TECHNIQUES
dpi Deep Packet Inspection
Inspecting payload bytes beyond the TCP/IP headers.
249 PAPERS ON FILE
- 2026-ablove-characterizing Characterizing the Implementation of Censorship Policies in Chinese LLM Services
- 2026-almutairi-server Server, Client, or Relay? Dual-Role Detection of Circumvention Relays
- 2026-fares-game The Game Has Changed: Revisiting proxy distribution and game theory
- 2026-jois-assemblage Assemblage: Chipping Away at Censorship with Generative Steganography
- 2026-kamali-huma Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement
- 2026-lipphardt-dual Dual Standards: Examining Content Moderation Disparities Between API and WebUI Interfaces in Large Language Models
- 2026-ratliff-mirage Mirage: Private, Mobility-based Routing for Censorship Evasion
- 2026-sheffey-geedge Geedge Cases: Censorship Measurement Insights from the Geedge Networks Leak
- 2026-tolley-architectural Architectural VPN Vulnerabilities, Disclosure Fatigue, and Structural Failures
- 2026-zohaib-extended Extended Abstract: CensorAlert -- Leveraging LLM Agents for Automated Censorship Report Aggregation and Analysis
- 2025-alaraj-iran-refraction Measuring Censorship in Iran Using Refraction-based Proxies
- 2025-amnesty-pakistan-shadows Shadows of Control: Censorship and mass surveillance in Pakistan
- 2025-fan-wallbleed Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
- 2025-geedge-mesa-leak Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
- 2025-gfw-port443-rst Analysis of the GFW's Unconditional Port 443 Block on August 20, 2025
- 2025-habib-examining Examining Leading Pakistani Mobile Apps
- 2025-interseclab-internet-coup The Internet Coup
- 2025-inyangson-amigo Amigo: Secure Group Mesh Messaging in Realistic Protest Settings
- 2025-iran-shutdown-measurement Measuring the June 2025 Iran nationwide internet shutdown
- 2025-jfm-silk-road-surveillance Silk Road of Surveillance
- 2025-kamali-anix Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing
- 2025-lange-i-ra-nconsistencies I(ra)nconsistencies: Novel Insights into Iran's Censorship
- 2025-lipphardt-1-800-censorship 1-800-Censorship: Analyzing internet censorship data using the Internet Yellow Pages
- 2025-mixon-baca-hidden Hidden Links: Analyzing Secret Families of VPN Apps
- 2025-nourin-nobody Is Nobody There? Good! Globally Measuring Connection Tampering without Responsive Endhosts
- 2025-pereira-position Position Paper: A Case for Machine-Checked Verification of Circumvention Systems
- 2025-rodriguez-revisiting Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks
- 2025-sivan-sevilla-probing Probing the third-party infrastructure of digital news on the Web
- 2025-tai-irblock IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran
- 2025-vilalonga-extended Extended Abstract: Using TURN Servers for Censorship Evasion
- 2025-vines-extended Extended Abstract: Nobody’s Fault but Mine: Using Unauthenticated Unidirectional Pushes for Client Update
- 2025-wails-censorship Censorship Evasion with Unidentified Protocol Generation
- 2025-wang-custom Is Custom Congestion Control a Bad Idea for Circumvention Tools?
- 2025-wendzel-survey A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges
- 2025-wrana-sok-surveillance SoK: The Spectre of Surveillance and Censorship in Future Internet Architectures
- 2025-wu-regional-censorship A Wall Behind A Wall: Emerging Regional Censorship in China
- 2025-zohaib-quic-sni Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China
- 2017-frolov-water-pluggable WATER: a programmable framework for pluggable transports
- 2024-chi-just Just add WATER: WebAssembly-based Circumvention Transports
- 2024-hoang-gfweb GFWeb: Measuring the Great Firewall's Web Censorship at Scale
- 2024-lorimer-extended Extended Abstract: Traffic Splitting for Pluggable Transports
- 2024-sakamoto-bleeding Bleeding Wall: A Hematologic Examination on the Great Firewall
- 2024-xue-tspu-russia Tspu: Russia's decentralized censorship system
- 2024-zillien-look Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION
- 2023-ding-discop Discop: Provably secure steganography in practice based on ``distribution copies''
