382 ENTRIES · NEWEST FIRST
All papers
-
2026-ablove-characterizing
Characterizing the Implementation of Censorship Policies in Chinese LLM Services
-
2026-almutairi-server
Server, Client, or Relay? Dual-Role Detection of Circumvention Relays
-
2026-fares-game
The Game Has Changed: Revisiting proxy distribution and game theory
-
2026-jois-assemblage
Assemblage: Chipping Away at Censorship with Generative Steganography
-
2026-kamali-huma
Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement
-
2026-lange-towards
Towards Automated DNS Censorship Circumvention
-
2026-lee-quicstep
QUICstep: Evaluating connection migration based QUIC censorship circumvention
-
2026-lipphardt-dual
Dual Standards: Examining Content Moderation Disparities Between API and WebUI Interfaces in Large Language Models
-
2026-ratliff-mirage
Mirage: Private, Mobility-based Routing for Censorship Evasion
-
2026-sheffey-geedge
Geedge Cases: Censorship Measurement Insights from the Geedge Networks Leak
-
2026-tolley-architectural
Architectural VPN Vulnerabilities, Disclosure Fatigue, and Structural Failures
-
2026-zohaib-extended
Extended Abstract: CensorAlert -- Leveraging LLM Agents for Automated Censorship Report Aggregation and Analysis
-
2025-amnesty-pakistan-shadows
Shadows of Control: Censorship and mass surveillance in Pakistan
-
2025-fan-wallbleed · core
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
-
2025-geedge-mesa-leak · core
Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
-
2025-gfw-port443-rst
Analysis of the GFW's Unconditional Port 443 Block on August 20, 2025
-
2025-h-ller-evaluating
Evaluating Onion Address Collection Methods
-
2025-habib-examining
Examining Leading Pakistani Mobile Apps
-
2025-interseclab-internet-coup · core
The Internet Coup
-
2025-inyangson-amigo
Amigo: Secure Group Mesh Messaging in Realistic Protest Settings
-
2025-iran-shutdown-measurement · core
Measuring the June 2025 Iran nationwide internet shutdown
-
2025-jfm-silk-road-surveillance
Silk Road of Surveillance
-
2025-kamali-anix
Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing
-
2025-lange-i-ra-nconsistencies
I(ra)nconsistencies: Novel Insights into Iran's Censorship
-
2025-lipphardt-1-800-censorship
1-800-Censorship: Analyzing internet censorship data using the Internet Yellow Pages
-
2025-midtlien-fingerprint-resistant
Fingerprint-resistant DTLS for usage in Snowflake
-
2025-mixon-baca-hidden
Hidden Links: Analyzing Secret Families of VPN Apps
-
2025-niere-encrypted
Encrypted Client Hello (ECH) in Censorship Circumvention
-
2025-niere-transport
Transport Layer Obscurity: Circumventing SNI Censorship on the TLS Layer
-
2025-nourin-nobody
Is Nobody There? Good! Globally Measuring Connection Tampering without Responsive Endhosts
-
2025-pereira-extended
Extended Abstract: Traffic Shaping for Network Protocols: A Modular and Developer-Friendly Framework
-
2025-pereira-position
Position Paper: A Case for Machine-Checked Verification of Circumvention Systems
-
2025-rodriguez-revisiting
Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks
-
2025-sheffey-extended
Extended Abstract: I’ll Shake Your Hand: What Happens After DNS Poisoning
-
2025-sivan-sevilla-probing
Probing the third-party infrastructure of digital news on the Web
-
2025-tai-irblock
IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran
-
2025-umesh-improved
An Improved BGP Internet Graph for Optimizing Refraction Proxy Placement
-
2025-vafa-learning
Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies
-
2025-vilalonga-extended
Extended Abstract: Using TURN Servers for Censorship Evasion
-
2025-vines-extended
Extended Abstract: Nobody’s Fault but Mine: Using Unauthenticated Unidirectional Pushes for Client Update
-
2025-wails-censorship
Censorship Evasion with Unidentified Protocol Generation
-
2025-wang-custom
Is Custom Congestion Control a Bad Idea for Circumvention Tools?
-
2025-wendzel-survey
A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges
-
2025-wilson-extended
Extended Abstract: Shaperd: Easily Adoptable Real-Time Traffic Shaper for Fully Encrypted Protocols
-
2025-wu-regional-censorship · core
A Wall Behind A Wall: Emerging Regional Censorship in China
-
2025-xue-discriminative
The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic
-
2025-zohaib-quic-sni · core
Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China
-
2017-frolov-water-pluggable · core
WATER: a programmable framework for pluggable transports
-
2024-ahmed-extended
Extended Abstract: The Impact of Online Censorship on LLMs
-
2024-almutairi-fingerprinting
Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model
-
2024-awwad-digital
Digital Repression in Palestine
-
2024-bhaskar-understanding
Understanding Routing-Induced Censorship Changes Globally
-
2024-bocovich-snowflake
Snowflake, a censorship circumvention system using temporary WebRTC proxies
-
2024-calle-toward
Toward Automated DNS Tampering Detection Using Machine Learning
-
2024-chen-extended
Extended Abstract: Oscur0: One-shot Circumvention without Registration
-
2024-chi-just
Just add WATER: WebAssembly-based Circumvention Transports
-
2024-gao-extended
Extended Abstract: Leveraging Large Language Models to Identify Internet Censorship through Network Data
-
2024-gosain-out
Out in the Open: On the Implementation of Mobile App Filtering in India
-
2024-hanlon-detecting
Detecting VPN Traffic through Encapsulated TCP Behavior
-
2024-hoang-gfweb
GFWeb: Measuring the Great Firewall's Web Censorship at Scale
-
2024-kon-netshuffle
NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge
-
2024-kon-spotproxy
SpotProxy: Rediscovering the Cloud for Censorship Circumvention
-
2024-kristoff-internet
Internet Sanctions on Russian Media: Actions and Effects
-
2024-kujath-analyzing
Analyzing Prominent Mobile Apps in Latin America
-
2024-lorimer-extended
Extended Abstract: Traffic Splitting for Pluggable Transports
-
2024-m-ller-turning
Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling
-
2024-moon-pryde
Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments
-
2024-pu-exploring
Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention
-
2024-ruo-lost
Lost in Translation: Characterizing Automated Censorship in Online Translation Services
-
2024-sakamoto-bleeding
Bleeding Wall: A Hematologic Examination on the Great Firewall
-
2024-tang-automatic
Automatic Generation of Web Censorship Probe Lists
-
2024-tsai-modeling
Modeling and Detecting Internet Censorship Events
-
2024-vilalonga-looking
Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels
-
2024-vines-communication
Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
-
2024-vines-ten
Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burdens
-
2024-wails-precisely
On Precisely Detecting Censorship Circumvention in Real-World Networks
-
2024-wang-identifying
Identifying VPN Servers through Graph-Represented Behaviors
-
2024-xue-bridging
Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape
-
2024-xue-fingerprinting
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
-
2024-xue-tspu-russia · core
Tspu: Russia's decentralized censorship system
-
2024-zhang-toothless
How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censorship by Local Governments in China
-
2024-zillien-look
Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION
-
2023-amich-deresistor
DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
-
2023-bischof-destination
Destination Unreachable: Characterizing Internet Outages and Shutdowns
-
2023-brown-augmenting
Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
-
2023-ding-discop
Discop: Provably secure steganography in practice based on ``distribution copies''
-
2023-feng-study
A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming
-
2023-fenske-security
Security Notions for Fully Encrypted Protocols
-
2023-fifield-comments
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
-
2023-fifield-running
Running a high-performance pluggable transports Tor bridge
-
2023-gfw-blocking-1111
The blocking of 1.1.1.1 in China, starting from 2023-10-01
-
2023-jia-voiceover
Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
-
2023-katira-censorwatch
CensorWatch: On the Implementation of Online Censorship in India
-
2023-master-worldwide
A Worldwide View of Nation-state Internet Censorship
-
2023-niere-poster
Poster: Circumventing the GFW with TLS Record Fragmentation
-
2023-nourin-detecting
Detecting Network Interference Without Endpoint Participation
-
2023-nourin-measuring
Measuring and Evading Turkmenistan's Internet Censorship
-
2023-ortwein-towards
Towards a Comprehensive Understanding of Russian Transit Censorship
-
2023-raman-advancing
Advancing the Art of Censorship Data Analysis
-
2023-raman-global
Global, Passive Detection of Connection Tampering
-
2023-ramesh-network
Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom
-
2023-sharma-dolphin
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
-
2023-streisand-where
Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation
-
2023-sun-telepath
TELEPATH: A Minecraft-based Covert Communication System
-
2023-tran-crowdsourcing
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies
-
2023-tulloch-lox
Lox: Protecting the Social Graph in Bridge Distribution
-
2023-ververis-website
Website blocking in the European Union: Network interference from the perspective of Open Internet
-
2023-wails-proteus
Proteus: Programmable Protocols for Censorship Circumvention
-
2023-wang-chasing
Chasing Shadows: A security analysis of the ShadowTLS proxy
-
2023-wang-self-censorship
Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law
-
2023-wu-fully-encrypted-detect · core
How the Great Firewall of China detects and blocks fully encrypted traffic
-
2023-xue-use
The Use of Push Notification in Censorship Circumvention
-
2022-bhaskar-many
Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
-
2022-blocking-tls-circumvention · core
Large scale blocking of TLS-based censorship circumvention tools in China
-
2022-chang-covid-19
COVID-19 increased censorship circumvention and access to sensitive topics in China
-
2022-cheng-in-depth
In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolvers over Space and Time
-
2022-figueira-stegozoa
Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
-
2022-harrity-get
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies
-
2022-hoang-measuring
Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering
-
2022-raman-network
Network Measurement Methods for Locating and Examining Censorship Devices
-
2022-waheed-darwin-s
Darwin's Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models
-
2022-xue-openvpn
OpenVPN is Open to VPN Fingerprinting
-
2021-basso-measuring
Measuring DoT/DoH blocking using OONI Probe: a preliminary study
-
2021-bock-even
Even Censors Have a Backup: Examining China's Double HTTPS Censorship Middleboxes
-
2021-bock-weaponizing
Weaponizing Middleboxes for TCP Reflected Amplification
-
2021-bock-your
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
-
2021-elmenhorst-web
Web censorship measurements of HTTP/3 over QUIC
-
2021-gosain-too
Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs
-
2021-hoang-great
How Great is the Great Firewall? Measuring China's DNS Censorship
-
2021-kaptchuk-meteor
Meteor: Cryptographically Secure Steganography for Realistic Distributions
-
2021-knockel-measuring
Measuring QQMail's Automated Email Censorship in China
-
2021-kwan-exploring
Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels
-
2021-lorimer-oustralopithecus
OUStralopithecus: Overt User Simulation for Censorship Circumvention
-
2021-padmanabhan-multi-perspective
A multi-perspective view of Internet censorship in Myanmar
-
2021-rambert-chinese
Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China
-
2021-rosen-balboa
Balboa: Bobbing and Weaving around Network Censorship
-
2021-satija-blindtls
BlindTLS: Circumventing TLS-Based HTTPS Censorship
-
2021-sharma-camoufler
Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
-
2021-ververis-understanding
Understanding Internet Censorship in Europe: The Case of Spain
-
2021-wei-domain
Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications
-
2021-xue-throttling
Throttling Twitter: an emerging censorship technique in Russia
-
2020-alharbi-opening
Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia
-
2020-alice-shadowsocks-detection · core
How China Detects and Blocks Shadowsocks
-
2020-anonymous-triplet-censors · core
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior
-
2020-barradas-poking
Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC
-
2020-barradas-towards
Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels
-
2020-birtel-slitheen
Slitheen++: Stealth TLS-based Decoy Routing
-
2020-bock-come
Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
-
2020-bock-detecting
Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter
-
2020-fifield-turbo
Turbo Tunnel, a good way to design censorship circumvention protocols
-
2020-frolov-detecting
Detecting Probe-resistant Proxies
-
2020-frolov-httpt
HTTPT: A Probe-Resistant Proxy
-
2020-gfw-esni-blocking
Exposing and Circumventing China's Censorship of ESNI
-
2020-govil-mimiq
MIMIQ: Masking IPs with Migration in QUIC
-
2020-minaei-moneymorph
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
-
2020-nasr-massbrowser
MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
-
2020-niaki-iclab
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
-
2020-oakley-protocol
Protocol Proxy: An FTE-based covert channel
-
2020-raman-censored
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
-
2020-raman-investigating
Investigating Large Scale HTTPS Interception in Kazakhstan
-
2020-raman-measuring
Measuring the Deployment of Network Censorship Filters at Global Scale
-
2020-ramesh-decentralized
Decentralized Control: A Case Study of Russia
-
2020-sharma-siegebreaker
SiegeBreaker: An SDN Based Practical Decoy Routing System
-
2020-singh-india
How India Censors the Web
-
2020-v2ray-weaknesses
Summary on Recently Discovered V2Ray Weaknesses
-
2020-vandersloot-running
Running Refraction Networking for Real
-
2020-wang-symtcp
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery
-
2020-zhu-characterizing
Characterizing Transnational Internet Performance and the Great Bottleneck of China
-
2015-frolov-the-use-of-tls · core
The use of TLS in censorship circumvention
-
2019-bock-geneva
Geneva: Evolving Censorship Evasion Strategies
-
2019-chai-importance
On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention
-
2019-chen-impact
The Impact of Media Censorship: 1984 or Brave New World?
-
2019-frolov-conjure
Conjure: Summoning Proxies from Unused Address Space
-
2019-hoang-measuring
Measuring I2P Censorship at a Global Scale
-
2019-iszaevich-distributed
Distributed Detection of Tor Directory Authorities Censorship in Mexico
-
2019-nasr-enemy
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
-
2019-sheffey-improving
Improving Meek With Adversarial Techniques
-
2019-ververis-shedding
Shedding Light on Mobile App Store Censorship
-
2019-xiong-efficient
An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message
-
2018-barradas-effective
Effective Detection of Multimedia Protocol Tunneling using Machine Learning
-
2018-bocovich-secure
Secure asymmetry and deployability for decoy routing systems
-
2018-dunna-analyzing
Analyzing China's Blocking of Unpublished Tor Bridges
-
2018-hoang-empirical
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
-
2018-hobbs-sudden
How Sudden Censorship Can Increase Access to Information
-
2018-hounsel-automatically
Automatically Generating a Large, Culture-Specific Blocklist for China
-
2018-knockel-analysis
An analysis of automatic image filtering on WeChat Moments
-
2018-manfredi-multiflow
MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
-
2018-martiny-proof-of-censorship
Proof-of-Censorship: Enabling centralized censorship-resistant content providers
-
2018-mcdonald-403
403 Forbidden: A Global View of CDN Geoblocking
-
2018-ng-detecting
Detecting Censorable Content on Sina Weibo: A Pilot Study
-
2018-nisar-incentivizing
Incentivizing Censorship Measurements via Circumvention
-
2018-tschantz-bestiary
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
-
2018-vandersloot-quack
Quack: Scalable Remote Measurement of Application-Layer Censorship
-
2018-wright-identifying
On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship
-
2018-yadav-where
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
-
2017-barradas-deltashaper
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
-
2017-bocovich-lavinia
Lavinia: An audit-payment protocol for censorship-resistant storage
-
2017-cho-churn
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography
-
2017-darer-filteredweb
FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs
-
2017-deng-random
The Random Forest based Detection of Shadowsock's Traffic
-
2017-frolov-isp-scale
An ISP-Scale Deployment of TapDance
-
2017-gebhart-internet
Internet Censorship in Thailand: User Practices and Potential Threats
-
2017-gosain-devil-s
The Devil's in The Details: Placing Decoy Routers in the Internet
-
2017-gosain-mending
Mending Wall: On the Implementation of Censorship in India
-
2017-heydari-scalable
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
-
2017-javaid-online
Online Advertising under Internet Censorship
-
2017-jermyn-autosonda
Autosonda: Discovering Rules and Triggers of Censorship Devices
-
2017-knockel-measuring
Measuring Decentralization of Chinese Keyword Censorship via Mobile Games
-
2017-lee-usability
A Usability Evaluation of Tor Launcher
-
2017-li-detor
DeTor: Provably Avoiding Geographic Regions in Tor
-
2017-li-lib-cdot-erate
lib$\cdot$erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
-
2017-lu-accessing
Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue
-
2017-matic-dissecting
Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
-
2017-morshed-when
When the Internet Goes Down in Bangladesh
-
2017-nasr-waterfall
