@article{Heydari2017a,
  author = {Vahid Heydari and Sun-il Kim and Seong-Moo Yoo},
  publisher = {IEEE},
  title = {Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers},
  url = {http://censorbib.nymity.ch/pdf/Heydari2017a.pdf},
  journal = {Transactions on Information Forensics and Security},
  number = {5},
  volume = {12},
  year = {2017},
  pages = {1113--1124},
}
@inproceedings{Gebhart2017a,
  author = {Genevieve Gebhart and Anonymous Author and Tadayoshi Kohno},
  url = {http://homes.cs.washington.edu/~yoshi/papers/GebhartEtAl-IEEEEuroSP.pdf},
  publisher = {IEEE},
  booktitle = {European Symposium on Security \& Privacy},
  year = {2017},
  title = {Internet Censorship in {Thailand}: User Practices and Potential Threats},
}
@techreport{Wolfgarten2006a,
  author = {Sebastian Wolfgarten},
  url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.133.5778&rep=rep1&type=pdf},
  year = {2006},
  institution = {Dublin City University},
  title = {Investigating large-scale {Internet} content filtering},
}
@misc{Pfitzmann2010a,
  author = {Andreas Pfitzmann and Marit Hansen},
  note = {Version 0.34},
  url = {https://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf},
  month = {August},
  year = {2010},
  title = {A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management},
}
@inproceedings{Matic2017a,
  author = {Srdjan Matic and Carmela Troncoso and Juan Caballero},
  url = {https://software.imdea.org/~juanca/papers/torbridges_ndss17.pdf},
  publisher = {The Internet Society},
  booktitle = {Network and Distributed System Security},
  year = {2017},
  title = {Dissecting {Tor} Bridges: a Security Evaluation of Their Private and Public Infrastructures},
}
@inproceedings{Dornseif2003a,
  author = {Maximillian Dornseif},
  publisher = {Gesellschaft f\"{u}r Informatik},
  title = {Government mandated blocking of foreign {Web} content},
  url = {https://subs.emis.de/LNI/Proceedings/Proceedings44/GI-Proceedings.44.innen-1.pdf},
  booktitle = {DFN-Arbeitstagung \"{u}ber Kommunikationsnetze},
  year = {2003},
  pages = {617--647},
}
@inproceedings{Farnan2016a,
  author = {Oliver Farnan and Alexander Darer and Joss Wright},
  url = {http://dl.acm.org/authorize?N25517},
  publisher = {ACM},
  booktitle = {Workshop on Privacy in the Electronic Society},
  year = {2016},
  title = {Poisoning the Well -- Exploring the {Great} {Firewall}'s Poisoned {DNS} Responses},
}
@inproceedings{Bocovich2016a,
  author = {Cecylia Bocovich and Ian Goldberg},
  url = {https://cypherpunks.ca/~iang/pubs/slitheen-ccs16.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2016},
  title = {{Slitheen}: Perfectly Imitated Decoy Routing through Traffic Replacement},
}
@inproceedings{Nasr2016a,
  author = {Milad Nasr and Amir Houmansadr},
  url = {https://people.cs.umass.edu/~amir/papers/GameOfDecoys.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2016},
  title = {Game of Decoys: Optimal Decoy Routing Through Game Theory},
}
@inproceedings{Zolfaghari2016a,
  author = {Hadi Zolfaghari and Amir Houmansadr},
  url = {https://people.cs.umass.edu/~amir/papers/CDNReaper.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2016},
  title = {Practical Censorship Evasion Leveraging Content Delivery Networks},
}
@inproceedings{Akbar2016a,
  author = {Qurat-Ul-Ann Danyal Akbar and Marcel Flores and Aleksandar Kuzmanovic},
  url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-akbar.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2016},
  title = {{DNS}-sly: Avoiding Censorship through Network Complexity},
}
@inproceedings{Safaka2016a,
  author = {Iris Safaka and Christina Fragouli and Katerina Argyraki},
  url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-safaka-revised.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2016},
  title = {{Matryoshka}: Hiding Secret Communication in Plain Sight},
}
@inproceedings{Douglas2016b,
  author = {Frederick Douglas and Matthew Caesar},
  url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-douglas.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2016},
  title = {{GhostPost}: Seamless Restoration of Censored Social Media Posts},
}
@inproceedings{Fifield2016a,
  author = {David Fifield and Lynn Tsai},
  url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-fifield.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2016},
  title = {Censors' Delay in Blocking Circumvention Proxies},
}
@inproceedings{Singh2016a,
  author = {Rachee Singh and Hyungjoon Koo and Najmehalsadat Miramirkhani and Fahimeh Mirhaj and Phillipa Gill and Leman Akoglu},
  url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-singh.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2016},
  title = {The Politics of Routing: Investigating the Relationship Between {AS} Connectivity and {Internet} Freedom},
}
@article{Elahi2016a,
  author = {Tariq Elahi and John A. Doucette and Hadi Hosseini and Steven J. Murdoch and Ian Goldberg},
  publisher = {De Gruyter Open},
  title = {A Framework for the Game-theoretic Analysis of Censorship Resistance},
  url = {http://www.degruyter.com/downloadpdf/j/popets.2016.2016.issue-4/popets-2016-0030/popets-2016-0030.xml},
  journal = {Privacy Enhancing Technologies},
  number = {4},
  volume = {2016},
  year = {2016},
  pages = {83--101},
}
@article{Khattak2016a,
  author = {Sheharbano Khattak and Tariq Elahi and Laurent Simon and Colleen M. Swanson and Steven J. Murdoch and Ian Goldberg},
  publisher = {De Gruyter Open},
  title = {{SoK}: Making Sense of Censorship Resistance Systems},
  url = {http://www.degruyter.com/downloadpdf/j/popets.2016.2016.issue-4/popets-2016-0028/popets-2016-0028.xml},
  journal = {Privacy Enhancing Technologies},
  number = {4},
  volume = {2016},
  year = {2016},
  pages = {37--61},
}
@article{Douglas2016a,
  author = {Frederick Douglas and Rorshach and Weiyang Pan and Matthew Caesar},
  publisher = {De Gruyter Open},
  title = {{Salmon}: Robust Proxy Distribution for Censorship Circumvention},
  url = {http://www.degruyter.com/downloadpdf/j/popets.2016.2016.issue-4/popets-2016-0026/popets-2016-0026.xml},
  journal = {Privacy Enhancing Technologies},
  number = {4},
  volume = {2016},
  year = {2016},
  pages = {4--20},
}
@inproceedings{Scott2016a,
  author = {Will Scott and Thomas Anderson and Tadayoshi Kohno and Arvind Krishnamurthy},
  url = {https://www.usenix.org/system/files/conference/atc16/atc16_paper-scott.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Annual Technical Conference},
  year = {2016},
  title = {{Satellite}: Joint Analysis of {CDN}s and Network-Level Interference},
}
@inproceedings{Aceto2016a,
  author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and M. Faheem Awan and Tahir Ahmad and Saad Qaisar},
  url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2016analyzing.pdf},
  publisher = {IEEE},
  booktitle = {Research and Technologies for Society and Industry},
  year = {2016},
  title = {Analyzing {Internet} Censorship in {Pakistan}},
}
@inproceedings{Zarras2016a,
  author = {Apostolis Zarras},
  url = {https://www.sec.in.tum.de/assets/Uploads/camouflage.pdf},
  publisher = {Springer},
  booktitle = {Information Security Conference},
  year = {2016},
  title = {Leveraging {Internet} Services to Evade Censorship},
}
@inproceedings{Hahn2016a,
  author = {Bridger Hahn and Rishab Nithyanand and Phillipa Gill and Rob Johnson},
  url = {http://www3.cs.stonybrook.edu/~phillipa/papers/castle.pdf},
  publisher = {IEEE},
  booktitle = {European Symposium on Security \& Privacy},
  year = {2016},
  title = {Games Without Frontiers: Investigating Video Games as a Covert Channel},
}
@inproceedings{Ellard2015a,
  author = {Daniel Ellard and Alden Jackson and Christine Jones and Victoria Ursula Manfredi and Timothy Strayer and Bishal Thapa and Megan Van Welie},
  url = {http://www.ir.bbn.com/documents/articles/Rebound-LCN15.pdf},
  publisher = {IEEE},
  booktitle = {Local Computer Networks},
  year = {2015},
  title = {{Rebound}: Decoy Routing on Asymmetric Routes Via Error Messages},
}
@article{Li2016a,
  author = {Shuai Li and Nicholas Hopper},
  publisher = {De Gruyter Open},
  title = {{Mailet}: Instant Social Networking under Censorship},
  url = {http://www.degruyter.com/downloadpdf/j/popets.2015.2016.issue-2/popets-2016-0011/popets-2016-0011.xml},
  journal = {Privacy Enhancing Technologies},
  number = {2},
  volume = {2016},
  year = {2016},
  pages = {175--192},
}
@article{McPherson2016a,
  author = {Richard McPherson and Amir Houmansadr and Vitaly Shmatikov},
  publisher = {De Gruyter Open},
  title = {{CovertCast}: Using Live Streaming to Evade Internet Censorship},
  url = {http://www.degruyter.com/downloadpdf/j/popets.2016.2016.issue-3/popets-2016-0024/popets-2016-0024.xml},
  journal = {Privacy Enhancing Technologies},
  number = {3},
  volume = {2016},
  year = {2016},
  pages = {212--225},
}
@inproceedings{Kohls2016a,
  author = {Katharina Kohls and Thorsten Holz and Dorothea Kolossa and Christina P\"{o}pper},
  url = {https://hgi.rub.de/media/emma/veroeffentlichungen/2016/03/17/SkypeLine-AsiaCCS16.pdf},
  publisher = {ACM},
  booktitle = {ASIA Computer and Communications Security},
  year = {2016},
  title = {{SkypeLine}: Robust Hidden Data Transmission for {VoIP}},
}
@article{Al-Saqaf2016a,
  author = {Walid Al-Saqaf},
  publisher = {Cogitatio},
  title = {{Internet} Censorship Circumvention Tools: Escaping the Control of the {Syrian} Regime},
  url = {http://www.cogitatiopress.com/ojs/index.php/mediaandcommunication/article/download/357/357},
  journal = {Media and Communication},
  number = {1},
  volume = {4},
  year = {2016},
}
@inproceedings{Tschantz2016a,
  author = {Michael Carl Tschantz and Sadia Afroz and Anonymous and Vern Paxson},
  url = {https://www.eecs.berkeley.edu/~sa499/papers/oakland2016.pdf},
  publisher = {IEEE},
  booktitle = {Symposium on Security \& Privacy},
  year = {2016},
  title = {{SoK}: Towards Grounding Censorship Circumvention in Empiricism},
}
@inproceedings{Hiruncharoenvate2015a,
  author = {Chaya Hiruncharoenvate and Zhiyuan Lin and Eric Gilbert},
  url = {https://comp.social.gatech.edu/papers/icwsm15.algorithmically.hiruncharoenvate.pdf},
  publisher = {AAAI},
  booktitle = {International Conference on Web and Social Media},
  year = {2015},
  title = {Algorithmically Bypassing Censorship on {Sina Weibo} with Nondeterministic Homophone Substitutions},
}
@inproceedings{Nisar2015a,
  author = {Aqib Nisar and Aqsa Kashaf and Zartash Afzal Uzmi and Ihsan Ayyub Qazi},
  url = {http://conferences.sigcomm.org/hotnets/2015/papers/nisar.pdf},
  publisher = {ACM},
  booktitle = {Hot Topics in Networks},
  year = {2015},
  title = {A Case for Marrying Censorship Measurements with Circumvention},
}
@inproceedings{Jones2015b,
  author = {Ben Jones and Nick Feamster},
  url = {http://conferences.sigcomm.org/hotnets/2015/papers/jones.pdf},
  publisher = {ACM},
  booktitle = {Hot Topics in Networks},
  year = {2015},
  title = {Can Censorship Measurements Be Safe(r)?},
}
@inproceedings{Vines2015a,
  author = {Paul Vines and Tadayoshi Kohno},
  url = {http://censorbib.nymity.ch/pdf/Vines2015a.pdf},
  publisher = {ACM},
  booktitle = {Workshop on Privacy in the Electronic Society},
  year = {2015},
  title = {{Rook}: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform},
}
@inproceedings{Tanash2015a,
  author = {Rima S. Tanash and Zhouhan Chen and Tanmay Thakur and Dan S. Wallach and Devika Subramanian},
  url = {http://censorbib.nymity.ch/pdf/Tanash2015a.pdf},
  publisher = {ACM},
  booktitle = {Workshop on Privacy in the Electronic Society},
  year = {2015},
  title = {Known Unknowns: An Analysis of {Twitter} Censorship in {Turkey}},
}
@inproceedings{Ensafi2015b,
  author = {Roya Ensafi and David Fifield and Philipp Winter and Nick Feamster and Nicholas Weaver and Vern Paxson},
  url = {http://conferences2.sigcomm.org/imc/2015/papers/p445.pdf},
  publisher = {ACM},
  booktitle = {Internet Measurement Conference},
  year = {2015},
  title = {Examining How the {Great Firewall} Discovers Hidden Circumvention Servers},
}
@inproceedings{Holowczak2015a,
  author = {John Holowczak and Amir Houmansadr},
  url = {https://people.cs.umass.edu/~amir/papers/CacheBrowser.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2015},
  title = {{CacheBrowser}: Bypassing {Chinese} Censorship without Proxies Using Cached Content},
}
@inproceedings{Wang2015a,
  author = {Liang Wang and Kevin P. Dyer and Aditya Akella and Thomas Ristenpart and Thomas Shrimpton},
  url = {http://pages.cs.wisc.edu/~liangw/pub/ccsfp653-wangA.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2015},
  title = {Seeing through Network-Protocol Obfuscation},
}
@inproceedings{Crandall2015a,
  author = {Jedidiah R. Crandall and Masashi Crete-Nishihata and Jeffrey Knockel},
  url = {http://ensr.oii.ox.ac.uk/wp-content/uploads/2015/07/Forgive-Us-Our-SYNs-Technical-and-Ethical-Considerations-for-Measuring-Internet-Censorship.pdf},
  publisher = {ACM},
  booktitle = {Ethics in Networked Systems Research},
  year = {2015},
  title = {Forgive Us our {SYN}s: Technical and Ethical Considerations for Measuring {Internet} Filtering},
}
@inproceedings{Smits2011a,
  author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner},
  url = {http://www.cypherpunks.ca/~iang/pubs/bridgespa-wpes.pdf},
  publisher = {ACM},
  booktitle = {Workshop on Privacy in the Electronic Society},
  year = {2011},
  title = {{BridgeSPA}: Improving {Tor} Bridges with Single Packet Authorization},
}
@inproceedings{Ververis2015a,
  author = {Vasilis Ververis and George Kargiotakis and Arturo Filast\`{o} and Benjamin Fabian and Afentoulis Alexandros},
  url = {https://www.usenix.org/system/files/conference/foci15/foci15-paper-ververis-updated-2.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2015},
  title = {Understanding {Internet} Censorship Policy: The Case of {Greece}},
}
@inproceedings{Knockel2015a,
  author = {Jeffrey Knockel and Masashi Crete-Nishihata and Jason Q. Ng and Adam Senft and Jedidiah R. Crandall},
  url = {https://www.usenix.org/system/files/conference/foci15/foci15-paper-knockel.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2015},
  title = {Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in {China}},
}
@inproceedings{Marczak2015a,
  author = {Bill Marczak and Nicholas Weaver and Jakub Dalek and Roya Ensafi and David Fifield and Sarah McKune and Arn Rey and John Scott-Railton and Ron Deibert and Vern Paxson},
  url = {https://www.usenix.org/system/files/conference/foci15/foci15-paper-marczak.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2015},
  title = {An Analysis of {China}'s ``{Great Cannon}''},
}
@inproceedings{Dyer2015a,
  author = {Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton},
  url = {https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-dyer.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security Symposium},
  year = {2015},
  title = {{Marionette}: A Programmable Network-Traffic Obfuscation System},
}
@inproceedings{Burnett2015a,
  author = {Sam Burnett and Nick Feamster},
  url = {http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p653.pdf},
  publisher = {ACM},
  booktitle = {SIGCOMM},
  year = {2015},
  title = {{Encore}: Lightweight Measurement of Web Censorship with Cross-Origin Requests},
}
@inproceedings{Jones2011a,
  author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo and Michael J. Freedman},
  url = {http://www.cs.princeton.edu/~najones/publications/cor-foci11.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2011},
  title = {Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing},
}
@inproceedings{Jones2015a,
  author = {Ben Jones and Roya Ensafi and Nick Feamster and Vern Paxson and Nick Weaver},
  url = {http://www.icir.org/vern/papers/censorship-meas.nsethics15.pdf},
  publisher = {ACM},
  booktitle = {Ethics in Networked Systems Research},
  year = {2015},
  title = {Ethical Concerns for Censorship Measurement},
}
@article{Ensafi2015a,
  author = {Roya Ensafi and Philipp Winter and Abdullah Mueen and Jedidiah R. Crandall},
  publisher = {De Gruyter Open},
  title = {Analyzing the {Great Firewall} of {China} Over Space and Time},
  url = {http://censorbib.nymity.ch/pdf/Ensafi2015a.pdf},
  journal = {Privacy Enhancing Technologies},
  number = {1},
  volume = {2015},
  year = {2015},
}
@article{Fifield2015a,
  author = {David Fifield and Chang Lan and Rod Hynes and Percy Wegmann and Vern Paxson},
  publisher = {De Gruyter Open},
  title = {Blocking-resistant communication through domain fronting},
  url = {http://www.icir.org/vern/papers/meek-PETS-2015.pdf},
  journal = {Privacy Enhancing Technologies},
  number = {2},
  volume = {2015},
  year = {2015},
}
@inproceedings{Backes2009a,
  author = {Michael Backes and Marek Hamerlik and Alessandro Linari and Matteo Maffei and Christos Tryfonopoulos and Gerhard Weikum},
  url = {https://sps.cs.uni-saarland.de/maffei/resources/coopis.pdf},
  publisher = {Springer},
  booktitle = {On the Move to Meaningful Internet Systems},
  year = {2009},
  title = {Anonymity and Censorship Resistance in Unstructured Overlay Networks},
}
@inproceedings{Wang2014a,
  author = {Yuzhi Wang and Ping Ji and Borui Ye and Pengjun Wang and Rong Luo and Huazhong Yang},
  url = {http://censorbib.nymity.ch/pdf/Wang2014a.pdf},
  publisher = {IEEE},
  booktitle = {International Conference on Advanced Communication Technology},
  year = {2014},
  title = {{GoHop}: Personal {VPN} to Defend from Censorship},
}
@article{Gill2015a,
  author = {Phillipa Gill and Masashi Crete-Nishihata and Jakub Dalek and Sharon Goldberg and Adam Senft and Greg Wiseman},
  publisher = {ACM},
  title = {Characterizing Web Censorship Worldwide: Another Look at the {OpenNet Initiative} Data},
  url = {http://censorbib.nymity.ch/pdf/Gill2015a.pdf},
  journal = {Transactions on the Web},
  number = {1},
  volume = {9},
  year = {2015},
}
@inproceedings{Aase2012a,
  author = {Nicholas Aase and Jedidiah R. Crandall and \'{A}lvaro D\'{i}az and Jeffrey Knockel and Jorge Oca\ Molinero and Jared Saia and Dan Wallach and Tao Zhu},
  url = {https://www.usenix.org/system/files/conference/foci12/foci12-final17.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2012},
  title = {Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations},
}
@article{Aceto2015b,
  author = {Giuseppe Aceto and Antonio Pescap\`{e}},
  url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015internet_censorship_detection__a_survey.pdf},
  publisher = {Elsevier},
  journal = {Computer Networks},
  year = {2015},
  title = {{Internet} Censorship detection: A survey},
}
@inproceedings{Aceto2015a,
  author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and Nick Feamster and M. Faheem Awan and Tahir Ahmad and Saad Qaisar},
  url = {http://wpage.unina.it/giuseppe.aceto/pub/aceto2015monitoring_TMA.pdf},
  publisher = {Springer},
  booktitle = {Traffic Monitoring and Analysis},
  year = {2015},
  title = {Monitoring {Internet} Censorship with {UBICA}},
}
@inproceedings{Anderson1996a,
  author = {Ross J. Anderson},
  publisher = {CTU Publishing House},
  title = {The {Eternity} Service},
  url = {http://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf},
  booktitle = {Theory and Applications of Cryptology},
  year = {1996},
  pages = {242--253},
}
@techreport{Anderson2012a,
  author = {Collin Anderson},
  url = {http://arxiv.org/pdf/1209.6398v1},
  year = {2012},
  institution = {},
  title = {The Hidden {Internet} of {Iran}: Private Address Allocations on a National Network},
}
@techreport{Anderson2013a,
  author = {Collin Anderson},
  url = {http://arxiv.org/pdf/1306.4361v1.pdf},
  year = {2013},
  institution = {University of Pennsylvania},
  title = {Dimming the {Internet}: Detecting Throttling as a Mechanism of Censorship in {Iran}},
}
@inproceedings{Anderson2014a,
  author = {Collin Anderson and Philipp Winter and Roya},
  url = {https://www.usenix.org/system/files/conference/foci14/foci14-anderson.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2014},
  title = {Global Network Interference Detection over the {RIPE Atlas} Network},
}
@article{Sparks2012a,
  author = {Sparks and Neo and Tank and Smith and Dozer},
  publisher = {ACM},
  title = {The Collateral Damage of {Internet} Censorship by {DNS} Injection},
  url = {http://conferences.sigcomm.org/sigcomm/2012/paper/ccr-paper266.pdf},
  journal = {SIGCOMM Computer Communication Review},
  number = {3},
  volume = {42},
  year = {2012},
  pages = {21--27},
}
@inproceedings{Anonymous2014a,
  author = {Anonymous},
  url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2014},
  title = {Towards a Comprehensive Picture of the {Great Firewall}'s {DNS} Censorship},
}
@inproceedings{Aryan2013a,
  author = {Simurgh Aryan and Homa Aryan and J. Alex Halderman},
  url = {http://censorbib.nymity.ch/pdf/Aryan2013a.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2013},
  title = {{Internet} Censorship in {Iran}: A First Look},
}
@article{Aycock2008a,
  author = {John Aycock and Alana Maurushat},
  publisher = {ACM},
  title = {``Good'' Worms and Human Rights},
  url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1412007},
  journal = {SIGCAS Computers \& Society},
  number = {1},
  volume = {38},
  year = {2008},
  pages = {28--39},
}
@techreport{Bachrach2011a,
  author = {Dustin Bachrach and Christopher Nunu and Dan S. Wallach and Matthew Wright},
  url = {http://arxiv.org/pdf/1109.6874v1.pdf},
  year = {2011},
  institution = {Rice University and University of Texas at Arlington},
  title = {{\#h00t}: Censorship Resistant Microblogging},
}
@inproceedings{Benson2013a,
  author = {Karyn Benson and Alberto Dainotti and Kimberly Claffy and Emile Aben},
  url = {http://cseweb.ucsd.edu/~kbenson/papers/tma13.pdf},
  publisher = {IEEE},
  booktitle = {Traffic Monitoring and Analysis},
  year = {2013},
  title = {Gaining Insight into {AS}-level Outages through Analysis of {Internet} Background Radiation},
}
@inproceedings{Bonneau2011a,
  author = {Joseph Bonneau and Rubin Xu},
  url = {http://www.jbonneau.com/doc/BX11-SPW-scrambling_censorship.pdf},
  publisher = {Springer},
  booktitle = {Security Protocols},
  year = {2011},
  title = {Scrambling for lightweight censorship resistance},
}
@inproceedings{Brubaker2014a,
  author = {Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov},
  url = {https://petsymposium.org/2014/papers/paper_68.pdf},
  publisher = {Springer},
  booktitle = {Privacy Enhancing Technologies Symposium},
  year = {2014},
  title = {{CloudTransport}: Using Cloud Storage for Censorship-Resistant Networking},
}
@inproceedings{Burnett2010a,
  author = {Sam Burnett and Nick Feamster and Santosh Vempala},
  url = {http://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security Symposium},
  year = {2010},
  title = {Chipping Away at Censorship Firewalls with User-Generated Content},
}
@inproceedings{Cao2009a,
  author = {Shoufeng Cao and Longtao He and Zhongxian Li and Yixian Yang},
  publisher = {IEEE},
  title = {{SkyF2F}: Censorship Resistant via {Skype} Overlay Network},
  url = {http://censorbib.nymity.ch/pdf/Cao2009a.pdf},
  booktitle = {International Conference on Information Engineering},
  year = {2009},
  pages = {350--354},
}
@inproceedings{Chaabane2014a,
  author = {Abdelberi Chaabane and Terence Chen and Mathieu Cunche and Emiliano De Cristofaro and Arik Friedman and Mohamed Ali Kaafar},
  url = {http://conferences2.sigcomm.org/imc/2014/papers/p285.pdf},
  publisher = {ACM},
  booktitle = {Internet Measurement Conference},
  year = {2014},
  title = {Censorship in the Wild: Analyzing {Internet} Filtering in {Syria}},
}
@inproceedings{Chen2013a,
  author = {Le Chen and Chi Zhang and Christo Wilson},
  url = {http://www.ccs.neu.edu/home/cbw/pdf/weibo-cosn13.pdf},
  publisher = {ACM},
  booktitle = {Conference on Online Social Networks},
  year = {2013},
  title = {Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on {Sina Weibo}},
}
@inproceedings{Clayton2006a,
  author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
  publisher = {Springer},
  title = {Ignoring the {Great Firewall} of {China}},
  url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
  booktitle = {Privacy Enhancing Technologies},
  year = {2006},
  pages = {20--35},
}
@inproceedings{Clayton2006b,
  author = {Richard Clayton},
  publisher = {Springer},
  title = {Failures in a Hybrid Content Blocking System},
  url = {http://www.cl.cam.ac.uk/~rnc1/cleanfeed.pdf},
  booktitle = {Privacy Enhancing Technologies},
  year = {2006},
  pages = {78--92},
}
@inproceedings{Connolly2014a,
  author = {Christopher Connolly and Patrick Lincoln and Ian Mason and Vinod Yegneswaran},
  url = {https://www.usenix.org/system/files/conference/foci14/foci14-connolly.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2014},
  title = {{TRIST}: Circumventing Censorship with Transcoding-Resistant Image Steganography},
}
@inproceedings{Crandall2007a,
  author = {Jedidiah R. Crandall and Daniel Zinn and Michael Byrd and Earl Barr and Rich East},
  publisher = {ACM},
  title = {{ConceptDoppler}: A Weather Tracker for {Internet} Censorship},
  url = {http://www.csd.uoc.gr/~hy558/papers/conceptdoppler.pdf},
  booktitle = {Computer and Communications Security},
  year = {2007},
  pages = {352--365},
}
@inproceedings{Dainotti2011a,
  author = {Alberto Dainotti and Claudio Squarcella and Emile Aben and Kimberly C. Claffy and Marco Chiesa and Michele Russo and Antonio Pescap\'{e}},
  publisher = {ACM},
  title = {Analysis of Country-wide {Internet} Outages Caused by Censorship},
  url = {http://conferences.sigcomm.org/imc/2011/docs/p1.pdf},
  booktitle = {Internet Measurement Conference},
  year = {2011},
  pages = {1--18},
}
@inproceedings{Dalek2013a,
  author = {Jakub Dalek and Bennett Haselton and Helmi Noman and Adam Senft and Masashi Crete-Nishihata and Phillipa Gill and Ronald J. Deibert},
  url = {http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf},
  publisher = {ACM},
  booktitle = {Internet Measurement Conference},
  year = {2013},
  title = {A Method for Identifying and Confirming the Use of {URL} Filtering Products for Censorship},
}
@inproceedings{Danezis2004a,
  author = {George Danezis and Ross Anderson},
  url = {http://www.cl.cam.ac.uk/~rja14/Papers/redblue.pdf},
  booktitle = {Economics and Information Security},
  year = {2004},
  title = {The Economics of Censorship Resistance},
}
@techreport{Danezis2011a,
  author = {George Danezis},
  url = {https://research.torproject.org/techreports/detector-2011-09-09.pdf},
  year = {2011},
  institution = {The Tor Project},
  title = {An anomaly-based censorship-detection system for {Tor}},
}
@inproceedings{Detal2013a,
  author = {Gregory Detal and Benjamin Hesmans and Olivier Bonaventure and Yves Vanaubel and Benoit Donnet},
  url = {http://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf},
  publisher = {ACM},
  booktitle = {Internet Measurement Conference},
  year = {2013},
  title = {Revealing Middlebox Interference with {Tracebox}},
}
@techreport{Dingledine2006a,
  author = {Roger Dingledine and Nick Mathewson},
  url = {https://svn.torproject.org/svn/projects/design-paper/blocking.pdf},
  year = {2006},
  institution = {The Tor Project},
  title = {Design of a blocking-resistant anonymity system},
}
@inproceedings{Duan2012a,
  author = {Haixin Duan and Nicholas Weaver and Zongxu Zhao and Meng Hu and Jinjin Liang and Jian Jiang and Kang Li and Vern Paxson},
  url = {http://conferences.npl.co.uk/satin/papers/satin2012-Duan.pdf},
  publisher = {National Physical Laboratory},
  booktitle = {Securing and Trusting Internet Names},
  year = {2012},
  title = {{Hold-On}: Protecting Against On-Path {DNS} Poisoning},
}
@inproceedings{Dyer2013a,
  author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
  url = {http://eprint.iacr.org/2012/494.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2013},
  title = {Protocol Misidentification Made Easy with {Format-Transforming Encryption}},
}
@inproceedings{Ensafi2014a,
  author = {Roya Ensafi and Jeffrey Knockel and Geoffrey Alexander and Jedidiah R. Crandall},
  url = {http://arxiv.org/pdf/1312.5739.pdf},
  publisher = {Springer},
  booktitle = {Passive and Active Measurement Conference},
  year = {2014},
  title = {Detecting Intentional Packet Drops on the {Internet} via {TCP/IP} Side Channels},
}
@inproceedings{Espinoza2011a,
  author = {Antonio M. Espinoza and Jedidiah R. Crandall},
  url = {http://static.usenix.org/event/foci11/tech/final_files/Espinoza.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2011},
  title = {Automated Named Entity Extraction for Tracking Censorship of Current Events},
}
@inproceedings{Feamster2002a,
  author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
  url = {http://wind.lcs.mit.edu/papers/usenixsec2002.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security Symposium},
  year = {2002},
  title = {{Infranet}: Circumventing Web Censorship and Surveillance},
}
@inproceedings{Feamster2003a,
  author = {Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan and David Karger},
  publisher = {Springer},
  title = {Thwarting Web Censorship with Untrusted Messenger Discovery},
  url = {http://nms.csail.mit.edu/papers/disc-pet2003.pdf},
  booktitle = {Privacy Enhancing Technologies},
  year = {2003},
  pages = {125--140},
}
@inproceedings{Fifield2012a,
  author = {David Fifield and Nate Hardison and Jonathan Ellithorpe and Emily Stark and Roger Dingledine and Phil Porras and Dan Boneh},
  publisher = {Springer},
  title = {Evading Censorship with Browser-Based Proxies},
  url = {http://crypto.stanford.edu/flashproxy/flashproxy.pdf},
  booktitle = {Privacy Enhancing Technologies Symposium},
  year = {2012},
  pages = {239--258},
}
@inproceedings{Fifield2013a,
  author = {David Fifield and Gabi Nakibly and Dan Boneh},
  url = {http://freehaven.net/anonbib/papers/pets2013/paper_29.pdf},
  publisher = {Springer},
  booktitle = {Privacy Enhancing Technologies Symposium},
  year = {2013},
  title = {{OSS}: Using Online Scanning Services for Censorship Circumvention},
}
@inproceedings{Filasto2012a,
  author = {Arturo Filast\`{o} and Jacob Appelbaum},
  url = {https://www.usenix.org/system/files/conference/foci12/foci12-final12.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2012},
  title = {{OONI}: Open Observatory of Network Interference},
}
@inproceedings{Geddes2013a,
  author = {John Geddes and Max Schuchard and Nicholas Hopper},
  url = {http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2013},
  title = {Cover Your {ACK}s: Pitfalls of Covert Channel Censorship Circumvention},
}
@inproceedings{Hasan2013a,
  author = {Shaddi Hasan and Yahel Ben-David and Giulia Fanti and Eric Brewer and Scott Shenker},
  url = {http://censorbib.nymity.ch/pdf/Hasan2013a.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2013},
  title = {Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts},
}
@inproceedings{Houmansadr2011a,
  author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Nikita Borisov},
  publisher = {ACM},
  title = {{Cirripede}: Circumvention Infrastructure using Router Redirection with Plausible Deniability},
  url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf},
  booktitle = {Computer and Communications Security},
  year = {2011},
  pages = {187--200},
}
@inproceedings{Houmansadr2013a,
  author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer},
  url = {http://people.cs.umass.edu/~amir/papers/FreeWave.pdf},
  publisher = {The Internet Society},
  booktitle = {Network and Distributed System Security},
  year = {2013},
  title = {I want my voice to be heard: {IP} over Voice-over-{IP} for unobservable censorship circumvention},
}
@inproceedings{Houmansadr2013b,
  author = {Amir Houmansadr and Chad Brubaker and Vitaly Shmatikov},
  url = {http://people.cs.umass.edu/~amir/papers/parrot.pdf},
  publisher = {IEEE},
  booktitle = {Symposium on Security \& Privacy},
  year = {2013},
  title = {The Parrot is Dead: Observing Unobservable Network Communications},
}
@inproceedings{Houmansadr2014a,
  author = {Amir Houmansadr and Edmund L. Wong and Vitaly Shmatikov},
  url = {http://dedis.cs.yale.edu/dissent/papers/nodirection.pdf},
  publisher = {The Internet Society},
  booktitle = {Network and Distributed System Security},
  year = {2014},
  title = {No Direction Home: The True Cost of Routing Around Decoys},
}
@inproceedings{Invernizzi2013a,
  author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna},
  url = {https://seclab.cs.ucsb.edu/media/uploads/papers/invernizzi_miab_acsac_2013.pdf},
  publisher = {ACM},
  booktitle = {Annual Computer Security Applications Conference},
  year = {2013},
  title = {{Message In A Bottle}: Sailing Past Censorship},
}
@inproceedings{Jones2014a,
  author = {Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover and Sathya Gunasekaran and Karim Habak},
  url = {https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2014},
  title = {{Facade}: High-Throughput, Deniable Censorship Circumvention Using Web Search},
}
@inproceedings{Jones2014b,
  author = {Ben Jones and Tzu-Wen Lee and Nick Feamster and Phillipa Gill},
  url = {http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf},
  publisher = {ACM},
  booktitle = {Internet Measurement Conference},
  year = {2014},
  title = {Automated Detection and Fingerprinting of Censorship Block Pages},
}
@inproceedings{Karlin2011a,
  author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer},
  url = {http://static.usenix.org/event/foci11/tech/final_files/Karlin.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2011},
  title = {Decoy Routing: Toward Unblockable {Internet} Communication},
}
@inproceedings{Kathuria2011a,
  author = {Karl Kathuria},
  url = {http://static.usenix.org/event/foci11/tech/final_files/Kathuria.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2011},
  title = {Bypassing {Internet} Censorship for News Broadcasters},
}
@inproceedings{Khattak2013a,
  author = {Sheharbano Khattak and Mobin Javed and Philip D. Anderson and Vern Paxson},
  url = {http://censorbib.nymity.ch/pdf/Khattak2013a.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2013},
  title = {Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion},
}
@inproceedings{Khattak2014a,
  author = {Sheharbano Khattak and Mobin Javed and Syed Ali Khayam and Zartash Afzal Uzmi and Vern Paxson},
  url = {http://conferences2.sigcomm.org/imc/2014/papers/p271.pdf},
  publisher = {ACM},
  booktitle = {Internet Measurement Conference},
  year = {2014},
  title = {A Look at the Consequences of {Internet} Censorship Through an {ISP} Lens},
}
@article{King2014a,
  author = {Gary King and Jennifer Pan and Margaret E. Roberts},
  publisher = {AAAS},
  title = {Reverse-engineering censorship in {China}: Randomized experimentation and participant observation},
  url = {http://cryptome.org/2014/08/reverse-eng-cn-censorship.pdf},
  journal = {Science},
  number = {6199},
  volume = {345},
  year = {2014},
}
@article{King2012a,
  author = {Gary King and Jennifer Pan and Margaret E. Roberts},
  url = {http://gking.harvard.edu/files/censored.pdf},
  journal = {American Political Science Review},
  year = {2012},
  title = {How Censorship in {China} Allows Government Criticism but Silences Collective Expression},
}
@inproceedings{Knockel2011a,
  author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia},
  url = {http://static.usenix.org/event/foci11/tech/final_files/Knockel.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2011},
  title = {Three Researchers, Five Conjectures: An Empirical Analysis of {TOM-Skype} Censorship and Surveillance},
}
@inproceedings{Koepsell2004a,
  author = {Stefan K\"{o}psell and Ulf Hillig},
  publisher = {ACM},
  title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
  url = {http://censorbib.nymity.ch/pdf/Koepsell2004a.pdf},
  booktitle = {Workshop on Privacy in the Electronic Society},
  year = {2004},
  pages = {47--58},
}
@inproceedings{Li2014a,
  author = {Shuai Li and Mike Schliep and Nick Hopper},
  url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf},
  publisher = {ACM},
  booktitle = {Workshop on Privacy in the Electronic Society},
  year = {2014},
  title = {{Facet}: Streaming over Videoconferencing for Censorship Circumvention},
}
@inproceedings{Lincoln2012a,
  author = {Patrick Lincoln and Ian Mason and Phillip Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Simpson and Paul Vixie and Dan Boneh},
  url = {https://www.usenix.org/system/files/conference/foci12/foci12-final7.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2012},
  title = {Bootstrapping Communications into an Anti-Censorship System},
}
@inproceedings{Ling2012a,
  author = {Zhen Ling and Xinwen Fu and Wei Yu and Junzhou Luo and Ming Yang},
  url = {http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf},
  publisher = {IEEE},
  booktitle = {INFOCOM},
  year = {2012},
  title = {Extensive Analysis and Large-Scale Empirical Evaluation of {Tor} Bridge Discovery},
}
@inproceedings{Liu2011a,
  author = {Vincent Liu and Seungyeop Han and Arvind Krishnamurthy and Thomas Anderson},
  url = {http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf},
  publisher = {ACM},
  booktitle = {Hot Topics in Networks},
  year = {2011},
  title = {{Tor} Instead of {IP}},
}
@techreport{Lowe2007a,
  author = {Graham Lowe and Patrick Winters and Michael L. Marcus},
  url = {https://cs.nyu.edu/~pcw216/work/nds/final.pdf},
  year = {2007},
  institution = {New York University},
  title = {The Great {DNS} Wall of {China}},
}
@inproceedings{Luchaup2014a,
  author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton},
  url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-luchaup.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security Symposium},
  year = {2014},
  title = {{LibFTE}: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes},
}
@inproceedings{Mahdian2010a,
  author = {Mohammad Mahdian},
  publisher = {Springer},
  title = {Fighting Censorship with Algorithms},
  url = {http://mahdian.org/censorship.pdf},
  booktitle = {International Conference on Fun with Algorithms},
  year = {2010},
  pages = {296--306},
}
@inproceedings{McCoy2011a,
  author = {Damon McCoy and Jose Andre Morales and Kirill Levchenko},
  url = {http://cseweb.ucsd.edu/~klevchen/mml-fc11.pdf},
  publisher = {Springer},
  booktitle = {Financial Cryptography and Data Security},
  year = {2011},
  title = {{Proximax}: A Measurement Based System for Proxies Dissemination},
}
@inproceedings{Moghaddam2012a,
  author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg},
  url = {http://www.cypherpunks.ca/~iang/pubs/skypemorph-ccs.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2012},
  title = {{SkypeMorph}: Protocol Obfuscation for {Tor} Bridges},
}
@inproceedings{Morrison2014a,
  author = {Donn Morrison},
  url = {http://arxiv.org/pdf/1402.5310.pdf},
  booktitle = {Data Mining in Social Networks},
  year = {2014},
  title = {Toward automatic censorship detection in microblogs},
}
@inproceedings{Nabi2013a,
  author = {Zubair Nabi},
  url = {http://censorbib.nymity.ch/pdf/Nabi2013a.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2013},
  title = {The Anatomy of Web Censorship in {Pakistan}},
}
@inproceedings{Nobori2014a,
  author = {Daiyuu Nobori and Yasushi Shinjo},
  url = {https://www.usenix.org/system/files/conference/nsdi14/nsdi14-paper-nobori.pdf},
  publisher = {USENIX},
  booktitle = {Networked Systems Design and Implementation},
  year = {2014},
  title = {{VPN Gate}: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls},
}
@inproceedings{Park2010a,
  author = {Jong Chun Park and Jedidiah R. Crandall},
  publisher = {IEEE},
  title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {China}},
  url = {http://www.cs.unm.edu/~crandall/icdcs2010.pdf},
  booktitle = {Distributed Computing Systems},
  year = {2010},
  pages = {315--326},
}
@inproceedings{Perng2005a,
  author = {Ginger Perng and Michael K. Reiter and Chenxi Wang},
  publisher = {Springer},
  title = {Censorship Resistance Revisited},
  url = {http://censorbib.nymity.ch/pdf/Perng2005a.pdf},
  booktitle = {International Conference on Information Hiding},
  year = {2005},
  pages = {62--76},
}
@inproceedings{Roberts2011a,
  author = {Hal Roberts and David Larochelle and Rob Faris and John Palfrey},
  url = {https://cyber.law.harvard.edu/netmaps/mlic_20110513.pdf},
  publisher = {IEEE},
  booktitle = {Computer Communications Workshop},
  year = {2011},
  title = {Mapping Local {Internet} Control},
}
@inproceedings{Rogers2012a,
  author = {Michael Rogers and Eleanor Saitta},
  publisher = {ACM},
  title = {Secure Communication over Diverse Transports},
  url = {http://censorbib.nymity.ch/pdf/Rogers2012a.pdf},
  booktitle = {Workshop on Privacy in the Electronic Society},
  year = {2012},
  pages = {75--80},
}
@inproceedings{Roos2014a,
  author = {Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe},
  url = {https://petsymposium.org/2014/papers/paper_71.pdf},
  publisher = {Springer},
  booktitle = {Privacy Enhancing Technologies Symposium},
  year = {2014},
  title = {Measuring {Freenet} in the Wild: Censorship-resilience under Observation},
}
@inproceedings{Ruffing2013a,
  author = {Tim Ruffing and Jonas Schneider and Aniket Kate},
  url = {http://petsymposium.org/2013/papers/ruffing-censorship.pdf},
  publisher = {Springer},
  booktitle = {Hot Topics in Privacy Enhancing Technologies},
  year = {2013},
  title = {Identity-Based Steganography and Its Applications to Censorship Resistance},
}
@inproceedings{Schuchard2012a,
  author = {Max Schuchard and John Geddes and Christopher Thompson and Nicholas Hopper},
  url = {http://www-users.cs.umn.edu/~hopper/decoy-ccs12.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2012},
  title = {Routing Around Decoys},
}
@inproceedings{Seltzer2011a,
  author = {Wendy Seltzer},
  url = {http://static.usenix.org/event/foci11/tech/final_files/Seltzer.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2011},
  title = {Infrastructures of Censorship and Lessons from Copyright Resistance},
}
@inproceedings{Serjantov2002a,
  author = {Andrei Serjantov},
  publisher = {Springer},
  title = {Anonymizing Censorship Resistant Systems},
  url = {http://www.iptps.org/papers-2002/120.pdf},
  booktitle = {International Workshop on Peer-To-Peer Systems},
  year = {2002},
  pages = {111--120},
}
@inproceedings{Sfakianakis2011a,
  author = {Andreas Sfakianakis and Elias Athanasopoulos and Sotiris Ioannidis},
  url = {http://static.usenix.org/event/foci11/tech/final_files/Sfakianakis.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2011},
  title = {{CensMon}: A Web Censorship Monitor},
}
@inproceedings{Shklovski2011a,
  author = {Irina Shklovski and Nalini P. Kotamraju},
  url = {http://censorbib.nymity.ch/pdf/Shklovski2011a.pdf},
  publisher = {ACM},
  booktitle = {CHI Conference on Human Factors in Computing Systems},
  year = {2011},
  title = {Online Contribution Practices in Countries that Engage in {Internet} Blocking and Censorship},
}
@inproceedings{Sovran2008a,
  author = {Yair Sovran and Alana Libonati and Jinyang Li},
  url = {http://www.cs.toronto.edu/iptps2008/final/73.pdf},
  publisher = {USENIX},
  booktitle = {International Workshop on Peer-to-Peer Systems},
  year = {2008},
  title = {Pass it on: Social Networks Stymie Censors},
}
@techreport{Stubblefield2001a,
  author = {Adam Stubblefield and Dan S. Wallach},
  url = {http://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf},
  year = {2001},
  institution = {Rice University},
  title = {{Dagster}: Censorship-Resistant Publishing Without Replication},
}
@inproceedings{Tan2014a,
  author = {Henry Tan and Micah Sherr},
  url = {https://security.cs.georgetown.edu/~msherr/papers/censorship-as-sideeffect.pdf},
  publisher = {Springer},
  booktitle = {Security Protocols},
  year = {2014},
  title = {Censorship Resistance as a Side-Effect},
}
@inproceedings{Thomas2012a,
  author = {Kurt Thomas and Chris Grier and Vern Paxson},
  url = {https://www.usenix.org/system/files/conference/leet12/leet12-final13_0.pdf},
  publisher = {USENIX},
  booktitle = {Large-Scale Exploits and Emergent Threats},
  year = {2012},
  title = {Adapting Social Spam Infrastructure for Political Censorship},
}
@inproceedings{Vasserman2012a,
  author = {Eugene Y. Vasserman and Victor Heorhiadi and Nicholas Hopper and Yongdae Kim},
  url = {https://www.usenix.org/system/files/conference/foci12/foci12-final5.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2012},
  title = {One-way indexing for plausible deniability in censorship resistant storage},
}
@inproceedings{Verkamp2012a,
  author = {John-Paul Verkamp and Minaxi Gupta},
  url = {https://www.usenix.org/system/files/conference/foci12/foci12-final1.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2012},
  title = {Inferring Mechanics of Web Censorship Around the World},
}
@inproceedings{Verkamp2013a,
  author = {John-Paul Verkamp and Minaxi Gupta},
  url = {http://censorbib.nymity.ch/pdf/Verkamp2013a.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2013},
  title = {Five Incidents, One Theme: {Twitter} Spam as a Weapon to Drown Voices of Protest},
}
@inproceedings{Wachs2013a,
  author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff},
  url = {http://grothoff.org/christian/fps2013wachs.pdf},
  publisher = {Springer},
  booktitle = {Foundations \& Practice of Security},
  year = {2013},
  title = {On the Feasibility of a Censorship Resistant Decentralized Name System},
}
@inproceedings{Wachs2014a,
  author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff},
  url = {https://gnunet.org/sites/default/files/paper_cans2014_camera_ready.pdf},
  publisher = {Springer},
  booktitle = {Cryptology and Network Security},
  year = {2014},
  title = {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System},
}
@inproceedings{Waldman2000a,
  author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor},
  url = {http://www.eecs.harvard.edu/~mema/courses/cs264/papers/waldman00publius.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security Symposium},
  year = {2000},
  title = {{Publius}: A robust, tamper-evident, censorship-resistant web publishing system},
}
@inproceedings{Waldman2001a,
  author = {Marc Waldman and David Mazi\`{e}res},
  publisher = {ACM},
  title = {{Tangler}: A Censorship-Resistant Publishing System Based On Document Entanglements},
  url = {http://www.cs.nyu.edu/~waldman/tangler.ps},
  booktitle = {Computer and Communications Security},
  year = {2001},
  pages = {126--135},
}
@inproceedings{Wang2012a,
  author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov},
  url = {http://hatswitch.org/~nikita/papers/censorspoofer.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2012},
  title = {{CensorSpoofer}: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing},
}
@inproceedings{Wang2013a,
  author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper},
  url = {http://www-users.cs.umn.edu/~hopper/rbridge_ndss13.pdf},
  publisher = {The Internet Society},
  booktitle = {Network and Distributed System Security},
  year = {2013},
  title = {{rBridge}: User Reputation based {Tor} Bridge Distribution with Privacy Preservation},
}
@inproceedings{Weaver2009a,
  author = {Nicholas Weaver and Robin Sommer and Vern Paxson},
  url = {http://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf},
  publisher = {The Internet Society},
  booktitle = {Network and Distributed System Security},
  year = {2009},
  title = {Detecting Forged {TCP} Reset Packets},
}
@inproceedings{Weinberg2012a,
  author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh},
  url = {http://www.frankwang.org/papers/ccs2012.pdf},
  publisher = {ACM},
  booktitle = {Computer and Communications Security},
  year = {2012},
  title = {{StegoTorus}: A Camouflage Proxy for the {Tor} Anonymity System},
}
@techreport{Wiley2011a,
  author = {Brandon Wiley},
  url = {http://blanu.net/Dust.pdf},
  year = {2011},
  institution = {University of Texas at Austin},
  title = {{Dust}: A Blocking-Resistant {Internet} Transport Protocol},
}
@inproceedings{Winter2012a,
  author = {Philipp Winter and Stefan Lindskog},
  url = {https://www.usenix.org/system/files/conference/foci12/foci12-final2.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2012},
  title = {How the {Great Firewall} of {China} is Blocking {Tor}},
}
@inproceedings{Winter2013a,
  author = {Philipp Winter},
  url = {http://censorbib.nymity.ch/pdf/Winter2013a.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2013},
  title = {Towards a Censorship Analyser for {Tor}},
}
@inproceedings{Winter2013b,
  author = {Philipp Winter and Tobias Pulls and Juergen Fuss},
  url = {http://censorbib.nymity.ch/pdf/Winter2013b.pdf},
  publisher = {ACM},
  booktitle = {Workshop on Privacy in the Electronic Society},
  year = {2013},
  title = {{ScrambleSuit}: A Polymorphic Network Protocol to Circumvent Censorship},
}
@inproceedings{Wright2011a,
  author = {Joss Wright and Tulio Souza and Ian Brown},
  url = {http://static.usenix.org/event/foci11/tech/final_files/Wright.pdf},
  publisher = {USENIX},
  booktitle = {Free and Open Communications on the Internet},
  year = {2011},
  title = {Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics},
}
@techreport{Wright2012a,
  author = {Joss Wright},
  url = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3},
  year = {2012},
  institution = {University of Oxford},
  title = {Regional Variation in {Chinese Internet} Filtering},
}
@inproceedings{Wustrow2011a,
  author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman},
  url = {http://www.usenix.org/event/sec11/tech/full_papers/Wustrow.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security Symposium},
  year = {2011},
  title = {{Telex}: Anticensorship in the Network Infrastructure},
}
@inproceedings{Wustrow2014a,
  author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman},
  url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-wustrow.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security Symposium},
  year = {2014},
  title = {{TapDance}: End-to-Middle Anticensorship without Flow Blocking},
}
@inproceedings{Xu2011a,
  author = {Xueyang Xu and Z. Morley Mao and J. Alex Halderman},
  publisher = {Springer},
  title = {{Internet} Censorship in {China}: Where Does the Filtering Occur?},
  url = {http://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf},
  booktitle = {Passive and Active Measurement Conference},
  year = {2011},
  pages = {133--142},
}
@inproceedings{Zhou2013a,
  author = {Wenxuan Zhou and Amir Houmansadr and Matthew Caesar and Nikita Borisov},
  url = {http://petsymposium.org/2013/papers/zhou-censorship.pdf},
  publisher = {Springer},
  booktitle = {Hot Topics in Privacy Enhancing Technologies},
  year = {2013},
  title = {{SWEET}: Serving the Web by Exploiting Email Tunnels},
}
@inproceedings{Zhu2013a,
  author = {Tao Zhu and David Phipps and Adam Pridgen and Jedidiah R. Crandall and Dan S. Wallach},
  url = {https://www.cs.unm.edu/~crandall/usenix13.pdf},
  publisher = {USENIX},
  booktitle = {USENIX Security Symposium},
  year = {2013},
  title = {The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions},
}