- 2023-feng-study A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming
- 2023-fifield-running Running a high-performance pluggable transports Tor bridge
- 2023-jia-voiceover Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
- 2023-katira-censorwatch CensorWatch: On the Implementation of Online Censorship in India
- 2023-master-worldwide A Worldwide View of Nation-state Internet Censorship
- 2023-niere-poster Poster: Circumventing the GFW with TLS Record Fragmentation
- 2023-nourin-detecting Detecting Network Interference Without Endpoint Participation
- 2023-nourin-measuring Measuring and Evading Turkmenistan's Internet Censorship
- 2023-tulloch-lox Lox: Protecting the Social Graph in Bridge Distribution
- 2023-wails-proteus Proteus: Programmable Protocols for Censorship Circumvention
- 2023-wu-fully-encrypted-detect How the Great Firewall of China detects and blocks fully encrypted traffic
- 2022-blocking-tls-circumvention Large scale blocking of TLS-based censorship circumvention tools in China
- 2022-chang-covid-19 COVID-19 increased censorship circumvention and access to sensitive topics in China
- 2022-figueira-stegozoa Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
- 2022-harrity-get GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies
- 2022-raman-network Network Measurement Methods for Locating and Examining Censorship Devices
- 2021-bock-your Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
- 2021-kaptchuk-meteor Meteor: Cryptographically Secure Steganography for Realistic Distributions
- 2021-knockel-measuring Measuring QQMail's Automated Email Censorship in China
- 2021-lorimer-oustralopithecus OUStralopithecus: Overt User Simulation for Censorship Circumvention
- 2021-padmanabhan-multi-perspective A multi-perspective view of Internet censorship in Myanmar
- 2021-rambert-chinese Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China
- 2021-rosen-balboa Balboa: Bobbing and Weaving around Network Censorship
- 2021-satija-blindtls BlindTLS: Circumventing TLS-Based HTTPS Censorship
- 2021-sharma-camoufler Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
- 2021-wei-domain Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications
- 2020-alharbi-opening Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia
- 2020-alice-shadowsocks-detection How China Detects and Blocks Shadowsocks
- 2020-anonymous-triplet-censors Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior
- 2020-barradas-poking Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC
- 2020-barradas-towards Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels
- 2020-birtel-slitheen Slitheen++: Stealth TLS-based Decoy Routing
- 2020-bock-come Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
- 2020-bock-detecting Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter
- 2020-fifield-turbo Turbo Tunnel, a good way to design censorship circumvention protocols
- 2020-frolov-detecting Detecting Probe-resistant Proxies
- 2020-frolov-httpt HTTPT: A Probe-Resistant Proxy
- 2020-gfw-esni-blocking Exposing and Circumventing China's Censorship of ESNI
- 2020-minaei-moneymorph MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
- 2020-nasr-massbrowser MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
- 2020-oakley-protocol Protocol Proxy: An FTE-based covert channel
- 2020-raman-investigating Investigating Large Scale HTTPS Interception in Kazakhstan
- 2020-ramesh-decentralized Decentralized Control: A Case Study of Russia
- 2020-sharma-siegebreaker SiegeBreaker: An SDN Based Practical Decoy Routing System
- 2020-singh-india How India Censors the Web
- 2020-v2ray-weaknesses Summary on Recently Discovered V2Ray Weaknesses
- 2020-vandersloot-running Running Refraction Networking for Real
- 2020-wang-symtcp SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery
- 2020-zhu-characterizing Characterizing Transnational Internet Performance and the Great Bottleneck of China
- 2015-frolov-the-use-of-tls The use of TLS in censorship circumvention
- 2019-bock-geneva Geneva: Evolving Censorship Evasion Strategies
- 2019-chen-impact The Impact of Media Censorship: 1984 or Brave New World?
- 2019-frolov-conjure Conjure: Summoning Proxies from Unused Address Space
- 2019-hoang-measuring Measuring I2P Censorship at a Global Scale
- 2019-iszaevich-distributed Distributed Detection of Tor Directory Authorities Censorship in Mexico
- 2019-nasr-enemy Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
- 2018-bocovich-secure Secure asymmetry and deployability for decoy routing systems
- 2018-dunna-analyzing Analyzing China's Blocking of Unpublished Tor Bridges
- 2018-hoang-empirical An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
- 2018-hobbs-sudden How Sudden Censorship Can Increase Access to Information
- 2018-manfredi-multiflow MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
- 2018-martiny-proof-of-censorship Proof-of-Censorship: Enabling centralized censorship-resistant content providers
- 2018-nisar-incentivizing Incentivizing Censorship Measurements via Circumvention
- 2018-tschantz-bestiary A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
- 2018-wright-identifying On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship
- 2018-yadav-where Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
- 2017-barradas-deltashaper DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
- 2017-bocovich-lavinia Lavinia: An audit-payment protocol for censorship-resistant storage
- 2017-cho-churn A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography
- 2017-darer-filteredweb FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs
- 2017-frolov-isp-scale An ISP-Scale Deployment of TapDance
- 2017-gebhart-internet Internet Censorship in Thailand: User Practices and Potential Threats
- 2017-gosain-devil-s The Devil's in The Details: Placing Decoy Routers in the Internet
- 2017-gosain-mending Mending Wall: On the Implementation of Censorship in India
- 2017-heydari-scalable Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
- 2017-javaid-online Online Advertising under Internet Censorship
- 2017-jermyn-autosonda Autosonda: Discovering Rules and Triggers of Censorship Devices
- 2017-lee-usability A Usability Evaluation of Tor Launcher
- 2017-li-detor DeTor: Provably Avoiding Geographic Regions in Tor
- 2017-li-lib-cdot-erate lib$\cdot$erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
- 2017-lu-accessing Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue
- 2017-matic-dissecting Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
- 2017-morshed-when When the Internet Goes Down in Bangladesh
- 2017-nasr-waterfall The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
- 2017-singh-characterizing Characterizing the Nature and Dynamics of Tor Exit Blocking
- 2017-tanash-decline The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup
- 2017-wang-your Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
- 2017-weinberg-topics Topics of Controversy: An Empirical Analysis of Web Censorship Lists
- 2016-aceto-analyzing Analyzing Internet Censorship in Pakistan
- 2016-al-saqaf-internet Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
- 2016-bocovich-slitheen Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
- 2016-douglas-ghostpost GhostPost: Seamless Restoration of Censored Social Media Posts
- 2016-douglas-salmon Salmon: Robust Proxy Distribution for Censorship Circumvention
- 2016-elahi-framework A Framework for the Game-theoretic Analysis of Censorship Resistance
- 2016-fifield-censors Censors' Delay in Blocking Circumvention Proxies
- 2016-hahn-games Games Without Frontiers: Investigating Video Games as a Covert Channel
- 2016-khattak-sok SoK: Making Sense of Censorship Resistance Systems
- 2016-kohls-skypeline SkypeLine: Robust Hidden Data Transmission for VoIP
- 2016-li-mailet Mailet: Instant Social Networking under Censorship
- 2016-mcpherson-covertcast CovertCast: Using Live Streaming to Evade Internet Censorship
- 2016-nasr-game Game of Decoys: Optimal Decoy Routing Through Game Theory
- 2016-safaka-matryoshka Matryoshka: Hiding Secret Communication in Plain Sight
- 2016-tschantz-sok SoK: Towards Grounding Censorship Circumvention in Empiricism
- 2016-zarras-leveraging Leveraging Internet Services to Evade Censorship
- 2016-zolfaghari-practical Practical Censorship Evasion Leveraging Content Delivery Networks
- 2015-dyer-marionette Marionette: A Programmable Network-Traffic Obfuscation System
- 2015-ellard-rebound Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
- 2015-ensafi-active-probing Examining how the Great Firewall discovers hidden circumvention servers
- 2015-ensafi-analyzing Analyzing the Great Firewall of China Over Space and Time
- 2015-fifield-blocking-resistant Blocking-resistant communication through domain fronting
- 2015-gill-characterizing Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data
- 2015-hiruncharoenvate-algorithmically Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions
- 2015-holowczak-cachebrowser CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
- 2015-jones-can Can Censorship Measurements Be Safe(r)?
- 2015-jones-ethical Ethical Concerns for Censorship Measurement
- 2015-knockel-every Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China
- 2015-levin-alibi Alibi Routing
- 2015-marczak-analysis An Analysis of China's ``Great Cannon''
- 2015-nisar-case A Case for Marrying Censorship Measurements with Circumvention
- 2015-tanash-known Known Unknowns: An Analysis of Twitter Censorship in Turkey
- 2015-vines-rook Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
- 2015-wang-seeing Seeing through Network-Protocol Obfuscation
- 2014-brubaker-cloudtransport CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
- 2014-chaabane-censorship Censorship in the Wild: Analyzing Internet Filtering in Syria
- 2014-connolly-trist TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
- 2014-houmansadr-no No Direction Home: The True Cost of Routing Around Decoys
- 2014-jones-facade Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
