CensorBib: The Internet Censorship Bibliography

Project Description:
CensorBib is an archive of selected academic research papers on Internet censorship. If you think I missed a paper, make a pull request. Finally, the net4people/bbs forum has reading groups for many of the papers listed below.

Project Links:
https://censorbib.nymity.ch
https://nullhypothesis.github.io/censorbib/


Note from c0mmando:

I really liked the concept behind CensorBib, so I’ve recreated the project using plain markdown. In addition, each link is served up through archive.org, because of the variety of sites. Most (if not all) of the links have been archived.


Selected Research Papers in Internet Censorship


Title: Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape
Authors: Diwen Xue, Anna Ablove, Reethika Ramesh, Grace Kwak Danciu, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2024, USENIX
Download paper
Download cached paper
Download BibTeX


Title: SpotProxy: Rediscovering the Cloud for Censorship Circumvention
Authors: Patrick Tser Jern Kon, Sina Kamali, Jinyu Pei, Diogo Barradas, Ang Chen, Micah Sherr, Moti Yung
In Proc. of: USENIX Security Symposium, 2024, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
Authors: Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy
In: Privacy Enhancing Technologies, 2024
Download paper
Download cached paper
Download BibTeX


Title: Automatic Generation of Web Censorship Probe Lists
Authors: Jenny Tang, Léo Alvarez, Arjun Brar, Nguyen Phong Hoang, Nicolas Christin
In: Privacy Enhancing Technologies, 2024
Download paper
Download cached paper
Download BibTeX


Title: Extended Abstract: The Impact of Online Censorship on LLMs
Authors: Mohamed Ahmed, Jeffrey Knockel
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Extended Abstract: Leveraging Large Language Models to Identify Internet Censorship through Network Data
Authors: Tianyu Gao, Ping Ji
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Toward Automated DNS Tampering Detection Using Machine Learning
Authors: Paola Calle, Larissa Savitsky, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Shinyoung Cho
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention
Authors: Michael Pu, Andrew Wang, Anthony Chang, Kieran Quan, Yi Wei Zhou
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels
Authors: Afonso Vilalonga, João S. Resende, Henrique Domingos
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burdens
Authors: Paul Vines
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling
Authors: Philipp Müller, Niklas Niere, Felix Lange, Juraj Somorovsky
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Detecting VPN Traffic through Encapsulated TCP Behavior
Authors: Michelina Hanlon, Gerry Wan, Anna Ascheman, Zakir Durumeric
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Analyzing Prominent Mobile Apps in Latin America
Authors: Beau Kujath, Jeffrey Knockel, Paul Aguilar, Diego Morabito, Masashi Crete-Nishihata, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Lost in Translation: Characterizing Automated Censorship in Online Translation Services
Authors: Samuel Ruo, Jeffrey Knockel, Zoë Reichert
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Identifying VPN Servers through Graph-Represented Behaviors
Authors: Chenxu Wang, Jiangyi Yin, Zhao Li, Hongbo Xu, Zhongyi Zhang, Qingyun Liu
In Proc. of: The International World Wide Web Conference, 2024, ACM
Download paper
Download cached paper
Download BibTeX


Title: GFWeb: Measuring the Great Firewall’s Web Censorship at Scale
Authors: Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster
In Proc. of: USENIX Security Symposium, 2024, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Digital Repression in Palestine
Authors: Ghadeer Awwad, Kentaro Toyama
In Proc. of: CHI, 2024, ACM
Download paper
Download cached paper
Download BibTeX


Title: How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censorship by Local Governments in China
Authors: Tony Huiquan Zhang, Jianhua Xu, Jinjin Liu
In: The China Quarterly, 2024, SOAS University of London
Download paper
Download cached paper
Download BibTeX


Title: Snowflake, a censorship circumvention system using temporary WebRTC proxies
Authors: Cecylia Bocovich, Arlo Breault, David Fifield, Serene, Xiaokang Wang
In Proc. of: USENIX Security Symposium, 2024, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments
Authors: Soo-Jin Moon, Milind Srivastava, Yves Bieri, Ruben Martins, Vyas Sekar
In Proc. of: Symposium on Security & Privacy, 2024, IEEE
Download paper
Download cached paper
Download BibTeX

Title: Out in the Open: On the Implementation of Mobile App Filtering in India
Authors: Devashish Gosain, Kartikey Singh, Rishi Sharma, Jithin S, Sambuddho Chakravaty
In Proc. of: Passive and Active Measurement Conference, 2024, Springer
Download paper
Download cached paper
Download BibTeX


Title: Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
Authors: Paul Vines, Samuel McKay, Jesse Jenter, Suresh Krishnaswamy
In: Privacy Enhancing Technologies, 2024
Download paper
Download cached paper
Download BibTeX


Title: Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model
Authors: Sultan Almutairi, Yogev Neumann, Khaled Harfoush
In Proc. of: Consumer Communications & Networking Conference, 2024, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Modeling and Detecting Internet Censorship Events
Authors: Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi
In Proc. of: Network and Distributed System Security, 2024, The Internet Society
Download paper
Download cached paper
Download BibTeX


Title: Internet Sanctions on Russian Media: Actions and Effects
Authors: John Kristoff, Moritz Müller, Arturo Filastò, Max Resing, Chris Kanich, Niels ten Oever
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Bleeding Wall: A Hematologic Examination on the Great Firewall
Authors: Sakamoto, Elson Wedwards
In Proc. of: Free and Open Communications on the Internet, 2024
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Just add WATER: WebAssembly-based Circumvention Transports
Authors: Erik Chi, Gaukas Wang, J. Alex Halderman, Eric Wustrow, Jack Wampler
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Extended Abstract: Traffic Splitting for Pluggable Transports
Authors: Anna Harbluk Lorimer, Rob Jansen, Nick Feamster
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Extended Abstract: Oscur0: One-shot Circumvention without Registration
Authors: Mingye Chen, Jack Wampler, Abdulrahman Alaraj, Gaukas Wang, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2024
Download paper
Download cached paper
Download BibTeX


Title: Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
Authors: Diwen Xue, Michalis Kallitsis, Amir Houmansadr, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2024, USENIX
Download paper
Download cached paper
Download BibTeX


Title: NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge
Authors: Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich
In Proc. of: Symposium on Security & Privacy, 2024, IEEE
Download paper
Download cached paper
Download BibTeX


Title: On Precisely Detecting Censorship Circumvention in Real-World Networks
Authors: Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen
In Proc. of: Network and Distributed System Security, 2024, The Internet Society
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Discop: Provably secure steganography in practice based on “distribution copies”
Authors: Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, Nenghai Yu
In Proc. of: Symposium on Security & Privacy, 2023, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Poster: Circumventing the GFW with TLS Record Fragmentation
Authors: Niklas Niere, Sven Hebrok, Juraj Somorovsky, Robert Merget
In Proc. of: Computer and Communications Security, 2023, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Website blocking in the European Union: Network interference from the perspective of Open Internet
Authors: Vasilis Ververis, Lucas Lasota, Tatiana Ermakova, Benjamin Fabian
In: Policy & Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
Authors: David Fifield
In: 2023
Download paper
Download cached paper
Download BibTeX


Title: Destination Unreachable: Characterizing Internet Outages and Shutdowns
Authors: Zachary S. Bischof, Kennedy Pitcher, Esteban Carisimo, Amanda Meng, Rafael Bezerra Nunes, Ramakrishna Padmanabhan, Margaret E. Roberts, Alex C. Snoeren, Alberto Dainotti
In Proc. of: SIGCOMM, 2023, ACM
Download paper
Download cached paper
Download BibTeX


Title: Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
Authors: Jacob Brown, Xi Jiang, Van Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran
In Proc. of: Knowledge Discovery And Data Mining, 2023, ACM
Download paper
Download cached paper
Download BibTeX


Title: A Study of China’s Censorship and Its Evasion Through the Lens of Online Gaming
Authors: Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar
In Proc. of: USENIX Security Symposium, 2023, USENIX
Download paper
Download cached paper
Download BibTeX


Title: DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
Authors: Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang
In Proc. of: USENIX Security Symposium, 2023, USENIX
Download paper
Download cached paper
Download BibTeX


Title: TELEPATH: A Minecraft-based Covert Communication System
Authors: Zhen Sun, Vitaly Shmatikov
In Proc. of: Symposium on Security & Privacy, 2023, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation
Authors: Mizhang Streisand, Eric Wustrow, Amir Houmansadr
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law
Authors: Mona Wang, Jonathan Mayer
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: A Worldwide View of Nation-state Internet Censorship
Authors: Alexander Master, Christina Garman
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: The Use of Push Notification in Censorship Circumvention
Authors: Diwen Xue, Roya Ensafi
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Measuring and Evading Turkmenistan’s Internet Censorship
Authors: Sadia Nourin, Van Tran, Xi Jiang, Kevin Bock, Nick Feamster, Nguyen Phong Hoang, Dave Levin
In Proc. of: The International World Wide Web Conference, 2023, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Detecting Network Interference Without Endpoint Participation
Authors: Sadia Nourin, Kevin Bock, Nguyen Phong Hoang, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Running a high-performance pluggable transports Tor bridge
Authors: David Fifield, Linus Nordberg
In Proc. of: Free and Open Communications on the Internet, 2023
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Towards a Comprehensive Understanding of Russian Transit Censorship
Authors: Aaron Ortwein, Kevin Bock, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Proteus: Programmable Protocols for Censorship Circumvention
Authors: Ryan Wails, Rob Jansen, Aaron Johnson, Micah Sherr
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
Authors: Watson Jia, Joseph Eichenhofer, Liang Wang, Prateek Mittal
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies
Authors: Nhi Tran, Kevin Bock, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom
Authors: Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2023, USENIX
Download paper
Download cached paper
Download BibTeX


Title: How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
Authors: Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
In Proc. of: USENIX Security Symposium, 2023, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Lox: Protecting the Social Graph in Bridge Distribution
Authors: Lindsey Tulloch, Ian Goldberg
In: Privacy Enhancing Technologies, 2023
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
Authors: Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty
In: Privacy Enhancing Technologies, 2023
Download paper
Download cached paper
Download BibTeX


Title: CensorWatch: On the Implementation of Online Censorship in India
Authors: Divyank Katira, Gurshabad Grover, Kushagra Singh, Varun Bansal
In Proc. of: Free and Open Communications on the Internet, 2023
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Chasing Shadows: A security analysis of the ShadowTLS proxy
Authors: Gaukas Wang, Anonymous, Jackson Sippe, Hai Chi, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2023
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Security Notions for Fully Encrypted Protocols
Authors: Ellis Fenske, Aaron Johnson
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Advancing the Art of Censorship Data Analysis
Authors: Ram Sundara Raman, Apurva Virkud, Sarah Laplante, Vinicius Fortuna, Roya Ensafi
In Proc. of: Free and Open Communications on the Internet, 2023
Download paper
Download cached paper
Download BibTeX


Title: Global, Passive Detection of Connection Tampering
Authors: Ram Sundara Raman, Louis-Henri Merino, Kevin Bock, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta
In Proc. of: SIGCOMM, 2023, ACM
Download paper
Download cached paper
Download BibTeX


Title: Darwin’s Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models
Authors: Asim Waheed, Sara Qunaibi, Diogo Barradas, Zachary Weinberg
In Proc. of: Workshop on Privacy in the Electronic Society, 2022, ACM
Download paper
Download cached paper
Download BibTeX


Title: Network Measurement Methods for Locating and Examining Censorship Devices
Authors: Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan Mayer, Roya Ensafi
In Proc. of: Emerging Networking Experiments and Technologies, 2022, ACM
Download paper
Download cached paper
Download BibTeX


Title: TSPU: Russia’s Decentralized Censorship System
Authors: Diwen Xue, Benjamin Mixon-Baca, ValdikSS, Anna Ablove, Beau Kujath, Jedidiah R. Crandall, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2022, ACM
Download paper
Download cached paper
Download BibTeX


Title: Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
Authors: Abhishek Bhaskar, Paul Pearce
In Proc. of: USENIX Security Symposium, 2022, USENIX
Download paper
Download cached paper
Download BibTeX


Title: GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies
Authors: Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin
In Proc. of: USENIX Security Symposium, 2022, USENIX
Download paper
Download cached paper
Download BibTeX


Title: OpenVPN is Open to VPN Fingerprinting
Authors: Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2022, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
Authors: Gabriel Figueira, Diogo Barradas, Nuno Santos
In Proc. of: Asia CCS, 2022, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: COVID-19 increased censorship circumvention and access to sensitive topics in China
Authors: Keng-Chi Chang, William R. Hobbs, Margaret E. Roberts, Zachary C. Steinert-Threlkeld
In: PNAS, 2022, National Academy of Sciences
Download paper
Download cached paper
Download BibTeX


Title: Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering
Authors: Nguyen Phong Hoang, Michalis Polychronakis, Phillipa Gill
In Proc. of: Passive and Active Measurement Conference, 2022, Springer
Download paper
Download cached paper
Download BibTeX


Title: Understanding Internet Censorship in Europe: The Case of Spain
Authors: Vasilis Ververis, Tatiana Ermakova, Marios Isaakidis, Simone Basso, Benjamin Fabian, Stefania Milan
In Proc. of: Web Science Conference, 2021, ACM
Download paper
Download cached paper
Download BibTeX


Title: OUStralopithecus: Overt User Simulation for Censorship Circumvention
Authors: Anna Harbluk Lorimer, Lindsey Tulloch, Cecylia Bocovich, Ian Goldberg
In Proc. of: Workshop on Privacy in the Electronic Society, 2021, ACM
Download paper
Download cached paper
Download BibTeX


Title: Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
Authors: Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty
In Proc. of: Asia CCS, 2021, ACM
Download paper
Download cached paper
Download BibTeX


Title: Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China
Authors: Raymond Rambert, Zachary Weinberg, Diogo Barradas, Nicolas Christin
In Proc. of: WWW, 2021, ACM
Download paper
Download cached paper
Download BibTeX


Title: Meteor: Cryptographically Secure Steganography for Realistic Distributions
Authors: Gabriel Kaptchuk, Tushar M. Jois, Matthew Green, Aviel D. Rubin
In Proc. of: Computer and Communications Security, 2021, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Throttling Twitter: an emerging censorship technique in Russia
Authors: Diwen Xue, Reethika Ramesh, ValdikSS, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2021, ACM
Download paper
Download cached paper
Download BibTeX


Title: Web censorship measurements of HTTP/3 over QUIC Online discussion
Authors: Kathrin Elmenhorst, Bertram Schütz, Nils Aschenbruck, Simone Basso
In Proc. of: Internet Measurement Conference, 2021, ACM
Download paper
Download cached paper
Download BibTeX


Title: Measuring DoT/DoH blocking using OONI Probe: a preliminary study
Authors: Simone Basso
In Proc. of: DNS Privacy Workshop, 2021, The Internet Society
Download paper
Download cached paper
Download BibTeX


Title: A multi-perspective view of Internet censorship in Myanmar
Authors: Ramakrishna Padmanabhan, Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Doug Madory, Molly Roberts, Alberto Dainotti
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
Download paper
Download cached paper
Download BibTeX


Title: Measuring QQMail’s Automated Email Censorship in China
Authors: Jeffrey Knockel, Lotus Ruan
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
Download paper
Download cached paper
Download BibTeX


Title: Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels
Authors: Carmen Kwan, Paul Janiszewski, Shela Qiu, Cathy Wang, Cecylia Bocovich
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes
Authors: Kevin Bock, Gabriel Naval, Kyle Reese, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
Download paper
Download cached paper
Download BibTeX


Title: BlindTLS: Circumventing TLS-Based HTTPS Censorship
Authors: Sambhav Satija, Rahul Chatterjee
In Proc. of: Free and Open Communications on the Internet, 2021, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications
Authors: Mingkui Wei
In Proc. of: USENIX Security Symposium, 2021, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Weaponizing Middleboxes for TCP Reflected Amplification
Authors: Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, Dave Levin
In Proc. of: USENIX Security Symposium, 2021, USENIX
Download paper
Download cached paper
Download BibTeX


Title: How Great is the Great Firewall? Measuring China’s DNS Censorship
Authors: Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis
In Proc. of: USENIX Security Symposium, 2021, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Balboa: Bobbing and Weaving around Network Censorship
Authors: Marc B. Rosen, James Parker, Alex J. Malozemoff
In Proc. of: USENIX Security Symposium, 2021, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX

Title: Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
Authors: Kevin Bock, Pranav Bharadwaj, Jasraj Singh, Dave Levin
In Proc. of: Workshop on Offensive Technologies, 2021, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs
Authors: Devashish Gosain, Mayank Mohindra, Sambuddho Chakravarty
In: Privacy Enhancing Technologies, 2021, Sciendo
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels
Authors: Diogo Barradas, Nuno Santos
In Proc. of: Distributed Infrastructure for Common Good, 2020, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC
Authors: Diogo Barradas, Nuno Santos, Luís Rodrigues, Vítor Nunes
In Proc. of: Computer and Communications Security, 2020, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Censored Planet: An Internet-wide, Longitudinal Censorship Observatory Online discussion
Authors: Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi
In Proc. of: Computer and Communications Security, 2020, ACM
Download paper
Download cached paper
Download BibTeX


Title: How China Detects and Blocks Shadowsocks
Download paper
Download cached paper
Download BibTeX

Authors: Alice, Bob, Carol, Jan Beznazwy, Amir Houmansadr
In Proc. of: Internet Measurement Conference, 2020, ACM

Title: Investigating Large Scale HTTPS Interception in Kazakhstan
Authors: Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2020, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
Authors: Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, Dave Levin
In Proc. of: SIGCOMM, 2020, ACM
Download paper
Download cached paper
Download BibTeX


Title: MIMIQ: Masking IPs with Migration in QUIC
Authors: Yashodhar Govil, Liang Wang, Jennifer Rexford
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia
Authors: Fatemah Alharbi, Michalis Faloutsos, Nael Abu-Ghazaleh
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior
Authors: Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Slitheen++: Stealth TLS-based Decoy Routing
Authors: Benedikt Birtel, Christian Rossow
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Filter
Authors: Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Turbo Tunnel, a good way to design censorship circumvention protocols
Authors: David Fifield
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
Download paper
Download cached paper
Download BibTeX


Title: HTTPT: A Probe-Resistant Proxy
Authors: Sergey Frolov, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2020, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: How India Censors the Web
Authors: Kushagra Singh, Gurshabad Grover, Varun Bansal
In Proc. of: Web Science, 2020, ACM
Download paper
Download cached paper
Download BibTeX


Title: Characterizing Transnational Internet Performance and the Great Bottleneck of China
Authors: Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Haixin Duan
In: Measurement and Analysis of Computing Systems, 2020, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: SiegeBreaker: An SDN Based Practical Decoy Routing System
Authors: Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, H. B. Acharya, Sambuddho Chakravarty
In: Privacy Enhancing Technologies, 2020, Sciendo
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Running Refraction Networking for Real
Authors: Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow
In: Privacy Enhancing Technologies, 2020, Sciendo
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
Authors: Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate
In: Privacy Enhancing Technologies, 2020, Sciendo
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
Authors: Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill
In Proc. of: Symposium on Security & Privacy, 2020, IEEE
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery
Authors: Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
Authors: Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Detecting Probe-resistant Proxies
Authors: Sergey Frolov, Jack Wampler, Eric Wustrow
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Measuring the Deployment of Network Censorship Filters at Global Scale
Authors: Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Decentralized Control: A Case Study of Russia
Authors: Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi
In Proc. of: Network and Distributed System Security, 2020, The Internet Society
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Protocol Proxy: An FTE-based covert channel
Authors: Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard Brooks
In: Computers & Security, 2020, Elsevier
Download paper
Download cached paper
Download BibTeX


Title: Conjure: Summoning Proxies from Unused Address Space
Authors: Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow
In Proc. of: Computer and Communications Security, 2019, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Geneva: Evolving Censorship Evasion Strategies
Authors: Kevin Bock, George Hughey, Xiao Qiang, Dave Levin
In Proc. of: Computer and Communications Security, 2019, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Distributed Detection of Tor Directory Authorities Censorship in Mexico
Authors: Gunnar Eyal Wolf Iszaevich
In Proc. of: International Conference on Networks, 2019, IARIA
Download paper
Download cached paper
Download BibTeX


Title: Shedding Light on Mobile App Store Censorship
Authors: Vasilis Ververis, Marios Isaakidis, Valentin Weber, Benjamin Fabian
In Proc. of: User Modeling, Adaptation and Personalization, 2019, ACM
Download paper
Download cached paper
Download BibTeX


Title: Improving Meek With Adversarial Techniques
Authors: Steven R. Sheffey, Ferrol Aderholdt
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention
Authors: Zimo Chai, Amirhossein Ghafari, Amir Houmansadr
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message
Authors: Ruohan Xiong, Jeffrey Knockel
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Measuring I2P Censorship at a Global Scale
Authors: Nguyen Phong Hoang, Sadie Doreen, Michalis Polychronakis
In Proc. of: Free and Open Communications on the Internet, 2019, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
Authors: Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags
In Proc. of: Network and Distributed System Security, 2019, The Internet Society
Download paper
Download cached paper
Download BibTeX


Title: The use of TLS in Censorship Circumvention
Authors: Sergey Frolov, Eric Wustrow
In Proc. of: Network and Distributed System Security, 2019, The Internet Society
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship
Authors: Joss Wright, Alexander Darer, Oliver Farnan
In Proc. of: Web Science, 2018, ACM
Download paper
Download cached paper
Download BibTeX


Title: Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
Authors: Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty
In Proc. of: Internet Measurement Conference, 2018, ACM
Download paper
Download cached paper
Download BibTeX


Title: 403 Forbidden: A Global View of CDN Geoblocking
Authors: Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi
In Proc. of: Internet Measurement Conference, 2018, ACM
Download paper
Download cached paper
Download BibTeX


Title: An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
Authors: Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis
In Proc. of: Internet Measurement Conference, 2018, ACM
Download paper
Download cached paper
Download BibTeX


Title: Secure asymmetry and deployability for decoy routing systems
Authors: Cecylia Bocovich, Ian Goldberg
In: Privacy Enhancing Technologies, 2018, De Gruyter Open
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Effective Detection of Multimedia Protocol Tunneling using Machine Learning
Authors: Diogo Barradas, Nuno Santos, Luís Rodrigues
In Proc. of: USENIX Security Symposium, 2018, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Quack: Scalable Remote Measurement of Application-Layer Censorship
Authors: Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi
In Proc. of: USENIX Security Symposium, 2018, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Incentivizing Censorship Measurements via Circumvention
Authors: Aqib Nisar, Aqsa Kashaf, Ihsan Ayyub Qazi, Zartash Afzal Uzmi
In Proc. of: SIGCOMM, 2018, ACM
Download paper
Download cached paper
Download BibTeX


Title: Analyzing China’s Blocking of Unpublished Tor Bridges
Authors: Arun Dunna, Ciarán O’Brien, Phillipa Gill
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
Authors: Victoria Manfredi, Pi Songkuntham
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: An analysis of automatic image filtering on WeChat Moments
Authors: Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
Download paper
Download cached paper
Download BibTeX


Title: A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
Authors: Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Automatically Generating a Large, Culture-Specific Blocklist for China
Authors: Austin Hounsel, Prateek Mittal, Nick Feamster
In Proc. of: Free and Open Communications on the Internet, 2018, USENIX
Download paper
Download cached paper
Download BibTeX


Title: How Sudden Censorship Can Increase Access to Information
Authors: William R. Hobbs, Margaret E. Roberts
In: American Political Science Review, 2018, Cambridge University Press
Download paper
Download cached paper
Download BibTeX


Title: Detecting Censorable Content on Sina Weibo: A Pilot Study
Authors: Kei Yin Ng, Anna Feldman, Chris Leberknight
In Proc. of: Hellenic Conference on Artificial Intelligence, 2018, ACM
Download paper
Download cached paper
Download BibTeX


Title: Proof-of-Censorship: Enabling centralized censorship-resistant content providers
Authors: Ian Martiny, Ian Miers, Eric Wustrow
In Proc. of: Financial Cryptography and Data Security, 2018, Springer
Download paper
Download cached paper
Download BibTeX


Title: The Devil’s in The Details: Placing Decoy Routers in the Internet
Authors: Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, H. B. Acharya
In Proc. of: ACSAC, 2017, ACM
Download paper
Download cached paper
Download BibTeX


Title: Lavinia: An audit-payment protocol for censorship-resistant storage
Authors: Cecylia Bocovich, John A. Doucette, Ian Goldberg
In Proc. of: Financial Cryptography and Data Security, 2017, Springer
Download paper
Download cached paper
Download BibTeX


Title: The Random Forest based Detection of Shadowsock’s Traffic
Authors: Ziye Deng, Zihan Liu, Zhouguo Chen, Yubin Guo
In Proc. of: Intelligent Human-Machine Systems and Cybernetics, 2017, IEEE
Download paper
Download cached paper
Download BibTeX


Title: DeTor: Provably Avoiding Geographic Regions in Tor
Authors: Zhihao Li, Stephen Herwig, Dave Levin
In Proc. of: USENIX Security Symposium, 2017, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Mending Wall: On the Implementation of Censorship in India
Authors: Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, Sambuddho Chakravarty
In Proc. of: SecureComm, 2017, Springer
Download paper
Download cached paper
Download BibTeX


Title: Online Advertising under Internet Censorship
Authors: Hira Javaid, Hafiz Kamran Khalil, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
In Proc. of: Hot Topics in Networks, 2017, ACM
Download paper
Download cached paper
Download BibTeX


Title: Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Blocklisting
Authors: Vasilis Ververis, Marios Isaakidis, Chrystalleni Loizidou, Benjamin Fabian
In Proc. of: E-Democracy, 2017, Springer
Download paper
Download cached paper
Download BibTeX


Title: Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue
Download paper
Authors: Zhen Lu, Zhenhua Li, Jian Yang, Tianyin Xu, Ennan Zhai, Yao Liu, Christo Wilson
In Proc. of: Middleware, 2017, ACM
Download cached paper
Download BibTeX


Title: A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography
Authors: Shinyoung Cho, Rishab Nithyanand, Abbas Razaghpanah, Phillipa Gill
In Proc. of: Emerging Networking Experiments and Technologies, 2017, ACM
Download paper
Download cached paper
Download BibTeX


Title: The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
Authors: Milad Nasr, Hadi Zolfaghari, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2017, ACM
Download paper
Download cached paper
Download BibTeX


Title: Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
Authors: Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy
In Proc. of: Internet Measurement Conference, 2017, ACM
Download paper
Download cached paper
Download BibTeX


Title: lib·erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
Authors: Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David Choffnes, Phillipa Gill, Alan Mislove
In Proc. of: Internet Measurement Conference, 2017, ACM
Download paper
Download cached paper
Download BibTeX


Title: When the Internet Goes Down in Bangladesh
Authors: Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, Neha Kumar
In Proc. of: Computer-Supported Cooperative Work and Social Computing, 2017, ACM
Download paper
Download cached paper
Download BibTeX


Title: Characterizing the Nature and Dynamics of Tor Exit Blocking
Authors: Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson
In Proc. of: USENIX Security Symposium, 2017, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Global Measurement of DNS Manipulation
Authors: Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, Vern Paxson
In Proc. of: USENIX Security Symposium, 2017, USENIX
Download paper
Download cached paper
Download BibTeX


Title: FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs
Authors: Alexander Darer, Oliver Farnan, Joss Wright
In Proc. of: Network Traffic Measurement and Analysis, 2017, IFIP
Download paper
Download cached paper
Download BibTeX


Title: Measuring Decentralization of Chinese Keyword Censorship via Mobile Games
Authors: Jeffrey Knockel, Lotus Ruan, Masashi Crete-Nishihata
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
Download paper
Download cached paper
Download BibTeX


Title: The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup
Authors: Rima Tanash, Zhouhan Chen, Dan Wallach, Melissa Marschall
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Autosonda: Discovering Rules and Triggers of Censorship Devices
Authors: Jill Jermyn, Nicholas Weaver
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: An ISP-Scale Deployment of TapDance
Authors: Sergey Frolov, Fred Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow
In Proc. of: Free and Open Communications on the Internet, 2017, USENIX
Download paper
Download cached paper
Download BibTeX


Title: DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
Authors: Diogo Barradas, Nuno Santos, Luís Rodrigues
In: Privacy Enhancing Technologies, 2017, De Gruyter Open
Download paper
Download cached paper
Download BibTeX


Title: Topics of Controversy: An Empirical Analysis of Web Censorship Lists
Authors: Zachary Weinberg, Mahmood Sharif, Janos Szurdi, Nicolas Christin
In: Privacy Enhancing Technologies, 2017, De Gruyter Open
Download paper
Download cached paper
Download BibTeX


Title: A Usability Evaluation of Tor Launcher
Authors: Linda Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman, David Wagner
In: Privacy Enhancing Technologies, 2017, De Gruyter Open
Download paper
Download cached paper
Download BibTeX


Title: Augur: Internet-Wide Detection of Connectivity Disruptions
Authors: Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson
In Proc. of: Symposium on Security & Privacy, 2017, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
Authors: Vahid Heydari, Sun-il Kim, Seong-Moo Yoo
In: Transactions on Information Forensics and Security, 2017, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Internet Censorship in Thailand: User Practices and Potential Threats
Authors: Genevieve Gebhart, Anonymous Author, Tadayoshi Kohno
In Proc. of: European Symposium on Security & Privacy, 2017, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
Authors: Srdjan Matic, Carmela Troncoso, Juan Caballero
In Proc. of: Network and Distributed System Security, 2017, The Internet Society
Download paper
Download cached paper
Download BibTeX


Title: Fingerprintability of WebRTC
Authors: David Fifield, Mia Gil Epner
In: 2016
Download paper
Download cached paper
Download BibTeX


Title: Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses
Authors: Oliver Farnan, Alexander Darer, Joss Wright
In Proc. of: Workshop on Privacy in the Electronic Society, 2016, ACM
Download paper
Download cached paper
Download BibTeX


Title: Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
Authors: Cecylia Bocovich, Ian Goldberg
In Proc. of: Computer and Communications Security, 2016, ACM
Download paper
Download cached paper
Download BibTeX


Title: Game of Decoys: Optimal Decoy Routing Through Game Theory
Authors: Milad Nasr, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2016, ACM
Download paper
Download cached paper
Download BibTeX


Title: Practical Censorship Evasion Leveraging Content Delivery Networks
Authors: Hadi Zolfaghari, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2016, ACM
Download paper
Download cached paper
Download BibTeX


Title: DNS-sly: Avoiding Censorship through Network Complexity
Authors: Qurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Matryoshka: Hiding Secret Communication in Plain Sight
Authors: Iris Safaka, Christina Fragouli, Katerina Argyraki
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
Download paper
Download cached paper
Download BibTeX


Title: GhostPost: Seamless Restoration of Censored Social Media Posts
Authors: Frederick Douglas, Matthew Caesar
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Censors’ Delay in Blocking Circumvention Proxies
Authors: David Fifield, Lynn Tsai
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
Download paper
Download cached paper
Download BibTeX


Title: The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom
Authors: Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX
Download paper
Download cached paper
Download BibTeX


Title: A Framework for the Game-theoretic Analysis of Censorship Resistance
Authors: Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
Download paper
Download cached paper
Download BibTeX


Title: SoK: Making Sense of Censorship Resistance Systems
Authors: Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
Download paper
Download cached paper
Download BibTeX


Title: Salmon: Robust Proxy Distribution for Censorship Circumvention
Authors: Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Satellite: Joint Analysis of CDNs and Network-Level Interference
Authors: Will Scott, Thomas Anderson, Tadayoshi Kohno, Arvind Krishnamurthy
In Proc. of: USENIX Annual Technical Conference, 2016, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Analyzing Internet Censorship in Pakistan
Authors: Giuseppe Aceto, Alessio Botta, Antonio Pescapè, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
In Proc. of: Research and Technologies for Society and Industry, 2016, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Leveraging Internet Services to Evade Censorship
Authors: Apostolis Zarras
In Proc. of: Information Security Conference, 2016, Springer
Download paper
Download cached paper
Download BibTeX


Title: Games Without Frontiers: Investigating Video Games as a Covert Channel
Authors: Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
In Proc. of: European Symposium on Security & Privacy, 2016, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Mailet: Instant Social Networking under Censorship
Authors: Shuai Li, Nicholas Hopper
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
Download paper
Download cached paper
Download BibTeX


Title: CovertCast: Using Live Streaming to Evade Internet Censorship
Authors: Richard McPherson, Amir Houmansadr, Vitaly Shmatikov
In: Privacy Enhancing Technologies, 2016, De Gruyter Open
Download paper
Download cached paper
Download BibTeX


Title: SkypeLine: Robust Hidden Data Transmission for VoIP
Authors: Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
In Proc. of: ASIA Computer and Communications Security, 2016, ACM
Download paper
Download cached paper
Download BibTeX


Title: Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
Authors: Walid Al-Saqaf
In: Media and Communication, 2016, Cogitatio
Download paper
Download cached paper
Download BibTeX


Title: SoK: Towards Grounding Censorship Circumvention in Empiricism
Authors: Michael Carl Tschantz, Sadia Afroz, Anonymous, Vern Paxson
In Proc. of: Symposium on Security & Privacy, 2016, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Alibi Routing
Authors: Dave Levin, Youndo Lee, Luke Valenta, Zhihao Li, Victoria Lai, Cristian Lumezanu, Neil Spring, Bobby Bhattacharjee
In Proc. of: SIGCOMM, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement
Authors: Arvind Narayanan, Bendert Zevenbergen
In: Technology Science, 2015
Download paper
Download cached paper
Download BibTeX


Title: Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
Authors: Daniel Ellard, Alden Jackson, Christine Jones, Victoria Ursula Manfredi, Timothy Strayer, Bishal Thapa, Megan Van Welie
In Proc. of: Local Computer Networks, 2015, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions
Authors: Chaya Hiruncharoenvate, Zhiyuan Lin, Eric Gilbert
In Proc. of: International Conference on Web and Social Media, 2015, AAAI
Download paper
Download cached paper
Download BibTeX


Title: A Case for Marrying Censorship Measurements with Circumvention
Authors: Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
In Proc. of: Hot Topics in Networks, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Can Censorship Measurements Be Safe(r)?
Authors: Ben Jones, Nick Feamster
In Proc. of: Hot Topics in Networks, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
Authors: Paul Vines, Tadayoshi Kohno
In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Known Unknowns: An Analysis of Twitter Censorship in Turkey
Authors: Rima S. Tanash, Zhouhan Chen, Tanmay Thakur, Dan S. Wallach, Devika Subramanian
In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Examining How the Great Firewall Discovers Hidden Circumvention Servers
Authors: Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson
In Proc. of: Internet Measurement Conference, 2015, ACM
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
Authors: John Holowczak, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Seeing through Network-Protocol Obfuscation
Authors: Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: Computer and Communications Security, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering
Authors: Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel
In Proc. of: Ethics in Networked Systems Research, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Understanding Internet Censorship Policy: The Case of Greece
Authors: Vasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China
Authors: Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
Download paper
Download cached paper
Download BibTeX


Title: An Analysis of China’s “Great Cannon”
Authors: Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Marionette: A Programmable Network-Traffic Obfuscation System
Authors: Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton
In Proc. of: USENIX Security Symposium, 2015, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
Authors: Sam Burnett, Nick Feamster
In Proc. of: SIGCOMM, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Ethical Concerns for Censorship Measurement
Authors: Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver
In Proc. of: Ethics in Networked Systems Research, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Analyzing the Great Firewall of China Over Space and Time
Authors: Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
In: Privacy Enhancing Technologies, 2015, De Gruyter Open
Download paper
Download cached paper
Download BibTeX


