routers in the Internet Download icon Cached download icon BibTeX download icon Paper link icon
    Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, H. B. Acharya
    In Proc. of: ACSAC, 2017, ACM
  • Lavinia: An audit-payment protocol for censorship-resistant storage Download icon Cached download icon BibTeX download icon Paper link icon
    Cecylia Bocovich, John A. Doucette, Ian Goldberg
    In Proc. of: Financial Cryptography and Data Security, 2017, Springer
  • The Random Forest based Detection of Shadowsock’s Traffic Download icon Cached download icon BibTeX download icon Paper link icon
    Ziye Deng, Zihan Liu, Zhouguo Chen, Yubin Guo
    In Proc. of: Intelligent Human-Machine Systems and Cybernetics, 2017, IEEE
  • DeTor: Provably Avoiding Geographic Regions in Tor Download icon Cached download icon BibTeX download icon Paper link icon
    Zhihao Li, Stephen Herwig, Dave Levin
    In Proc. of: USENIX Security Symposium, 2017, USENIX
  • Mending Wall: On the Implementation of Censorship in India Download icon Cached download icon BibTeX download icon Paper link icon
    Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty
    In Proc. of: SecureComm, 2017, Springer
  • Online Advertising under Internet Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Hira Javaid, Hafiz Kamran Khalil, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
    In Proc. of: Hot Topics in Networks, 2017, ACM
  • Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Blocklisting Download icon Cached download icon BibTeX download icon Paper link icon
    Vasilis Ververis, Marios Isaakidis, Chrystalleni Loizidou, Benjamin Fabian
    In Proc. of: E-Democracy, 2017, Springer
  • Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Download icon Cached download icon BibTeX download icon Paper link icon
    Zhen Lu, Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson
    In Proc. of: Middleware, 2017, ACM
  • A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography Download icon Cached download icon BibTeX download icon Paper link icon
    Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill
    In Proc. of: Emerging Networking Experiments and Technologies, 2017, ACM
  • The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks Download icon Cached download icon BibTeX download icon Paper link icon
    Milad Nasr, Hadi Zolfaghari, Amir Houmansadr
    In Proc. of: Computer and Communications Security, 2017, ACM
  • Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy
    In Proc. of: Internet Measurement Conference, 2017, ACM
  • lib·erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently Download icon Cached download icon BibTeX download icon Paper link icon
    Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David Choffnes, Phillipa Gill, Alan Mislove
    In Proc. of: Internet Measurement Conference, 2017, ACM
  • When the Internet Goes Down in Bangladesh Download icon Cached download icon BibTeX download icon Paper link icon
    Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, Neha Kumar
    In Proc. of: Computer-Supported Cooperative Work and Social Computing, 2017, ACM
  • Characterizing the Nature and Dynamics of Tor Exit Blocking Download icon Cached download icon BibTeX download icon Paper link icon
    Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
    In Proc. of: USENIX Security Symposium, 2017, USENIX
  • Global Measurement of DNS Manipulation Download icon Cached download icon BibTeX download icon Paper link icon
    Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
    In Proc. of: USENIX Security Symposium, 2017, USENIX
  • FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs Download icon Cached download icon BibTeX download icon Paper link icon
    Alexander Darer, Oliver Farnan, Joss Wright
    In Proc. of: Network Traffic Measurement and Analysis, 2017, IFIP
  • Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Download icon Cached download icon BibTeX download icon Paper link icon
    Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
    In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
  • The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup Download icon Cached download icon BibTeX download icon Paper link icon
    Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall
    In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
  • Autosonda: Discovering Rules and Triggers of Censorship Devices Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Jill Jermyn, Nicholas Weaver
    In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
  • An ISP-Scale Deployment of TapDance Download icon Cached download icon BibTeX download icon Paper link icon
    Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow
    In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
  • DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams Download icon Cached download icon BibTeX download icon Paper link icon
    Diogo Barradas, Nuno Santos, Luís Rodrigues
    In: Privacy Enhancing Technologies, 2017, De Gruyter Open
  • Topics of Controversy: An Empirical Analysis of Web Censorship Lists Download icon Cached download icon BibTeX download icon Paper link icon
    Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin
    In: Privacy Enhancing Technologies, 2017, De Gruyter Open
  • A Usability Evaluation of Tor Launcher Download icon Cached download icon BibTeX download icon Paper link icon
    Linda Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David Wagner
    In: Privacy Enhancing Technologies, 2017, De Gruyter Open
  • Augur: Internet-Wide Detection of Connectivity Disruptions Download icon Cached download icon BibTeX download icon Paper link icon
    Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson
    In Proc. of: Symposium on Security & Privacy, 2017, IEEE
  • Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers Download icon Cached download icon BibTeX download icon Paper link icon
    Vahid Heydari, Sun-il Kim, Seong-Moo Yoo
    In: Transactions on Information Forensics and Security, 2017, IEEE
  • Internet Censorship in Thailand: User Practices and Potential Threats Download icon Cached download icon BibTeX download icon Paper link icon
    Genevieve Gebhart, Anonymous Author, Tadayoshi Kohno
    In Proc. of: European Symposium on Security & Privacy, 2017, IEEE
  • Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures Download icon Cached download icon BibTeX download icon Paper link icon
    Srdjan Matic, Carmela Troncoso, Juan Caballero
    In Proc. of: Network and Distributed System Security, 2017, The Internet Society
  • Fingerprintability of WebRTC Download icon Cached download icon BibTeX download icon Paper link icon
    David Fifield, Mia Gil Epner
    2016
  • Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses Download icon Cached download icon BibTeX download icon Paper link icon
    Oliver Farnan, Alexander Darer, Joss Wright
    In Proc. of: Workshop on Privacy in the Electronic Society, 2016, ACM
  • Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement Download icon Cached download icon BibTeX download icon Paper link icon
    Cecylia Bocovich, Ian Goldberg
    In Proc. of: Computer and Communications Security, 2016, ACM
  • Game of Decoys: Optimal Decoy Routing Through Game Theory Download icon Cached download icon BibTeX download icon Paper link icon
    Milad Nasr, Amir Houmansadr
    In Proc. of: Computer and Communications Security, 2016, ACM
  • Practical Censorship Evasion Leveraging Content Delivery Networks Download icon Cached download icon BibTeX download icon Paper link icon
    Hadi Zolfaghari, Amir Houmansadr
    In Proc. of: Computer and Communications Security, 2016, ACM
  • DNS-sly: Avoiding Censorship through Network Complexity Download icon Cached download icon BibTeX download icon Paper link icon
    Qurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • Matryoshka: Hiding Secret Communication in Plain Sight Download icon Cached download icon BibTeX download icon Paper link icon
    Iris Safaka, Christina Fragouli, Katerina Argyraki
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • GhostPost: Seamless Restoration of Censored Social Media Posts Download icon Cached download icon BibTeX download icon Paper link icon
    Frederick Douglas, Matthew Caesar
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • Censors’ Delay in Blocking Circumvention Proxies Download icon Cached download icon BibTeX download icon Paper link icon
    David Fifield, Lynn Tsai
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom Download icon Cached download icon BibTeX download icon Paper link icon
    Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu
    In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
  • A Framework for the Game-theoretic Analysis of Censorship Resistance Download icon Cached download icon BibTeX download icon Paper link icon
    Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg
    In: Privacy Enhancing Technologies, 2016, De Gruyter Open
  • SoK: Making Sense of Censorship Resistance Systems Download icon Cached download icon BibTeX download icon Paper link icon
    Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg
    In: Privacy Enhancing Technologies, 2016, De Gruyter Open
  • Salmon: Robust Proxy Distribution for Censorship Circumvention Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar
    In: Privacy Enhancing Technologies, 2016, De Gruyter Open
  • Satellite: Joint Analysis of CDNs and Network-Level Interference Download icon Cached download icon BibTeX download icon Paper link icon
    Will Scott, Thomas Anderson, Tadayoshi Kohno, Arvind Krishnamurthy
    In Proc. of: USENIX Annual Technical Conference, 2016, USENIX
  • Analyzing Internet Censorship in Pakistan Download icon Cached download icon BibTeX download icon Paper link icon
    Giuseppe Aceto, Alessio Botta, Antonio Pescapè, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
    In Proc. of: Research and Technologies for Society and Industry, 2016, IEEE
  • Leveraging Internet Services to Evade Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Apostolis Zarras
    In Proc. of: Information Security Conference, 2016, Springer
  • Games Without Frontiers: Investigating Video Games as a Covert Channel Download icon Cached download icon BibTeX download icon Paper link icon
    Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
    In Proc. of: European Symposium on Security & Privacy, 2016, IEEE
  • Mailet: Instant Social Networking under Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Shuai Li, Nicholas Hopper
    In: Privacy Enhancing Technologies, 2016, De Gruyter Open
  • CovertCast: Using Live Streaming to Evade Internet Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Richard McPherson, Amir Houmansadr, Vitaly Shmatikov
    In: Privacy Enhancing Technologies, 2016, De Gruyter Open
  • SkypeLine: Robust Hidden Data Transmission for VoIP Download icon Cached download icon BibTeX download icon Paper link icon
    Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
    In Proc. of: ASIA Computer and Communications Security, 2016, ACM
  • Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime Download icon Cached download icon BibTeX download icon Paper link icon
    Walid Al-Saqaf
    In: Media and Communication, 2016, Cogitatio
  • SoK: Towards Grounding Censorship Circumvention in Empiricism Download icon Cached download icon BibTeX download icon Paper link icon
    Michael Carl Tschantz, Sadia Afroz, Anonymous, Vern Paxson
    In Proc. of: Symposium on Security & Privacy, 2016, IEEE
  • Alibi Routing Download icon Cached download icon BibTeX download icon Paper link icon
    Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee
    In Proc. of: SIGCOMM, 2015, ACM
  • No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement Download icon Cached download icon BibTeX download icon Paper link icon
    Arvind Narayanan, Bendert Zevenbergen
    In: Technology Science, 2015
  • Rebound: Decoy Routing on Asymmetric Routes Via Error Messages Download icon Cached download icon BibTeX download icon Paper link icon
    Daniel Ellard, Alden Jackson, Christine Jones, Victoria Ursula Manfredi, Timothy Strayer, Bishal Thapa, Megan Van Welie
    In Proc. of: Local Computer Networks, 2015, IEEE
  • Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions Download icon Cached download icon BibTeX download icon Paper link icon
    Chaya Hiruncharoenvate, Zhiyuan Lin, Eric Gilbert
    In Proc. of: International Conference on Web and Social Media, 2015, AAAI
  • A Case for Marrying Censorship Measurements with Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
    In Proc. of: Hot Topics in Networks, 2015, ACM
  • Can Censorship Measurements Be Safe(r)? Download icon Cached download icon BibTeX download icon Paper link icon
    Ben Jones, Nick Feamster
    In Proc. of: Hot Topics in Networks, 2015, ACM
  • Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform Download icon Cached download icon BibTeX download icon Paper link icon
    Paul Vines, Tadayoshi Kohno
    In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
  • Known Unknowns: An Analysis of Twitter Censorship in Turkey Download icon Cached download icon BibTeX download icon Paper link icon
    Rima S. Tanash, Zhouhan Chen, Tanmay Thakur, Dan S. Wallach, Devika Subramanian
    In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
  • Examining How the Great Firewall Discovers Hidden Circumvention Servers Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson
    In Proc. of: Internet Measurement Conference, 2015, ACM
  • CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content Download icon Cached download icon BibTeX download icon Paper link icon
    John Holowczak, Amir Houmansadr
    In Proc. of: Computer and Communications Security, 2015, ACM
  • Seeing through Network-Protocol Obfuscation Download icon Cached download icon BibTeX download icon Paper link icon
    Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton
    In Proc. of: Computer and Communications Security, 2015, ACM
  • Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering Download icon Cached download icon BibTeX download icon Paper link icon
    Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel
    In Proc. of: Ethics in Networked Systems Research, 2015, ACM
  • Understanding Internet Censorship Policy: The Case of Greece Download icon Cached download icon BibTeX download icon Paper link icon
    Vasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros
    In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
  • Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China Download icon Cached download icon BibTeX download icon Paper link icon
    Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall
    In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
  • An Analysis of China’s “Great Cannon” Download icon Cached download icon BibTeX download icon Paper link icon
    Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson
    In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
  • Marionette: A Programmable Network-Traffic Obfuscation System Download icon Cached download icon BibTeX download icon Paper link icon
    Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton
    In Proc. of: USENIX Security Symposium, 2015, USENIX
  • Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests Download icon Cached download icon BibTeX download icon Paper link icon
    Sam Burnett, Nick Feamster
    In Proc. of: SIGCOMM, 2015, ACM
  • Ethical Concerns for Censorship Measurement Download icon Cached download icon BibTeX download icon Paper link icon
    Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver
    In Proc. of: Ethics in Networked Systems Research, 2015, ACM
  • Analyzing the Great Firewall of China Over Space and Time Download icon Cached download icon BibTeX download icon Paper link icon
    Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
    In: Privacy Enhancing Technologies, 2015, De Gruyter Open
  • Blocking-resistant communication through domain fronting Download icon Cached download icon BibTeX download icon Paper link icon
    David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
    In: Privacy Enhancing Technologies, 2015, De Gruyter Open
  • Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data Download icon Cached download icon BibTeX download icon Paper link icon
    Phillipa Gill, Masashi Crete-Nishihata, Jakub Dalek, Sharon Goldberg, Adam Senft, Greg Wiseman
    In: Transactions on the Web, 2015, ACM
  • Internet Censorship detection: A survey Download icon Cached download icon BibTeX download icon Paper link icon
    Giuseppe Aceto, Antonio Pescapè
    In: Computer Networks, 2015, Elsevier
  • Monitoring Internet Censorship with UBICA Download icon Cached download icon BibTeX download icon Paper link icon
    Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
    In Proc. of: Traffic Monitoring and Analysis, 2015, Springer
  • GoHop: Personal VPN to Defend from Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Yuzhi Wang, Ping Ji, Borui Ye, Pengjun Wang, Rong Luo, Huazhong Yang
    In Proc. of: International Conference on Advanced Communication Technology, 2014, IEEE
  • Global Network Interference Detection over the RIPE Atlas Network Download icon Cached download icon BibTeX download icon Paper link icon
    Collin Anderson, Philipp Winter, Roya
    In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
  • Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Anonymous
    In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
  • CloudTransport: Using Cloud Storage for Censorship-Resistant Networking Download icon Cached download icon BibTeX download icon Paper link icon
    Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
    In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
  • Censorship in the Wild: Analyzing Internet Filtering in Syria Download icon Cached download icon BibTeX download icon Paper link icon
    Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar
    In Proc. of: Internet Measurement Conference, 2014, ACM
  • TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography Download icon Cached download icon BibTeX download icon Paper link icon
    Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
    In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
  • Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels Download icon Cached download icon BibTeX download icon Paper link icon
    Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall
    In Proc. of: Passive and Active Measurement Conference, 2014, Springer
  • No Direction Home: The True Cost of Routing Around Decoys Download icon Cached download icon BibTeX download icon Paper link icon
    Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov
    In Proc. of: Network and Distributed System Security, 2014, The Internet Society
  • Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Download icon Cached download icon BibTeX download icon Paper link icon
    Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
    In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
  • Automated Detection and Fingerprinting of Censorship Block Pages Download icon Cached download icon BibTeX download icon Paper link icon
    Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill
    In Proc. of: Internet Measurement Conference, 2014, ACM
  • A Look at the Consequences of Internet Censorship Through an ISP Lens Download icon Cached download icon BibTeX download icon Paper link icon
    Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson
    In Proc. of: Internet Measurement Conference, 2014, ACM
  • Reverse-engineering censorship in China: Randomized experimentation and participant observation Download icon Cached download icon BibTeX download icon Paper link icon
    Gary King, Jennifer Pan, Margaret E. Roberts
    In: Science, 2014, AAAS
  • Facet: Streaming over Videoconferencing for Censorship Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    Shuai Li, Mike Schliep, Nick Hopper
    In Proc. of: Workshop on Privacy in the Electronic Society, 2014, ACM
  • LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Download icon Cached download icon BibTeX download icon Paper link icon
    Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
    In Proc. of: USENIX Security Symposium, 2014, USENIX
  • Toward automatic censorship detection in microblogs Download icon Cached download icon BibTeX download icon Paper link icon
    Donn Morrison
    In Proc. of: Data Mining in Social Networks, 2014
  • VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls Download icon Cached download icon BibTeX download icon Paper link icon
    Daiyuu Nobori, Yasushi Shinjo
    In Proc. of: Networked Systems Design and Implementation, 2014, USENIX
  • Measuring Freenet in the Wild: Censorship-resilience under Observation Download icon Cached download icon BibTeX download icon Paper link icon
    Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
    In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
  • Censorship Resistance as a Side-Effect Download icon Cached download icon BibTeX download icon Paper link icon
