DEFENSES
randomization Traffic randomization / shaping
Hide the underlying protocol by deliberate randomization of size/timing/payload.
11 PAPERS ON FILE
- 2025-geedge-mesa-leak Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
- 2025-interseclab-internet-coup The Internet Coup
- 2025-zohaib-quic-sni Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China
- 2017-frolov-water-pluggable WATER: a programmable framework for pluggable transports
- 2023-wu-fully-encrypted-detect How the Great Firewall of China detects and blocks fully encrypted traffic
- 2021-rosen-balboa Balboa: Bobbing and Weaving around Network Censorship
- 2020-alice-shadowsocks-detection How China Detects and Blocks Shadowsocks
- 2017-heydari-scalable Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
- 2017-li-lib-cdot-erate lib$\cdot$erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
- 2015-ensafi-active-probing Examining how the Great Firewall discovers hidden circumvention servers
- 2014-wang-gohop GoHop: Personal VPN to Defend from Censorship