CONTROLLED VOCABULARY · DEFENSES
By defenses
Sorted by paper count.
- tunneling Tunneling inside an allowed protocol 61 papers
- steganography Steganography 29 papers
- tor Tor (onion routing) 29 papers
- decoy-routing Decoy routing 27 papers
- mimicry Protocol mimicry 20 papers
- domain-fronting Domain fronting 18 papers
- pluggable-transport Pluggable transport (Tor PT framework) 15 papers
- bridges Bridges / private relays 14 papers
- ech-esni Encrypted ClientHello / ESNI 11 papers
- meta-resistance Meta-circumvention / framework 11 papers
- randomization Traffic randomization / shaping 11 papers
- format-transform Format-transforming encryption 7 papers
- marionette Marionette / format-transforming encryption 7 papers
- shadowsocks Shadowsocks family 7 papers
- geneva Application-Layer Geneva 6 papers
- obfs4 obfs4 (randomized handshake) 6 papers
- vless VLESS (V2Ray) 6 papers
- vmess VMess (V2Ray) 6 papers
- webrtc-pluggable WebRTC-based pluggable transport 6 papers
- amp-cache AMP cache proxying 5 papers
- dns-tunneling DNS tunneling 5 papers
- meek Meek (HTTP-based pluggable transport) 5 papers
- water-wasm WATER (WASM-based pluggable transports) 3 papers
- protocol-versioning Versioned protocol upgrade 2 papers
- tapdance TapDance 2 papers
- conjure Conjure / refraction-extension 1 paper
- dust Dust (Wiley 2011 pluggable transport) 1 paper
- reverse-tls Server-initiated TLS 1 paper
- scramblesuit ScrambleSuit 1 paper
- telex Telex 1 paper
- trojan Trojan (TLS-mimicking) 1 paper
- amnezia-wg AmneziaWG (obfuscated WireGuard) 0 papers
- anytls AnyTLS 0 papers
- cloak Cloak 0 papers
- hysteria2 Hysteria 2 (QUIC-based) 0 papers
- reality REALITY (TLS handshake forwarding) 0 papers
- rotating-spki Rotating server SPKI / fingerprint 0 papers