    Henry Tan, Micah Sherr
    In Proc. of: Security Protocols, 2014, Springer
  • A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System Download icon Cached download icon BibTeX download icon Paper link icon
    Matthias Wachs, Martin Schanzenbach, Christian Grothoff
    In Proc. of: Cryptology and Network Security, 2014, Springer
  • TapDance: End-to-Middle Anticensorship without Flow Blocking Download icon Cached download icon BibTeX download icon Paper link icon
    Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
    In Proc. of: USENIX Security Symposium, 2014, USENIX
  • Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    David Robinson, Harlan Yu, Anne An
    2013
  • Self-Censorship on Facebook Download icon Cached download icon BibTeX download icon Paper link icon
    Sauvik Das, Adam Kramer
    In Proc. of: Conference on Weblogs and Social Media, 2013, AAAI
  • Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran Download icon Cached download icon BibTeX download icon Paper link icon
    Collin Anderson
    2013
  • Internet Censorship in Iran: A First Look Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Simurgh Aryan, Homa Aryan, J. Alex Halderman
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation Download icon Cached download icon BibTeX download icon Paper link icon
    Karyn Benson, Alberto Dainotti, KC Claffy, Emile Aben
    In Proc. of: Traffic Monitoring and Analysis, 2013, IEEE
  • Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo Download icon Cached download icon BibTeX download icon Paper link icon
    Le Chen, Chi Zhang, Christo Wilson
    In Proc. of: Conference on Online Social Networks, 2013, ACM
  • A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Jakub Dalek, Bennett Haselton, Helmi Noman, Adam Senft, Masashi Crete-Nishihata, Phillipa Gill, Ronald J. Deibert
    In Proc. of: Internet Measurement Conference, 2013, ACM
  • Revealing Middlebox Interference with Tracebox Download icon Cached download icon BibTeX download icon Paper link icon
    Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet
    In Proc. of: Internet Measurement Conference, 2013, ACM
  • Protocol Misidentification Made Easy with Format-Transforming Encryption Download icon Cached download icon BibTeX download icon Paper link icon
    Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
    In Proc. of: Computer and Communications Security, 2013, ACM
  • OSS: Using Online Scanning Services for Censorship Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    David Fifield, Gabi Nakibly, Dan Boneh
    In Proc. of: Privacy Enhancing Technologies Symposium, 2013, Springer
  • Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    John Geddes, Max Schuchard, Nicholas Hopper
    In Proc. of: Computer and Communications Security, 2013, ACM
  • Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts Download icon Cached download icon BibTeX download icon Paper link icon
    Shaddi Hasan, Yahel Ben-David, Giulia Fanti, Eric Brewer, Scott Shenker
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention Download icon Cached download icon BibTeX download icon Paper link icon
    Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer
    In Proc. of: Network and Distributed System Security, 2013, The Internet Society
  • The Parrot is Dead: Observing Unobservable Network Communications Discussion icon Download icon Cached download icon BibTeX download icon Paper link icon
    Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov
    In Proc. of: Symposium on Security & Privacy, 2013, IEEE
  • Message In A Bottle: Sailing Past Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
    In Proc. of: Annual Computer Security Applications Conference, 2013, ACM
  • Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Download icon Cached download icon BibTeX download icon Paper link icon
    Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • The Anatomy of Web Censorship in Pakistan Download icon Cached download icon BibTeX download icon Paper link icon
    Zubair Nabi
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • Identity-Based Steganography and Its Applications to Censorship Resistance Download icon Cached download icon BibTeX download icon Paper link icon
    Tim Ruffing, Jonas Schneider, Aniket Kate
    In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
  • Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest Download icon Cached download icon BibTeX download icon Paper link icon
    John-Paul Verkamp, Minaxi Gupta
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • On the Feasibility of a Censorship Resistant Decentralized Name System Download icon Cached download icon BibTeX download icon Paper link icon
    Matthias Wachs, Martin Schanzenbach, Christian Grothoff
    In Proc. of: Foundations & Practice of Security, 2013, Springer
  • rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Download icon Cached download icon BibTeX download icon Paper link icon
    Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas J. Hopper
    In Proc. of: Network and Distributed System Security, 2013, The Internet Society
  • Towards a Censorship Analyser for Tor Download icon Cached download icon BibTeX download icon Paper link icon
    Philipp Winter
    In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
  • ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Philipp Winter, Tobias Pulls, Juergen Fuss
    In Proc. of: Workshop on Privacy in the Electronic Society, 2013, ACM
  • SWEET: Serving the Web by Exploiting Email Tunnels Download icon Cached download icon BibTeX download icon Paper link icon
    Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, Nikita Borisov
    In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
  • The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Download icon Cached download icon BibTeX download icon Paper link icon
    Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
    In Proc. of: USENIX Security Symposium, 2013, USENIX
  • Technical analysis of the Ultrasurf proxying software Download icon Cached download icon BibTeX download icon Paper link icon
    Jacob Appelbaum
    2012
  • Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resources and Motivations Download icon Cached download icon BibTeX download icon Paper link icon
    Nicholas Aase, Jedidiah R. Crandall, Álvaro Díaz, Jeffrey Knockel, Jorge Ocaña Molinero, Jared Saia, Dan Wallach, Tao Zhu
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • The Hidden Internet of Iran: Private Address Allocations on a National Network Download icon Cached download icon BibTeX download icon Paper link icon
    Collin Anderson
    2012
  • The Collateral Damage of Internet Censorship by DNS Injection Download icon Cached download icon BibTeX download icon Paper link icon
    Sparks, Neo, Tank, Smith, Dozer
    In: SIGCOMM Computer Communication Review, 2012, ACM
  • Hold-On: Protecting Against On-Path DNS Poisoning Download icon Cached download icon BibTeX download icon Paper link icon
    Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li, Vern Paxson
    In Proc. of: Securing and Trusting Internet Names, 2012, National Physical Laboratory
  • Evading Censorship with Browser-Based Proxies Download icon Cached download icon BibTeX download icon Paper link icon
    David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Roger Dingledine, Phil Porras, Dan Boneh
    In Proc. of: Privacy Enhancing Technologies Symposium, 2012, Springer
  • OONI: Open Observatory of Network Interference Download icon Cached download icon BibTeX download icon Paper link icon
    Arturo Filastò, Jacob Appelbaum
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • How Censorship in China Allows Government Criticism but Silences Collective Expression Download icon Cached download icon BibTeX download icon Paper link icon
    Gary King, Jennifer Pan, Margaret E. Roberts
    In: American Political Science Review, 2012
  • Bootstrapping Communications into an Anti-Censorship System Download icon Cached download icon BibTeX download icon Paper link icon
    Patrick Lincoln, Ian Mason, Phillip Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Simpson, Paul Vixie, Dan Boneh
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery Download icon Cached download icon BibTeX download icon Paper link icon
    Zhen Ling, Xinwen Fu, Wei Yu, Junzhou Luo, Ming Yang
    In Proc. of: INFOCOM, 2012, IEEE
  • SkypeMorph: Protocol Obfuscation for Tor Bridges Download icon Cached download icon BibTeX download icon Paper link icon
    Hooman {Mohajeri Moghaddam}, Baiyu Li, Mohammad Derakhshani, Ian Goldberg
    In Proc. of: Computer and Communications Security, 2012, ACM
  • Secure Communication over Diverse Transports Download icon Cached download icon BibTeX download icon Paper link icon
    Michael Rogers, Eleanor Saitta
    In Proc. of: Workshop on Privacy in the Electronic Society, 2012, ACM
  • Routing Around Decoys Download icon Cached download icon BibTeX download icon Paper link icon
    Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper
    In Proc. of: Computer and Communications Security, 2012, ACM
  • Adapting Social Spam Infrastructure for Political Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Kurt Thomas, Chris Grier, Vern Paxson
    In Proc. of: Large-Scale Exploits and Emergent Threats, 2012, USENIX
  • One-way indexing for plausible deniability in censorship resistant storage Download icon Cached download icon BibTeX download icon Paper link icon
    Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • Inferring Mechanics of Web Censorship Around the World Download icon Cached download icon BibTeX download icon Paper link icon
    John-Paul Verkamp, Minaxi Gupta
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing Download icon Cached download icon BibTeX download icon Paper link icon
    Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov
    In Proc. of: Computer and Communications Security, 2012, ACM
  • StegoTorus: A Camouflage Proxy for the Tor Anonymity System Download icon Cached download icon BibTeX download icon Paper link icon
    Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh
    In Proc. of: Computer and Communications Security, 2012, ACM
  • How the Great Firewall of China is Blocking Tor Download icon Cached download icon BibTeX download icon Paper link icon
    Philipp Winter, Stefan Lindskog
    In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
  • Regional Variation in Chinese Internet Filtering Download icon Cached download icon BibTeX download icon Paper link icon
    Joss Wright
    2012
  • BridgeSPA: Improving Tor Bridges with Single Packet Authorization Download icon Cached download icon BibTeX download icon Paper link icon
    Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner
    In Proc. of: Workshop on Privacy in the Electronic Society, 2011, ACM
  • Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing Download icon Cached download icon BibTeX download icon Paper link icon
    Nicholas Jones, Matvey Arye, Jacopo Cesareo, Michael J. Freedman
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • #h00t: Censorship Resistant Microblogging Download icon Cached download icon BibTeX download icon Paper link icon
    Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright
    2011
  • Scrambling for lightweight censorship resistance Download icon Cached download icon BibTeX download icon Paper link icon
    Joseph Bonneau, Rubin Xu
    In Proc. of: Security Protocols, 2011, Springer
  • Analysis of Country-wide Internet Outages Caused by Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapè
    In Proc. of: Internet Measurement Conference, 2011, ACM
  • An anomaly-based censorship-detection system for Tor Download icon Cached download icon BibTeX download icon Paper link icon
    George Danezis
    2011
  • Automated Named Entity Extraction for Tracking Censorship of Current Events Download icon Cached download icon BibTeX download icon Paper link icon
    Antonio M. Espinoza, Jedidiah R. Crandall
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability Download icon Cached download icon BibTeX download icon Paper link icon
    Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
    In Proc. of: Computer and Communications Security, 2011, ACM
  • Decoy Routing: Toward Unblockable Internet Communication Download icon Cached download icon BibTeX download icon Paper link icon
    Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, W. Timothy Strayer
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Bypassing Internet Censorship for News Broadcasters Download icon Cached download icon BibTeX download icon Paper link icon
    Karl Kathuria
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance Download icon Cached download icon BibTeX download icon Paper link icon
    Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Tor Instead of IP Download icon Cached download icon BibTeX download icon Paper link icon
    Vincent Liu, Seungyeop Han, Arvind Krishnamurthy, Thomas Anderson
    In Proc. of: Hot Topics in Networks, 2011, ACM
  • Proximax: A Measurement Based System for Proxies Dissemination Download icon Cached download icon BibTeX download icon Paper link icon
    Damon McCoy, Jose Andre Morales, Kirill Levchenko
    In Proc. of: Financial Cryptography and Data Security, 2011, Springer
  • Mapping Local Internet Control Download icon Cached download icon BibTeX download icon Paper link icon
    Hal Roberts, David Larochelle, Rob Faris, John Palfrey
    In Proc. of: Computer Communications Workshop, 2011, IEEE
  • Infrastructures of Censorship and Lessons from Copyright Resistance Download icon Cached download icon BibTeX download icon Paper link icon
    Wendy Seltzer
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • CensMon: A Web Censorship Monitor Download icon Cached download icon BibTeX download icon Paper link icon
    Andreas Sfakianakis, Elias Athanasopoulos, Sotiris Ioannidis
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Irina Shklovski, Nalini P. Kotamraju
    In Proc. of: CHI, 2011, ACM
  • Dust: A Blocking-Resistant Internet Transport Protocol Download icon Cached download icon BibTeX download icon Paper link icon
    Brandon Wiley
    2011
  • Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics Download icon Cached download icon BibTeX download icon Paper link icon
    Joss Wright, Tulio de Souza, Ian Brown
    In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
  • Telex: Anticensorship in the Network Infrastructure Download icon Cached download icon BibTeX download icon Paper link icon
    Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
    In Proc. of: USENIX Security Symposium, 2011, USENIX
  • Internet Censorship in China: Where Does the Filtering Occur? Download icon Cached download icon BibTeX download icon Paper link icon
    Xueyang Xu, Z. Morley Mao, J. Alex Halderman
    In Proc. of: Passive and Active Measurement Conference, 2011, Springer
  • A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management Download icon Cached download icon BibTeX download icon Paper link icon
    Andreas Pfitzmann, Marit Hansen
    2010
  • Chipping Away at Censorship Firewalls with User-Generated Content Download icon Cached download icon BibTeX download icon Paper link icon
    Sam Burnett, Nick Feamster, Santosh Vempala
    In Proc. of: USENIX Security Symposium, 2010, USENIX
  • Fighting Censorship with Algorithms Download icon Cached download icon BibTeX download icon Paper link icon
    Mohammad Mahdian
    In Proc. of: International Conference on Fun with Algorithms, 2010, Springer
  • Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China Download icon Cached download icon BibTeX download icon Paper link icon
    Jong Chun Park, Jedidiah R. Crandall
    In Proc. of: Distributed Computing Systems, 2010, IEEE