- 2014-khattak-look A Look at the Consequences of Internet Censorship Through an ISP Lens
- 2014-king-reverse-engineering Reverse-engineering censorship in China: Randomized experimentation and participant observation
- 2014-li-facet Facet: Streaming over Videoconferencing for Censorship Circumvention
- 2014-luchaup-libfte LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
- 2014-morrison-toward Toward automatic censorship detection in microblogs
- 2014-tan-censorship Censorship Resistance as a Side-Effect
- 2014-wachs-censorship-resistant A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
- 2014-wang-gohop GoHop: Personal VPN to Defend from Censorship
- 2014-wustrow-tapdance TapDance: End-to-Middle Anticensorship without Flow Blocking
- 2013-dalek-method A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship
- 2013-dyer-protocol Protocol Misidentification Made Easy with Format-Transforming Encryption
- 2013-fifield-oss OSS: Using Online Scanning Services for Censorship Circumvention
- 2013-geddes-cover Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
- 2013-hasan-building Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
- 2013-houmansadr-i I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
- 2013-houmansadr-parrot The Parrot is Dead: Observing Unobservable Network Communications
- 2013-invernizzi-message Message In A Bottle: Sailing Past Censorship
- 2013-khattak-towards Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion
- 2013-nabi-anatomy The Anatomy of Web Censorship in Pakistan
- 2013-robinson-collateral Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship
- 2013-ruffing-identity-based Identity-Based Steganography and Its Applications to Censorship Resistance
- 2013-verkamp-five Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest
- 2013-wachs-feasibility On the Feasibility of a Censorship Resistant Decentralized Name System
- 2013-wang-rbridge rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
- 2013-winter-scramblesuit ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
- 2013-winter-towards Towards a Censorship Analyser for Tor
- 2013-zhou-sweet SWEET: Serving the Web by Exploiting Email Tunnels
- 2012-aase-whiskey Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations
- 2012-anderson-hidden The Hidden Internet of Iran: Private Address Allocations on a National Network
- 2012-appelbaum-technical Technical analysis of the Ultrasurf proxying software
- 2012-fifield-evading Evading Censorship with Browser-Based Proxies
- 2012-king-censorship How Censorship in China Allows Government Criticism but Silences Collective Expression
- 2012-lincoln-bootstrapping Bootstrapping Communications into an Anti-Censorship System
- 2012-ling-extensive Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
- 2012-moghaddam-skypemorph SkypeMorph: Protocol Obfuscation for Tor Bridges
- 2012-rogers-secure Secure Communication over Diverse Transports
- 2012-schuchard-routing Routing Around Decoys
- 2012-thomas-adapting Adapting Social Spam Infrastructure for Political Censorship
- 2012-vasserman-one-way One-way indexing for plausible deniability in censorship resistant storage
- 2012-wang-censorspoofer CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
- 2012-weinberg-stegotorus StegoTorus: A Camouflage Proxy for the Tor Anonymity System
- 2012-winter-great How the Great Firewall of China is Blocking Tor
- 2012-wright-regional Regional Variation in Chinese Internet Filtering
- 2011-bachrach-h00t \#h00t: Censorship Resistant Microblogging
- 2011-bonneau-scrambling Scrambling for lightweight censorship resistance
- 2011-houmansadr-cirripede Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
- 2011-jones-hiding Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
- 2011-karlin-decoy Decoy Routing: Toward Unblockable Internet Communication
- 2011-kathuria-bypassing Bypassing Internet Censorship for News Broadcasters
- 2011-knockel-three Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
- 2011-liu-tor Tor Instead of IP
- 2011-mccoy-proximax Proximax: A Measurement Based System for Proxies Dissemination
- 2011-seltzer-infrastructures Infrastructures of Censorship and Lessons from Copyright Resistance
- 2011-shklovski-online Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship
- 2011-wiley-dust Dust: A Blocking-Resistant Internet Transport Protocol
- 2011-wright-fine-grained Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
- 2011-wustrow-telex Telex: Anticensorship in the Network Infrastructure
- 2011-xu-internet Internet Censorship in China: Where Does the Filtering Occur?
- 2010-burnett-chipping Chipping Away at Censorship Firewalls with User-Generated Content
- 2010-mahdian-fighting Fighting Censorship with Algorithms
- 2010-pfitzmann-terminology A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
- 2009-backes-anonymity Anonymity and Censorship Resistance in Unstructured Overlay Networks
- 2009-cao-skyf2f SkyF2F: Censorship Resistant via Skype Overlay Network
- 2009-mclachlan-risks On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design
- 2008-aycock-good ``Good'' Worms and Human Rights
- 2008-sovran-pass Pass it on: Social Networks Stymie Censors
- 2006-clayton-ignoring Ignoring the Great Firewall of China
- 2006-dingledine-design Design of a blocking-resistant anonymity system
- 2005-perng-censorship Censorship Resistance Revisited
- 2004-danezis-economics The Economics of Censorship Resistance
- 2004-k-psell-achieve How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
- 2003-dornseif-government Government mandated blocking of foreign Web content
- 2003-feamster-thwarting Thwarting Web Censorship with Untrusted Messenger Discovery
- 2002-serjantov-anonymizing Anonymizing Censorship Resistant Systems
- 2001-handley-network Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
- 1998-ptacek-insertion Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
- 1996-anderson-eternity The Eternity Service