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
-
2017-pearce-augur
Augur: Internet-Wide Detection of Connectivity Disruptions
-
2017-pearce-global
Global Measurement of DNS Manipulation
-
2017-singh-characterizing
Characterizing the Nature and Dynamics of Tor Exit Blocking
-
2017-tanash-decline
The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup
-
2017-ververis-internet
Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Blocklisting
-
2017-wang-your
Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
-
2017-weinberg-topics
Topics of Controversy: An Empirical Analysis of Web Censorship Lists
-
2016-aceto-analyzing
Analyzing Internet Censorship in Pakistan
-
2016-akbar-dns-sly
DNS-sly: Avoiding Censorship through Network Complexity
-
2016-al-saqaf-internet
Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
-
2016-bocovich-slitheen
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
-
2016-douglas-ghostpost
GhostPost: Seamless Restoration of Censored Social Media Posts
-
2016-douglas-salmon
Salmon: Robust Proxy Distribution for Censorship Circumvention
-
2016-elahi-framework
A Framework for the Game-theoretic Analysis of Censorship Resistance
-
2016-farnan-poisoning
Poisoning the Well -- Exploring the Great Firewall's Poisoned DNS Responses
-
2016-fifield-censors
Censors' Delay in Blocking Circumvention Proxies
-
2016-fifield-fingerprintability
Fingerprintability of WebRTC
-
2016-hahn-games
Games Without Frontiers: Investigating Video Games as a Covert Channel
-
2016-khattak-sok
SoK: Making Sense of Censorship Resistance Systems
-
2016-kohls-skypeline
SkypeLine: Robust Hidden Data Transmission for VoIP
-
2016-li-mailet
Mailet: Instant Social Networking under Censorship
-
2016-mcpherson-covertcast
CovertCast: Using Live Streaming to Evade Internet Censorship
-
2016-nasr-game
Game of Decoys: Optimal Decoy Routing Through Game Theory
-
2016-safaka-matryoshka
Matryoshka: Hiding Secret Communication in Plain Sight
-
2016-scott-satellite
Satellite: Joint Analysis of CDNs and Network-Level Interference
-
2016-singh-politics
The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom
-
2016-tschantz-sok
SoK: Towards Grounding Censorship Circumvention in Empiricism
-
2016-zarras-leveraging
Leveraging Internet Services to Evade Censorship
-
2016-zolfaghari-practical
Practical Censorship Evasion Leveraging Content Delivery Networks
-
2015-aceto-internet
Internet Censorship detection: A survey
-
2015-aceto-monitoring
Monitoring Internet Censorship with UBICA
-
2015-burnett-encore
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
-
2015-crandall-forgive
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering
-
2015-dyer-marionette
Marionette: A Programmable Network-Traffic Obfuscation System
-
2015-ellard-rebound
Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
-
2015-ensafi-active-probing · core
Examining how the Great Firewall discovers hidden circumvention servers
-
2015-ensafi-analyzing
Analyzing the Great Firewall of China Over Space and Time
-
2015-fifield-blocking-resistant · core
Blocking-resistant communication through domain fronting
-
2015-gill-characterizing
Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data
-
2015-hiruncharoenvate-algorithmically
Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions
-
2015-holowczak-cachebrowser
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
-
2015-jones-can
Can Censorship Measurements Be Safe(r)?
