TECHNIQUES
flow-correlation Flow-correlation traffic analysis
Matching flows across two observation points by timing/volume signatures.
10 PAPERS ON FILE
- 2026-almutairi-server Server, Client, or Relay? Dual-Role Detection of Circumvention Relays
- 2026-ratliff-mirage Mirage: Private, Mobility-based Routing for Censorship Evasion
- 2025-wails-censorship Censorship Evasion with Unidentified Protocol Generation
- 2025-wrana-sok-surveillance SoK: The Spectre of Surveillance and Censorship in Future Internet Architectures
- 2024-holland-detorrent DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
- 2024-mixon-baca-snitch Attacking Connection Tracking Frameworks as used by Virtual Private Networks
- 2024-tsai-modeling Modeling and Detecting Internet Censorship Events
- 2023-arora-detor-onion Provably Avoiding Geographic Regions for Tor's Onion Services
- 2013-geddes-cover Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
- 2010-pfitzmann-terminology A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management