Title: Blocking-resistant communication through domain fronting
Authors: David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
In: Privacy Enhancing Technologies, 2015, De Gruyter Open
Download paper
Download cached paper
Download BibTeX


Title: Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data
Authors: Phillipa Gill, Masashi Crete-Nishihata, Jakub Dalek, Sharon Goldberg, Adam Senft, Greg Wiseman
In: Transactions on the Web, 2015, ACM
Download paper
Download cached paper
Download BibTeX


Title: Internet Censorship detection: A survey
Authors: Giuseppe Aceto, Antonio Pescapè
In: Computer Networks, 2015, Elsevier
Download paper
Download cached paper
Download BibTeX


Title: Monitoring Internet Censorship with UBICA
Authors: Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
In Proc. of: Traffic Monitoring and Analysis, 2015, Springer
Download paper
Download cached paper
Download BibTeX


Title: GoHop: Personal VPN to Defend from Censorship
Authors: Yuzhi Wang, Ping Ji, Borui Ye, Pengjun Wang, Rong Luo, Huazhong Yang
In Proc. of: International Conference on Advanced Communication Technology, 2014, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Global Network Interference Detection over the RIPE Atlas Network
Authors: Collin Anderson, Philipp Winter, Roya
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship
Authors: Anonymous
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
Download paper
Download cached paper
Download BibTeX


Title: CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
Authors: Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
Download paper
Download cached paper
Download BibTeX


Title: Censorship in the Wild: Analyzing Internet Filtering in Syria
Authors: Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar
In Proc. of: Internet Measurement Conference, 2014, ACM
Download paper
Download cached paper
Download BibTeX


Title: TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
Authors: Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels
Authors: Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall
In Proc. of: Passive and Active Measurement Conference, 2014, Springer
Download paper
Download cached paper
Download BibTeX


Title: No Direction Home: The True Cost of Routing Around Decoys
Authors: Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov
In Proc. of: Network and Distributed System Security, 2014, The Internet Society
Download paper
Download cached paper
Download BibTeX


Title: Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
Authors: Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Automated Detection and Fingerprinting of Censorship Block Pages
Authors: Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill
In Proc. of: Internet Measurement Conference, 2014, ACM
Download paper
Download cached paper
Download BibTeX


Title: A Look at the Consequences of Internet Censorship Through an ISP Lens
Authors: Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson
In Proc. of: Internet Measurement Conference, 2014, ACM
Download paper
Download cached paper
Download BibTeX


Title: Reverse-engineering censorship in China: Randomized experimentation and participant observation
Authors: Gary King, Jennifer Pan, Margaret E. Roberts
In: Science, 2014, AAAS
Download paper
Download cached paper
Download BibTeX


Title: Facet: Streaming over Videoconferencing for Censorship Circumvention
Authors: Shuai Li, Mike Schliep, Nick Hopper
In Proc. of: Workshop on Privacy in the Electronic Society, 2014, ACM
Download paper
Download cached paper
Download BibTeX


Title: LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
Authors: Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: USENIX Security Symposium, 2014, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Toward automatic censorship detection in microblogs
Authors: Donn Morrison
In Proc. of: Data Mining in Social Networks, 2014
Download paper
Download cached paper
Download BibTeX


Title: VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls
Authors: Daiyuu Nobori, Yasushi Shinjo
In Proc. of: Networked Systems Design and Implementation, 2014, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Measuring Freenet in the Wild: Censorship-resilience under Observation
Authors: Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer
Download paper
Download cached paper
Download BibTeX


Title: Censorship Resistance as a Side-Effect
Authors: Henry Tan, Micah Sherr
In Proc. of: Security Protocols, 2014, Springer
Download paper
Download cached paper
Download BibTeX


Title: A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
Authors: Matthias Wachs, Martin Schanzenbach, Christian Grothoff
In Proc. of: Cryptology and Network Security, 2014, Springer
Download paper
Download cached paper
Download BibTeX


Title: TapDance: End-to-Middle Anticensorship without Flow Blocking
Authors: Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
In Proc. of: USENIX Security Symposium, 2014, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship
Authors: David Robinson, Harlan Yu, Anne An
In: 2013
Download paper
Download cached paper
Download BibTeX


Title: Self-Censorship on Facebook
Authors: Sauvik Das, Adam Kramer
In Proc. of: Conference on Weblogs and Social Media, 2013, AAAI
Download paper
Download cached paper
Download BibTeX


Title: Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran
Authors: Collin Anderson
In: 2013
Download paper
Download cached paper
Download BibTeX


Title: Internet Censorship in Iran: A First Look
Authors: Simurgh Aryan, Homa Aryan, J. Alex Halderman
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation
Authors: Karyn Benson, Alberto Dainotti, KC Claffy, Emile Aben
In Proc. of: Traffic Monitoring and Analysis, 2013, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo
Authors: Le Chen, Chi Zhang, Christo Wilson
In Proc. of: Conference on Online Social Networks, 2013, ACM
Download paper
Download cached paper
Download BibTeX


Title: A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship
Authors: Jakub Dalek, Bennett Haselton, Helmi Noman, Adam Senft, Masashi Crete-Nishihata, Phillipa Gill, Ronald J. Deibert
In Proc. of: Internet Measurement Conference, 2013, ACM
Download paper
Download cached paper
Download BibTeX


Title: Revealing Middlebox Interference with Tracebox
Authors: Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet
In Proc. of: Internet Measurement Conference, 2013, ACM
Download paper
Download cached paper
Download BibTeX


Title: Protocol Misidentification Made Easy with Format-Transforming Encryption
Authors: Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: Computer and Communications Security, 2013, ACM
Download paper
Download cached paper
Download BibTeX


Title: OSS: Using Online Scanning Services for Censorship Circumvention
Authors: David Fifield, Gabi Nakibly, Dan Boneh
In Proc. of: Privacy Enhancing Technologies Symposium, 2013, Springer
Download paper
Download cached paper
Download BibTeX


Title: Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
Authors: John Geddes, Max Schuchard, Nicholas Hopper
In Proc. of: Computer and Communications Security, 2013, ACM
Download paper
Download cached paper
Download BibTeX


Title: Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
Authors: Shaddi Hasan, Yahel Ben-David, Giulia Fanti, Eric Brewer, Scott Shenker
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
Download paper
Download cached paper
Download BibTeX


Title: I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
Authors: Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer
In Proc. of: Network and Distributed System Security, 2013, The Internet Society
Download paper
Download cached paper
Download BibTeX


Title: The Parrot is Dead: Observing Unobservable Network Communications
Authors: Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov
In Proc. of: Symposium on Security & Privacy, 2013, IEEE
Online discussion
Download paper
Download cached paper
Download BibTeX


Title: Message In A Bottle: Sailing Past Censorship
Authors: Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
In Proc. of: Annual Computer Security Applications Conference, 2013, ACM
Download paper
Download cached paper
Download BibTeX


Title: Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion
Authors: Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
Download paper
Download cached paper
Download BibTeX


Title: The Anatomy of Web Censorship in Pakistan
Authors: Zubair Nabi
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Identity-Based Steganography and Its Applications to Censorship Resistance
Authors: Tim Ruffing, Jonas Schneider, Aniket Kate
In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
Download paper
Download cached paper
Download BibTeX


Title: Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest
Authors: John-Paul Verkamp, Minaxi Gupta
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
Download paper
Download cached paper
Download BibTeX


Title: On the Feasibility of a Censorship Resistant Decentralized Name System
Authors: Matthias Wachs, Martin Schanzenbach, Christian Grothoff
In Proc. of: Foundations & Practice of Security, 2013, Springer
Download paper
Download cached paper
Download BibTeX


Title: rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
Authors: Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas J. Hopper
In Proc. of: Network and Distributed System Security, 2013, The Internet Society
Download paper
Download cached paper
Download BibTeX


Title: Towards a Censorship Analyser for Tor
Authors: Philipp Winter
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX
Download paper
Download cached paper
Download BibTeX


Title: ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
Authors: Philipp Winter, Tobias Pulls, Juergen Fuss
In Proc. of: Workshop on Privacy in the Electronic Society, 2013, ACM
Download paper
Download cached paper
Download BibTeX


Title: SWEET: Serving the Web by Exploiting Email Tunnels
Authors: Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, Nikita Borisov
In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer
Download paper
Download cached paper
Download BibTeX


Title: The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions
Authors: Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
In Proc. of: USENIX Security Symposium, 2013, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Technical analysis of the Ultrasurf proxying software
Authors: Jacob Appelbaum
In: 2012
Download paper
Download cached paper
Download BibTeX


Title: Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resources and Motivations
Authors: Nicholas Aase, Jedidiah R. Crandall, Álvaro Díaz, Jeffrey Knockel, Jorge Ocaña Molinero, Jared Saia, Dan Wallach, Tao Zhu
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
Download paper
Download cached paper
Download BibTeX


Title: The Hidden Internet of Iran: Private Address Allocations on a National Network
Authors: Collin Anderson
In: 2012
Download paper
Download cached paper
Download BibTeX


Title: The Collateral Damage of Internet Censorship by DNS Injection
Authors: Sparks, Neo, Tank, Smith, Dozer
In: SIGCOMM Computer Communication Review, 2012, ACM
Download paper
Download cached paper
Download BibTeX


Title: Hold-On: Protecting Against On-Path DNS Poisoning
Authors: Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li, Vern Paxson
In Proc. of: Securing and Trusting Internet Names, 2012, National Physical Laboratory
Download paper
Download cached paper
Download BibTeX


Title: Evading Censorship with Browser-Based Proxies
Authors: David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Roger Dingledine, Phil Porras, Dan Boneh
In Proc. of: Privacy Enhancing Technologies Symposium, 2012, Springer
Download paper
Download cached paper
Download BibTeX


Title: OONI: Open Observatory of Network Interference
Authors: Arturo Filastò, Jacob Appelbaum
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
Download paper
Download cached paper
Download BibTeX

Title: How Censorship in China Allows Government Criticism but Silences Collective Expression
Authors: Gary King, Jennifer Pan, Margaret E. Roberts
In: American Political Science Review, 2012
Download paper
Download cached paper
Download BibTeX


Title: Bootstrapping Communications into an Anti-Censorship System
Authors: Patrick Lincoln, Ian Mason, Phillip Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Simpson, Paul Vixie, Dan Boneh
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
Authors: Zhen Ling, Xinwen Fu, Wei Yu, Junzhou Luo, Ming Yang
In Proc. of: INFOCOM, 2012, IEEE
Download paper
Download cached paper
Download BibTeX


Title: SkypeMorph: Protocol Obfuscation for Tor Bridges
Authors: Hooman {Mohajeri Moghaddam}, Baiyu Li, Mohammad Derakhshani, Ian Goldberg
In Proc. of: Computer and Communications Security, 2012, ACM
Download paper
Download cached paper
Download BibTeX


Title: Secure Communication over Diverse Transports
Authors: Michael Rogers, Eleanor Saitta
In Proc. of: Workshop on Privacy in the Electronic Society, 2012, ACM
Download paper
Download cached paper
Download BibTeX


Title: Routing Around Decoys
Authors: Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper
In Proc. of: Computer and Communications Security, 2012, ACM
Download paper
Download cached paper
Download BibTeX


Title: Adapting Social Spam Infrastructure for Political Censorship
Authors: Kurt Thomas, Chris Grier, Vern Paxson
In Proc. of: Large-Scale Exploits and Emergent Threats, 2012, USENIX
Download paper
Download cached paper
Download BibTeX


Title: One-way indexing for plausible deniability in censorship resistant storage
Authors: Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Inferring Mechanics of Web Censorship Around the World
Authors: John-Paul Verkamp, Minaxi Gupta
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
Download paper
Download cached paper
Download BibTeX


Title: CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
Authors: Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov
In Proc. of: Computer and Communications Security, 2012, ACM
Download paper
Download cached paper
Download BibTeX


Title: StegoTorus: A Camouflage Proxy for the Tor Anonymity System
Authors: Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh
In Proc. of: Computer and Communications Security, 2012, ACM
Download paper
Download cached paper
Download BibTeX


Title: How the Great Firewall of China is Blocking Tor
Authors: Philipp Winter, Stefan Lindskog
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Regional Variation in Chinese Internet Filtering
Authors: Joss Wright
In: 2012
Download paper
Download cached paper
Download BibTeX


Title: BridgeSPA: Improving Tor Bridges with Single Packet Authorization
Authors: Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner
In Proc. of: Workshop on Privacy in the Electronic Society, 2011, ACM
Download paper
Download cached paper
Download BibTeX


Title: Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
Authors: Nicholas Jones, Matvey Arye, Jacopo Cesareo, Michael J. Freedman
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
Download paper
Download cached paper
Download BibTeX


Title: #h00t: Censorship Resistant Microblogging
Authors: Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright
In: 2011
Download paper
Download cached paper
Download BibTeX


Title: Scrambling for lightweight censorship resistance
Authors: Joseph Bonneau, Rubin Xu
In Proc. of: Security Protocols, 2011, Springer
Download paper
Download cached paper
Download BibTeX


Title: Analysis of Country-wide Internet Outages Caused by Censorship
Authors: Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapè
In Proc. of: Internet Measurement Conference, 2011, ACM
Download paper
Download cached paper
Download BibTeX


Title: An anomaly-based censorship-detection system for Tor
Authors: George Danezis
In: 2011
Download paper
Download cached paper
Download BibTeX


Title: Automated Named Entity Extraction for Tracking Censorship of Current Events
Authors: Antonio M. Espinoza, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
Authors: Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
In Proc. of: Computer and Communications Security, 2011, ACM
Download paper
Download cached paper
Download BibTeX


Title: Decoy Routing: Toward Unblockable Internet Communication
Authors: Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, W. Timothy Strayer
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Bypassing Internet Censorship for News Broadcasters
Authors: Karl Kathuria
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
Authors: Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Tor Instead of IP
Authors: Vincent Liu, Seungyeop Han, Arvind Krishnamurthy, Thomas Anderson
In Proc. of: Hot Topics in Networks, 2011, ACM
Download paper
Download cached paper
Download BibTeX


Title: Proximax: A Measurement Based System for Proxies Dissemination
Authors: Damon McCoy, Jose Andre Morales, Kirill Levchenko
In Proc. of: Financial Cryptography and Data Security, 2011, Springer
Download paper
Download cached paper
Download BibTeX


Title: Mapping Local Internet Control
Authors: Hal Roberts, David Larochelle, Rob Faris, John Palfrey
In Proc. of: Computer Communications Workshop, 2011, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Infrastructures of Censorship and Lessons from Copyright Resistance
Authors: Wendy Seltzer
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
Download paper
Download cached paper
Download BibTeX


Title: CensMon: A Web Censorship Monitor
Authors: Andreas Sfakianakis, Elias Athanasopoulos, Sotiris Ioannidis
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship
Authors: Irina Shklovski, Nalini P. Kotamraju
In Proc. of: CHI, 2011, ACM
Download paper
Download cached paper
Download BibTeX


Title: Dust: A Blocking-Resistant Internet Transport Protocol
Authors: Brandon Wiley
In: 2011
Download paper
Download cached paper
Download BibTeX


Title: Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
Authors: Joss Wright, Tulio de Souza, Ian Brown
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Telex: Anticensorship in the Network Infrastructure
Authors: Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
In Proc. of: USENIX Security Symposium, 2011, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Internet Censorship in China: Where Does the Filtering Occur?
Authors: Xueyang Xu, Z. Morley Mao, J. Alex Halderman
In Proc. of: Passive and Active Measurement Conference, 2011, Springer
Download paper
Download cached paper
Download BibTeX


Title: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
Authors: Andreas Pfitzmann, Marit Hansen
In: 2010
Download paper
Download cached paper
Download BibTeX


Title: Chipping Away at Censorship Firewalls with User-Generated Content
Authors: Sam Burnett, Nick Feamster, Santosh Vempala
In Proc. of: USENIX Security Symposium, 2010, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Fighting Censorship with Algorithms
Authors: Mohammad Mahdian
In Proc. of: International Conference on Fun with Algorithms, 2010, Springer
Download paper
Download cached paper
Download BibTeX


Title: Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China
Authors: Jong Chun Park, Jedidiah R. Crandall
In Proc. of: Distributed Computing Systems, 2010, IEEE
Download paper
Download cached paper
Download BibTeX


Title: On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking resistance design
Authors: Jon McLachlan, Nicholas Hopper
In Proc. of: Workshop on Privacy in the Electronic Society, 2009, ACM
Download paper
Download cached paper
Download BibTeX


Title: Anonymity and Censorship Resistance in Unstructured Overlay Networks
Authors: Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum
In Proc. of: On the Move to Meaningful Internet Systems, 2009, Springer
Download paper
Download cached paper
Download BibTeX


Title: SkyF2F: Censorship Resistant via Skype Overlay Network
Authors: Shoufeng Cao, Longtao He, Zhongxian Li, Yixian Yang
In Proc. of: International Conference on Information Engineering, 2009, IEEE
Download paper
Download cached paper
Download BibTeX


Title: Detecting Forged TCP Reset Packets
Authors: Nicholas Weaver, Robin Sommer, Vern Paxson
In Proc. of: Network and Distributed System Security, 2009, The Internet Society
Download paper
Download cached paper
Download BibTeX


Title: “Good” Worms and Human Rights
Authors: John Aycock, Alana Maurushat
In: SIGCAS Computers & Society, 2008, ACM
Download paper
Download cached paper
Download BibTeX


Title: Pass it on: Social Networks Stymie Censors
Authors: Yair Sovran, Alana Libonati, Jinyang Li
In Proc. of: International Workshop on Peer-to-Peer Systems, 2008, USENIX
Download paper
Download cached paper
Download BibTeX


Title: ConceptDoppler: A Weather Tracker for Internet Censorship
Authors: Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, Rich East
In Proc. of: Computer and Communications Security, 2007, ACM
Download paper
Download cached paper
Download BibTeX


Title: The Great DNS Wall of China
Authors: Graham Lowe, Patrick Winters, Michael L. Marcus
In: 2007
Download paper
Download cached paper
Download BibTeX


Title: Investigating large-scale Internet content filtering
Authors: Sebastian Wolfgarten
In: 2006
Download paper
Download cached paper
Download BibTeX


Title: Ignoring the Great Firewall of China
Authors: Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
In Proc. of: Privacy Enhancing Technologies, 2006, Springer
Download paper
Download cached paper
Download BibTeX


Title: Failures in a Hybrid Content Blocking System
Authors: Richard Clayton
In Proc. of: Privacy Enhancing Technologies, 2006, Springer
Download paper
Download cached paper
Download BibTeX


Title: Design of a blocking-resistant anonymity system
Authors: Roger Dingledine, Nick Mathewson
In: 2006
Download paper
Download cached paper
Download BibTeX


Title: Censorship Resistance Revisited
Authors: Ginger Perng, Michael K. Reiter, Chenxi Wang
In Proc. of: International Conference on Information Hiding, 2005, Springer
Download paper
Download cached paper
Download BibTeX


Title: The Economics of Censorship Resistance
Authors: George Danezis, Ross Anderson
In Proc. of: Economics and Information Security, 2004
Download paper
Download cached paper
Download BibTeX


Title: How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
Authors: Stefan Köpsell, Ulf Hillig
In Proc. of: Workshop on Privacy in the Electronic Society, 2004, ACM
Download paper
Download cached paper
Download BibTeX


Title: Government mandated blocking of foreign Web content
Authors: Maximillian Dornseif
In Proc. of: DFN-Arbeitstagung über Kommunikationsnetze, 2003, Gesellschaft für Informatik
Download paper
Download cached paper
Download BibTeX


Title: Thwarting Web Censorship with Untrusted Messenger Discovery
Authors: Nick Feamster, Magdalena Balazinska, Winston Wang, Hari Balakrishnan, David Karger
In Proc. of: Privacy Enhancing Technologies, 2003, Springer
Download paper
Download cached paper
Download BibTeX


Title: Infranet: Circumventing Web Censorship and Surveillance
Authors: Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger
In Proc. of: USENIX Security Symposium, 2002, USENIX
Download paper
Download cached paper
Download BibTeX


Title: Anonymizing Censorship Resistant Systems
Authors: Andrei Serjantov
In Proc. of: International Workshop on Peer-To-Peer Systems, 2002, Springer
Download paper
Download cached paper
Download BibTeX


Title: Dagster: Censorship-Resistant Publishing Without Replication
Authors: Adam Stubblefield, Dan S. Wallach
In: 2001
Download paper
Download cached paper
Download BibTeX


Title: Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements
Authors: Marc Waldman, David Mazières
In Proc. of: Computer and Communications Security, 2001, ACM
Download paper
Download cached paper
Download BibTeX


Title: Publius: A robust, tamper-evident, censorship-resistant web publishing system
Authors: Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
In Proc. of: USENIX Security Symposium, 2000, USENIX
Download paper
Download cached paper
Download BibTeX


Title: The Eternity Service
Authors: Ross J. Anderson
In Proc. of: Theory and Applications of Cryptology, 1996, CTU Publishing House
Download paper
Download cached paper
Download BibTeX

One thing that keeps getting me back to this forum is the overflowing amount of useful content such as this.