-
2015-jones-ethical
Ethical Concerns for Censorship Measurement
-
2015-knockel-every
Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China
-
2015-levin-alibi
Alibi Routing
-
2015-marczak-analysis
An Analysis of China's ``Great Cannon''
-
2015-narayanan-no
No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement
-
2015-nisar-case
A Case for Marrying Censorship Measurements with Circumvention
-
2015-tanash-known
Known Unknowns: An Analysis of Twitter Censorship in Turkey
-
2015-ververis-understanding
Understanding Internet Censorship Policy: The Case of Greece
-
2015-vines-rook
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
-
2015-wang-seeing
Seeing through Network-Protocol Obfuscation
-
2014-anderson-global
Global Network Interference Detection over the RIPE Atlas Network
-
2014-anonymous-towards
Towards a Comprehensive Picture of the Great Firewall's DNS Censorship
-
2014-brubaker-cloudtransport
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
-
2014-chaabane-censorship
Censorship in the Wild: Analyzing Internet Filtering in Syria
-
2014-connolly-trist
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
-
2014-ensafi-detecting
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels
-
2014-houmansadr-no
No Direction Home: The True Cost of Routing Around Decoys
-
2014-jones-automated
Automated Detection and Fingerprinting of Censorship Block Pages
-
2014-jones-facade
Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
-
2014-khattak-look
A Look at the Consequences of Internet Censorship Through an ISP Lens
-
2014-king-reverse-engineering
Reverse-engineering censorship in China: Randomized experimentation and participant observation
-
2014-li-facet
Facet: Streaming over Videoconferencing for Censorship Circumvention
-
2014-luchaup-libfte
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
-
2014-morrison-toward
Toward automatic censorship detection in microblogs
-
2014-nobori-vpn
VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls
-
2014-roos-measuring
Measuring Freenet in the Wild: Censorship-resilience under Observation
-
2014-tan-censorship
Censorship Resistance as a Side-Effect
-
2014-wachs-censorship-resistant
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
-
2014-wang-gohop
GoHop: Personal VPN to Defend from Censorship
-
2014-wustrow-tapdance
TapDance: End-to-Middle Anticensorship without Flow Blocking
-
2013-anderson-dimming
Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran
-
2013-aryan-internet
Internet Censorship in Iran: A First Look
-
2013-benson-gaining
Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation
-
2013-chen-tweeting
Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo
-
2013-dalek-method
A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship
-
2013-das-self-censorship
Self-Censorship on Facebook
-
2013-detal-revealing
Revealing Middlebox Interference with Tracebox
-
2013-dyer-protocol
Protocol Misidentification Made Easy with Format-Transforming Encryption
-
2013-fifield-oss
OSS: Using Online Scanning Services for Censorship Circumvention
-
2013-geddes-cover
Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
-
2013-hasan-building
Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
-
2013-houmansadr-i
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
-
2013-houmansadr-parrot
The Parrot is Dead: Observing Unobservable Network Communications
-
2013-invernizzi-message
Message In A Bottle: Sailing Past Censorship
-
2013-khattak-towards
Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion
-
2013-nabi-anatomy
The Anatomy of Web Censorship in Pakistan
-
2013-robinson-collateral
Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship
-
2013-ruffing-identity-based
Identity-Based Steganography and Its Applications to Censorship Resistance
-
2013-verkamp-five
Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest
-
2013-wachs-feasibility
On the Feasibility of a Censorship Resistant Decentralized Name System
-
2013-wang-rbridge
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
-
2013-winter-scramblesuit
ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
-
2013-winter-towards
Towards a Censorship Analyser for Tor
-
2013-zhou-sweet
SWEET: Serving the Web by Exploiting Email Tunnels
-
2013-zhu-velocity
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions
-
2012-aase-whiskey
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations
-
2012-anderson-hidden
The Hidden Internet of Iran: Private Address Allocations on a National Network
-
2012-appelbaum-technical
Technical analysis of the Ultrasurf proxying software
-
2012-duan-hold-on
Hold-On: Protecting Against On-Path DNS Poisoning
-
2012-fifield-evading
Evading Censorship with Browser-Based Proxies
-
2012-filast-ooni
OONI: Open Observatory of Network Interference
-
2012-king-censorship
How Censorship in China Allows Government Criticism but Silences Collective Expression
-
2012-lincoln-bootstrapping
Bootstrapping Communications into an Anti-Censorship System
-
2012-ling-extensive
Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
-
2012-moghaddam-skypemorph
SkypeMorph: Protocol Obfuscation for Tor Bridges
-
2012-rogers-secure
Secure Communication over Diverse Transports
-
2012-schuchard-routing
Routing Around Decoys
-
2012-sparks-collateral
The Collateral Damage of Internet Censorship by DNS Injection
-
2012-thomas-adapting
Adapting Social Spam Infrastructure for Political Censorship
-
2012-vasserman-one-way
One-way indexing for plausible deniability in censorship resistant storage
-
2012-verkamp-inferring
Inferring Mechanics of Web Censorship Around the World
-
2012-wang-censorspoofer
CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
-
2012-weinberg-stegotorus
StegoTorus: A Camouflage Proxy for the Tor Anonymity System
-
2012-winter-great
How the Great Firewall of China is Blocking Tor
-
2012-wright-regional
Regional Variation in Chinese Internet Filtering
-
2011-bachrach-h00t
\#h00t: Censorship Resistant Microblogging
-
2011-bonneau-scrambling
Scrambling for lightweight censorship resistance
-
2011-dainotti-analysis
Analysis of Country-wide Internet Outages Caused by Censorship
-
2011-danezis-anomaly-based
An anomaly-based censorship-detection system for Tor
-
2011-espinoza-automated
Automated Named Entity Extraction for Tracking Censorship of Current Events
-
2011-houmansadr-cirripede
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
-
2011-jones-hiding
Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
-
2011-karlin-decoy
Decoy Routing: Toward Unblockable Internet Communication
-
2011-kathuria-bypassing
Bypassing Internet Censorship for News Broadcasters
-
2011-knockel-three
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
-
2011-liu-tor
Tor Instead of IP
-
2011-mccoy-proximax
Proximax: A Measurement Based System for Proxies Dissemination
-
2011-roberts-mapping
Mapping Local Internet Control
-
2011-seltzer-infrastructures
Infrastructures of Censorship and Lessons from Copyright Resistance
-
2011-sfakianakis-censmon
CensMon: A Web Censorship Monitor
-
2011-shklovski-online
Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship
-
2011-smits-bridgespa
BridgeSPA: Improving Tor Bridges with Single Packet Authorization
-
2011-wiley-dust
Dust: A Blocking-Resistant Internet Transport Protocol
-
2011-wright-fine-grained
Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
-
2011-wustrow-telex
Telex: Anticensorship in the Network Infrastructure
-
2011-xu-internet
Internet Censorship in China: Where Does the Filtering Occur?
-
2010-burnett-chipping
Chipping Away at Censorship Firewalls with User-Generated Content
-
2010-mahdian-fighting
Fighting Censorship with Algorithms
-
2010-park-empirical
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China
-
2010-pfitzmann-terminology
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
2009-backes-anonymity
Anonymity and Censorship Resistance in Unstructured Overlay Networks
-
2009-cao-skyf2f
SkyF2F: Censorship Resistant via Skype Overlay Network
-
2009-mclachlan-risks
On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design
-
2009-weaver-detecting
Detecting Forged TCP Reset Packets
-
2008-aycock-good
``Good'' Worms and Human Rights
-
2008-sovran-pass
Pass it on: Social Networks Stymie Censors
-
2007-crandall-conceptdoppler
ConceptDoppler: A Weather Tracker for Internet Censorship
-
2007-lowe-great
The Great DNS Wall of China
-
2006-clayton-failures
Failures in a Hybrid Content Blocking System
-
2006-clayton-ignoring
Ignoring the Great Firewall of China
-
2006-dingledine-design
Design of a blocking-resistant anonymity system
-
2006-wolfgarten-investigating
Investigating large-scale Internet content filtering
-
2005-perng-censorship
Censorship Resistance Revisited
-
2004-danezis-economics
The Economics of Censorship Resistance
-
2004-k-psell-achieve
How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
-
2003-dornseif-government
Government mandated blocking of foreign Web content
-
2003-feamster-thwarting
Thwarting Web Censorship with Untrusted Messenger Discovery
-
2002-feamster-infranet
Infranet: Circumventing Web Censorship and Surveillance
-
2002-serjantov-anonymizing
Anonymizing Censorship Resistant Systems
-
2001-handley-network
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
-
2001-stubblefield-dagster
Dagster: Censorship-Resistant Publishing Without Replication
-
2001-waldman-tangler
Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements
-
2000-waldman-publius
Publius: A robust, tamper-evident, censorship-resistant web publishing system
-
1998-ptacek-insertion
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
1996-anderson-eternity
The Eternity Service