  • On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking resistance design Download icon Cached download icon BibTeX download icon Paper link icon
    Jon McLachlan, Nicholas Hopper
    In Proc. of: Workshop on Privacy in the Electronic Society, 2009, ACM
  • Anonymity and Censorship Resistance in Unstructured Overlay Networks Download icon Cached download icon BibTeX download icon Paper link icon
    Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum
    In Proc. of: On the Move to Meaningful Internet Systems, 2009, Springer
  • SkyF2F: Censorship Resistant via Skype Overlay Network Download icon Cached download icon BibTeX download icon Paper link icon
    Shoufeng Cao, Longtao He, Zhongxian Li, Yixian Yang
    In Proc. of: International Conference on Information Engineering, 2009, IEEE
  • Detecting Forged TCP Reset Packets Download icon Cached download icon BibTeX download icon Paper link icon
    Nicholas Weaver, Robin Sommer, Vern Paxson
    In Proc. of: Network and Distributed System Security, 2009, The Internet Society
  • “Good” Worms and Human Rights Download icon Cached download icon BibTeX download icon Paper link icon
    John Aycock, Alana Maurushat
    In: SIGCAS Computers & Society, 2008, ACM
  • Pass it on: Social Networks Stymie Censors Download icon Cached download icon BibTeX download icon Paper link icon
    Yair Sovran, Alana Libonati, Jinyang Li
    In Proc. of: International Workshop on Peer-to-Peer Systems, 2008, USENIX
  • ConceptDoppler: A Weather Tracker for Internet Censorship Download icon Cached download icon BibTeX download icon Paper link icon
    Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, Rich East
    In Proc. of: Computer and Communications Security, 2007, ACM
  • The Great DNS Wall of China Download icon Cached download icon BibTeX download icon Paper link icon
    Graham Lowe, Patrick Winters, Michael L. Marcus
    2007
  • Investigating large-scale Internet content filtering Download icon Cached download icon BibTeX download icon Paper link icon
    Sebastian Wolfgarten
    2006
  • Ignoring the Great Firewall of China Download icon Cached download icon BibTeX download icon Paper link icon
    Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
    In Proc. of: Privacy Enhancing Technologies, 2006, Springer
  • Failures in a Hybrid Content Blocking System Download icon Cached download icon BibTeX download icon Paper link icon
    Richard Clayton
    In Proc. of: Privacy Enhancing Technologies, 2006, Springer
  • Design of a blocking-resistant anonymity system Download icon Cached download icon BibTeX download icon Paper link icon
    Roger Dingledine, Nick Mathewson
    2006
  • Censorship Resistance Revisited Download icon Cached download icon BibTeX download icon Paper link icon
    Ginger Perng, Michael K. Reiter, Chenxi Wang
    In Proc. of: International Conference on Information Hiding, 2005, Springer
  • The Economics of Censorship Resistance Download icon Cached download icon BibTeX download icon Paper link icon
    George Danezis, Ross Anderson
    In Proc. of: Economics and Information Security, 2004
  • How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing Download icon Cached download icon BibTeX download icon Paper link icon
    Stefan Köpsell, Ulf Hillig
    In Proc. of: Workshop on Privacy in the Electronic Society, 2004, ACM
  • Government mandated blocking of foreign Web content Download icon Cached download icon BibTeX download icon Paper link icon
    Maximillian Dornseif
    In Proc. of: DFN-Arbeitstagung über Kommunikationsnetze, 2003, Gesellschaft für Informatik
  • Thwarting Web Censorship with Untrusted Messenger Discovery Download icon Cached download icon BibTeX download icon Paper link icon
    Nick Feamster, Magdalena Balazinska, Winston Wang, Hari Balakrishnan, David Karger
    In Proc. of: Privacy Enhancing Technologies, 2003, Springer
  • Infranet: Circumventing Web Censorship and Surveillance Download icon Cached download icon BibTeX download icon Paper link icon
    Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger
    In Proc. of: USENIX Security Symposium, 2002, USENIX
  • Anonymizing Censorship Resistant Systems Download icon Cached download icon BibTeX download icon Paper link icon
    Andrei Serjantov
    In Proc. of: International Workshop on Peer-To-Peer Systems, 2002, Springer
  • Dagster: Censorship-Resistant Publishing Without Replication Download icon Cached download icon BibTeX download icon Paper link icon
    Adam Stubblefield, Dan S. Wallach
    2001
  • Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements Download icon Cached download icon BibTeX download icon Paper link icon
    Marc Waldman, David Mazières
    In Proc. of: Computer and Communications Security, 2001, ACM
  • Publius: A robust, tamper-evident, censorship-resistant web publishing system Download icon Cached download icon BibTeX download icon Paper link icon
    Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
    In Proc. of: USENIX Security Symposium, 2000, USENIX
  • The Eternity Service Download icon Cached download icon BibTeX download icon Paper link icon
    Ross J. Anderson
    In Proc. of: Theory and Applications of Cryptology, 1996, CTU Publishing House
Icons taken without modification from Font Awesome.