DEFENSES
tunneling Tunneling inside an allowed protocol
Synonyms: domain fronting, tunneling
63 PAPERS ON FILE
- 2026-fares-game The Game Has Changed: Revisiting proxy distribution and game theory
- 2026-kamali-huma Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement
- 2026-tolley-architectural Architectural VPN Vulnerabilities, Disclosure Fatigue, and Structural Failures
- 2025-inyangson-amigo Amigo: Secure Group Mesh Messaging in Realistic Protest Settings
- 2025-kamali-anix Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing
- 2025-pereira-position Position Paper: A Case for Machine-Checked Verification of Circumvention Systems
- 2025-vilalonga-extended Extended Abstract: Using TURN Servers for Censorship Evasion
- 2025-vines-extended Extended Abstract: Nobody’s Fault but Mine: Using Unauthenticated Unidirectional Pushes for Client Update
- 2025-wang-custom Is Custom Congestion Control a Bad Idea for Circumvention Tools?
- 2024-mixon-baca-snitch Attacking Connection Tracking Frameworks as used by Virtual Private Networks
- 2024-xue-tspu-russia Tspu: Russia's decentralized censorship system
- 2023-jia-voiceover Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
- 2022-ramesh-vpnalyzer VPNalyzer: Systematic Investigation of the VPN Ecosystem
- 2021-rosen-balboa Balboa: Bobbing and Weaving around Network Censorship
- 2021-satija-blindtls BlindTLS: Circumventing TLS-Based HTTPS Censorship
- 2021-sharma-camoufler Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
- 2021-wei-domain Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications
- 2020-frolov-detecting Detecting Probe-resistant Proxies
- 2020-frolov-httpt HTTPT: A Probe-Resistant Proxy
- 2020-minaei-moneymorph MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
- 2020-nasr-massbrowser MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
- 2015-frolov-the-use-of-tls The use of TLS in censorship circumvention
- 2019-hoang-measuring Measuring I2P Censorship at a Global Scale
- 2018-hoang-empirical An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
- 2018-nisar-incentivizing Incentivizing Censorship Measurements via Circumvention
- 2017-barradas-deltashaper DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
- 2017-bocovich-lavinia Lavinia: An audit-payment protocol for censorship-resistant storage
- 2017-wang-your Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
- 2016-khattak-sok SoK: Making Sense of Censorship Resistance Systems
- 2016-zarras-leveraging Leveraging Internet Services to Evade Censorship
- 2015-fifield-blocking-resistant Blocking-resistant communication through domain fronting
- 2015-vines-rook Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
- 2015-wang-seeing Seeing through Network-Protocol Obfuscation
- 2014-jones-facade Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
- 2014-li-facet Facet: Streaming over Videoconferencing for Censorship Circumvention
- 2014-tan-censorship Censorship Resistance as a Side-Effect
- 2014-wang-gohop GoHop: Personal VPN to Defend from Censorship
- 2013-fifield-oss OSS: Using Online Scanning Services for Censorship Circumvention
- 2013-geddes-cover Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
- 2013-hasan-building Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
- 2013-houmansadr-i I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
- 2013-invernizzi-message Message In A Bottle: Sailing Past Censorship
- 2013-khattak-towards Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion
- 2013-wachs-feasibility On the Feasibility of a Censorship Resistant Decentralized Name System
- 2013-zhou-sweet SWEET: Serving the Web by Exploiting Email Tunnels
- 2012-rogers-secure Secure Communication over Diverse Transports
- 2012-vasserman-one-way One-way indexing for plausible deniability in censorship resistant storage
- 2012-wang-censorspoofer CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
- 2011-bachrach-h00t \#h00t: Censorship Resistant Microblogging
- 2011-kathuria-bypassing Bypassing Internet Censorship for News Broadcasters
- 2011-mccoy-proximax Proximax: A Measurement Based System for Proxies Dissemination
- 2010-burnett-chipping Chipping Away at Censorship Firewalls with User-Generated Content
- 2010-mahdian-fighting Fighting Censorship with Algorithms
- 2009-backes-anonymity Anonymity and Censorship Resistance in Unstructured Overlay Networks
- 2009-cao-skyf2f SkyF2F: Censorship Resistant via Skype Overlay Network
- 2008-aycock-good ``Good'' Worms and Human Rights
- 2008-sovran-pass Pass it on: Social Networks Stymie Censors
- 2005-perng-censorship Censorship Resistance Revisited
- 2004-k-psell-achieve How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
- 2003-feamster-thwarting Thwarting Web Censorship with Untrusted Messenger Discovery
- 2002-feamster-infranet Infranet: Circumventing Web Censorship and Surveillance
- 2002-serjantov-anonymizing Anonymizing Censorship Resistant Systems
- 1998-ptacek-insertion Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection