TECHNIQUES
traffic-shape Traffic-shape / statistical fingerprinting
Classification by packet-size and inter-arrival-time distributions.
41 PAPERS ON FILE
- 2026-almutairi-server Server, Client, or Relay? Dual-Role Detection of Circumvention Relays
- 2025-amnesty-pakistan-shadows Shadows of Control: Censorship and mass surveillance in Pakistan
- 2025-geedge-mesa-leak Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
- 2025-interseclab-internet-coup The Internet Coup
- 2025-jfm-silk-road-surveillance Silk Road of Surveillance
- 2017-frolov-water-pluggable WATER: a programmable framework for pluggable transports
- 2024-bocovich-snowflake Snowflake, a censorship circumvention system using temporary WebRTC proxies
- 2024-gosain-out Out in the Open: On the Implementation of Mobile App Filtering in India
- 2024-hanlon-detecting Detecting VPN Traffic through Encapsulated TCP Behavior
- 2024-holland-detorrent DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
- 2024-kon-netshuffle NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge
- 2024-kon-spotproxy SpotProxy: Rediscovering the Cloud for Censorship Circumvention
- 2024-moon-pryde Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments
- 2024-pu-exploring Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention
- 2024-vilalonga-looking Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels
- 2024-vines-communication Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
- 2024-vines-ten Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burdens
- 2024-wails-precisely On Precisely Detecting Censorship Circumvention in Real-World Networks
- 2024-wang-identifying Identifying VPN Servers through Graph-Represented Behaviors
- 2023-arora-detor-onion Provably Avoiding Geographic Regions for Tor's Onion Services
- 2023-jia-voiceover Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
- 2023-sun-telepath TELEPATH: A Minecraft-based Covert Communication System
- 2023-xue-use The Use of Push Notification in Censorship Circumvention
- 2022-blocking-tls-circumvention Large scale blocking of TLS-based censorship circumvention tools in China
- 2021-lorimer-oustralopithecus OUStralopithecus: Overt User Simulation for Censorship Circumvention
- 2021-rosen-balboa Balboa: Bobbing and Weaving around Network Censorship
- 2020-alice-shadowsocks-detection How China Detects and Blocks Shadowsocks
- 2020-v2ray-weaknesses Summary on Recently Discovered V2Ray Weaknesses
- 2015-frolov-the-use-of-tls The use of TLS in censorship circumvention
- 2017-barradas-deltashaper DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
- 2016-khattak-sok SoK: Making Sense of Censorship Resistance Systems
- 2016-tschantz-sok SoK: Towards Grounding Censorship Circumvention in Empiricism
- 2015-wang-seeing Seeing through Network-Protocol Obfuscation
- 2014-li-facet Facet: Streaming over Videoconferencing for Censorship Circumvention
- 2013-houmansadr-i I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
- 2013-houmansadr-parrot The Parrot is Dead: Observing Unobservable Network Communications
- 2013-khattak-towards Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion
- 2012-rogers-secure Secure Communication over Diverse Transports
- 2011-danezis-anomaly-based An anomaly-based censorship-detection system for Tor
- 2010-pfitzmann-terminology A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
- 2001-handley-network Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics