This is an online archive of selected research papers in the field of
Internet censorship. Papers behind paywalls are of greatly
diminished
use
because they are inaccessible to everyone who is not lucky enough
to be affiliated with a wealthy university. This is problematic from
both a scientific and a moral point of view. Therefore, all research
papers here are openly accessible.
-----------------
网站https://censorbib.nymity.ch/的源码:
https://github.com/NullHypothesis/censorbib
相关帖子:http://briteming.blogspot.com/2017/05/bibliograpy-bibtexhtml.html
-
Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
[pdf, cached pdf, bib]
Srdjan Matic, Carmela Troncoso, Juan Caballero
In Proc. of: Network and Distributed System Security, 2017, The Internet Society -
Internet Censorship in Thailand: User Practices and Potential Threats
[pdf, cached pdf, bib]
Genevieve Gebhart, Anonymous Author, Tadayoshi Kohno
In Proc. of: European Symposium on Security & Privacy, 2017, IEEE -
Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
[pdf, cached pdf, bib]
Vahid Heydari, Sun-il Kim, Seong-Moo Yoo
Article in: Transactions on Information Forensics and Security 12.5, 2017
-
Poisoning the Well – Exploring the Great Firewall's Poisoned DNS Responses
[url, cached pdf, bib]
Oliver Farnan, Alexander Darer, Joss Wright
In Proc. of: Workshop on Privacy in the Electronic Society, 2016, ACM -
Satellite: Joint Analysis of CDNs and Network-Level Interference
[pdf, cached pdf, bib]
Will Scott, Thomas Anderson, Tadayoshi Kohno, Arvind Krishnamurthy
In Proc. of: USENIX Annual Technical Conference, 2016, USENIX -
SoK: Towards Grounding Censorship Circumvention in Empiricism
[pdf, cached pdf, bib]
Michael Carl Tschantz, Sadia Afroz, Anonymous, Vern Paxson
In Proc. of: Symposium on Security & Privacy, 2016, IEEE -
Analyzing Internet Censorship in Pakistan
[pdf, cached pdf, bib]
Giuseppe Aceto, Alessio Botta, Antonio Pescapè, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
In Proc. of: Research and Technologies for Society and Industry, 2016, IEEE -
Leveraging Internet Services to Evade Censorship
[pdf, cached pdf, bib]
Apostolis Zarras
In Proc. of: Information Security Conference, 2016, Springer -
DNS-sly: Avoiding Censorship through Network Complexity
[pdf, cached pdf, bib]
Qurat-Ul-Ann Danyal Akbar, Marcel Flores, Aleksandar Kuzmanovic
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX -
Matryoshka: Hiding Secret Communication in Plain Sight
[pdf, cached pdf, bib]
Iris Safaka, Christina Fragouli, Katerina Argyraki
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX -
GhostPost: Seamless Restoration of Censored Social Media Posts
[pdf, cached pdf, bib]
Frederick Douglas, Matthew Caesar
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX -
Censors' Delay in Blocking Circumvention Proxies
[pdf, cached pdf, bib]
David Fifield, Lynn Tsai
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX -
The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom
[pdf, cached pdf, bib]
Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, Leman Akoglu
In Proc. of: Free and Open Communications on the Internet, 2016, USENIX -
Games Without Frontiers: Investigating Video Games as a Covert Channel
[pdf, cached pdf, bib]
Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
In Proc. of: European Symposium on Security & Privacy, 2016, IEEE -
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
[pdf, cached pdf, bib]
Cecylia Bocovich, Ian Goldberg
In Proc. of: Computer and Communications Security, 2016, ACM -
Game of Decoys: Optimal Decoy Routing Through Game Theory
[pdf, cached pdf, bib]
Milad Nasr, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2016, ACM -
Practical Censorship Evasion Leveraging Content Delivery Networks
[pdf, cached pdf, bib]
Hadi Zolfaghari, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2016, ACM -
SkypeLine: Robust Hidden Data Transmission for VoIP
[pdf, cached pdf, bib]
Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
In Proc. of: ASIA Computer and Communications Security, 2016, ACM -
A Framework for the Game-theoretic Analysis of Censorship Resistance
[url, cached pdf, bib]
Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, Ian Goldberg
Article in: Privacy Enhancing Technologies 2016.4, 2016 -
SoK: Making Sense of Censorship Resistance Systems
[url, cached pdf, bib]
Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, Ian Goldberg
Article in: Privacy Enhancing Technologies 2016.4, 2016 -
Salmon: Robust Proxy Distribution for Censorship Circumvention
[url, cached pdf, bib]
Frederick Douglas, Rorshach, Weiyang Pan, Matthew Caesar
Article in: Privacy Enhancing Technologies 2016.4, 2016 -
Mailet: Instant Social Networking under Censorship
[url, cached pdf, bib]
Shuai Li, Nicholas Hopper
Article in: Privacy Enhancing Technologies 2016.2, 2016 -
CovertCast: Using Live Streaming to Evade Internet Censorship
[url, cached pdf, bib]
Richard McPherson, Amir Houmansadr, Vitaly Shmatikov
Article in: Privacy Enhancing Technologies 2016.3, 2016 -
Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
[url, cached pdf, bib]
Walid Al-Saqaf
Article in: Media and Communication 4.1, 2016
-
Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
[pdf, cached pdf, bib]
Paul Vines, Tadayoshi Kohno
In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM -
Known Unknowns: An Analysis of Twitter Censorship in Turkey
[pdf, cached pdf, bib]
Rima S. Tanash, Zhouhan Chen, Tanmay Thakur, Dan S. Wallach, Devika Subramanian
In Proc. of: Workshop on Privacy in the Electronic Society, 2015, ACM -
Marionette: A Programmable Network-Traffic Obfuscation System
[pdf, cached pdf, bib]
Kevin P. Dyer, Scott E. Coull, Thomas Shrimpton
In Proc. of: USENIX Security Symposium, 2015, USENIX -
Monitoring Internet Censorship with UBICA
[pdf, cached pdf, bib]
Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
In Proc. of: Traffic Monitoring and Analysis, 2015, Springer -
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
[pdf, cached pdf, bib]
Sam Burnett, Nick Feamster
In Proc. of: SIGCOMM, 2015, ACM -
Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
[pdf, cached pdf, bib]
Daniel Ellard, Alden Jackson, Christine Jones, Victoria Ursula Manfredi, Timothy Strayer, Bishal Thapa, Megan Van Welie
In Proc. of: Local Computer Networks, 2015, IEEE -
Examining How the Great Firewall Discovers Hidden Circumvention Servers
[pdf, cached pdf, bib]
Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson
In Proc. of: Internet Measurement Conference, 2015, ACM -
Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions
[pdf, cached pdf, bib]
Chaya Hiruncharoenvate, Zhiyuan Lin, Eric Gilbert
In Proc. of: International Conference on Web and Social Media, 2015, AAAI -
A Case for Marrying Censorship Measurements with Circumvention
[pdf, cached pdf, bib]
Aqib Nisar, Aqsa Kashaf, Zartash Afzal Uzmi, Ihsan Ayyub Qazi
In Proc. of: Hot Topics in Networks, 2015, ACM -
Can Censorship Measurements Be Safe(r)?
[pdf, cached pdf, bib]
Ben Jones, Nick Feamster
In Proc. of: Hot Topics in Networks, 2015, ACM -
Understanding Internet Censorship Policy: The Case of Greece
[pdf, cached pdf, bib]
Vasilis Ververis, George Kargiotakis, Arturo Filastò, Benjamin Fabian, Afentoulis Alexandros
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX -
Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China
[pdf, cached pdf, bib]
Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX -
An Analysis of China's “Great Cannon”
[pdf, cached pdf, bib]
Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fifield, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2015, USENIX -
Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering
[pdf, cached pdf, bib]
Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel
In Proc. of: Ethics in Networked Systems Research, 2015, ACM -
Ethical Concerns for Censorship Measurement
[pdf, cached pdf, bib]
Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver
In Proc. of: Ethics in Networked Systems Research, 2015, ACM -
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
[pdf, cached pdf, bib]
John Holowczak, Amir Houmansadr
In Proc. of: Computer and Communications Security, 2015, ACM -
Seeing through Network-Protocol Obfuscation
[pdf, cached pdf, bib]
Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: Computer and Communications Security, 2015, ACM -
Analyzing the Great Firewall of China Over Space and Time
[pdf, cached pdf, bib]
Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
Article in: Privacy Enhancing Technologies 2015.1, 2015 -
Blocking-resistant communication through domain fronting
[pdf, cached pdf, bib]
David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
Article in: Privacy Enhancing Technologies 2015.2, 2015 -
Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data
[pdf, cached pdf, bib]
Phillipa Gill, Masashi Crete-Nishihata, Jakub Dalek, Sharon Goldberg, Adam Senft, Greg Wiseman
Article in: Transactions on the Web 9.1, 2015 -
Internet Censorship detection: A survey
[pdf, cached pdf, bib]
Giuseppe Aceto, Antonio Pescapè
Article in: Computer Networks ., 2015
-
Facet: Streaming over Videoconferencing for Censorship Circumvention
[pdf, cached pdf, bib]
Shuai Li, Mike Schliep, Nick Hopper
In Proc. of: Workshop on Privacy in the Electronic Society, 2014, ACM -
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
[pdf, cached pdf, bib]
Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: USENIX Security Symposium, 2014, USENIX -
TapDance: End-to-Middle Anticensorship without Flow Blocking
[pdf, cached pdf, bib]
Eric Wustrow, Colleen M. Swanson, J. Alex Halderman
In Proc. of: USENIX Security Symposium, 2014, USENIX -
Censorship Resistance as a Side-Effect
[pdf, cached pdf, bib]
Henry Tan, Micah Sherr
In Proc. of: Security Protocols, 2014, Springer -
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
[pdf, cached pdf, bib]
Chad Brubaker, Amir Houmansadr, Vitaly Shmatikov
In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer -
Measuring Freenet in the Wild: Censorship-resilience under Observation
[pdf, cached pdf, bib]
Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe
In Proc. of: Privacy Enhancing Technologies Symposium, 2014, Springer -
Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels
[pdf, cached pdf, bib]
Roya Ensafi, Jeffrey Knockel, Geoffrey Alexander, Jedidiah R. Crandall
In Proc. of: Passive and Active Measurement Conference, 2014, Springer -
VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls
[pdf, cached pdf, bib]
Daiyuu Nobori, Yasushi Shinjo
In Proc. of: Networked Systems Design and Implementation, 2014, USENIX -
No Direction Home: The True Cost of Routing Around Decoys
[pdf, cached pdf, bib]
Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov
In Proc. of: Network and Distributed System Security, 2014, The Internet Society -
Censorship in the Wild: Analyzing Internet Filtering in Syria
[pdf, cached pdf, bib]
Abdelberi Chaabane, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kaafar
In Proc. of: Internet Measurement Conference, 2014, ACM -
Automated Detection and Fingerprinting of Censorship Block Pages
[pdf, cached pdf, bib]
Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill
In Proc. of: Internet Measurement Conference, 2014, ACM -
A Look at the Consequences of Internet Censorship Through an ISP Lens
[pdf, cached pdf, bib]
Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson
In Proc. of: Internet Measurement Conference, 2014, ACM -
GoHop: Personal VPN to Defend from Censorship
[pdf, cached pdf, bib]
Yuzhi Wang, Ping Ji, Borui Ye, Pengjun Wang, Rong Luo, Huazhong Yang
In Proc. of: International Conference on Advanced Communication Technology, 2014, IEEE -
Global Network Interference Detection over the RIPE Atlas Network
[pdf, cached pdf, bib]
Collin Anderson, Philipp Winter, Roya
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX -
Towards a Comprehensive Picture of the Great Firewall's DNS Censorship
[pdf, cached pdf, bib]
Anonymous
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX -
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
[pdf, cached pdf, bib]
Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX -
Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
[pdf, cached pdf, bib]
Ben Jones, Sam Burnett, Nick Feamster, Sean Donovan, Sarthak Grover, Sathya Gunasekaran, Karim Habak
In Proc. of: Free and Open Communications on the Internet, 2014, USENIX -
Toward automatic censorship detection in microblogs
[pdf, cached pdf, bib]
Donn Morrison
In Proc. of: Data Mining in Social Networks, 2014, -
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
[pdf, cached pdf, bib]
Matthias Wachs, Martin Schanzenbach, Christian Grothoff
In Proc. of: Cryptology and Network Security, 2014, Springer -
Reverse-engineering censorship in China: Randomized experimentation and participant observation
[pdf, cached pdf, bib]
Gary King, Jennifer Pan, Margaret E. Roberts
Article in: Science 345.6199, 2014
-
ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
[pdf, cached pdf, bib]
Philipp Winter, Tobias Pulls, Juergen Fuss
In Proc. of: Workshop on Privacy in the Electronic Society, 2013, ACM -
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions
[pdf, cached pdf, bib]
Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall, Dan S. Wallach
In Proc. of: USENIX Security Symposium, 2013, USENIX -
Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation
[pdf, cached pdf, bib]
Karyn Benson, Alberto Dainotti, Kimberly Claffy, Emile Aben
In Proc. of: Traffic Monitoring and Analysis, 2013, IEEE -
The Parrot is Dead: Observing Unobservable Network Communications
[pdf, cached pdf, bib]
Amir Houmansadr, Chad Brubaker, Vitaly Shmatikov
In Proc. of: Symposium on Security & Privacy, 2013, IEEE -
OSS: Using Online Scanning Services for Censorship Circumvention
[pdf, cached pdf, bib]
David Fifield, Gabi Nakibly, Dan Boneh
In Proc. of: Privacy Enhancing Technologies Symposium, 2013, Springer -
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
[pdf, cached pdf, bib]
Amir Houmansadr, Thomas Riedl, Nikita Borisov, Andrew Singer
In Proc. of: Network and Distributed System Security, 2013, The Internet Society -
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
[pdf, cached pdf, bib]
Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas J. Hopper
In Proc. of: Network and Distributed System Security, 2013, The Internet Society -
A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship
[pdf, cached pdf, bib]
Jakub Dalek, Bennett Haselton, Helmi Noman, Adam Senft, Masashi Crete-Nishihata, Phillipa Gill, Ronald J. Deibert
In Proc. of: Internet Measurement Conference, 2013, ACM -
Revealing Middlebox Interference with Tracebox
[pdf, cached pdf, bib]
Gregory Detal, Benjamin Hesmans, Olivier Bonaventure, Yves Vanaubel, Benoit Donnet
In Proc. of: Internet Measurement Conference, 2013, ACM -
Identity-Based Steganography and Its Applications to Censorship Resistance
[pdf, cached pdf, bib]
Tim Ruffing, Jonas Schneider, Aniket Kate
In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer -
SWEET: Serving the Web by Exploiting Email Tunnels
[pdf, cached pdf, bib]
Wenxuan Zhou, Amir Houmansadr, Matthew Caesar, Nikita Borisov
In Proc. of: Hot Topics in Privacy Enhancing Technologies, 2013, Springer -
Internet Censorship in Iran: A First Look
[pdf, cached pdf, bib]
Simurgh Aryan, Homa Aryan, J. Alex Halderman
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX -
Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
[pdf, cached pdf, bib]
Shaddi Hasan, Yahel Ben-David, Giulia Fanti, Eric Brewer, Scott Shenker
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX -
Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion
[pdf, cached pdf, bib]
Sheharbano Khattak, Mobin Javed, Philip D. Anderson, Vern Paxson
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX -
The Anatomy of Web Censorship in Pakistan
[pdf, cached pdf, bib]
Zubair Nabi
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX -
Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest
[pdf, cached pdf, bib]
John-Paul Verkamp, Minaxi Gupta
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX -
Towards a Censorship Analyser for Tor
[pdf, cached pdf, bib]
Philipp Winter
In Proc. of: Free and Open Communications on the Internet, 2013, USENIX -
On the Feasibility of a Censorship Resistant Decentralized Name System
[pdf, cached pdf, bib]
Matthias Wachs, Martin Schanzenbach, Christian Grothoff
In Proc. of: Foundations & Practice of Security, 2013, Springer -
Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo
[pdf, cached pdf, bib]
Le Chen, Chi Zhang, Christo Wilson
In Proc. of: Conference on Online Social Networks, 2013, ACM -
Protocol Misidentification Made Easy with Format-Transforming Encryption
[pdf, cached pdf, bib]
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
In Proc. of: Computer and Communications Security, 2013, ACM -
Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
[pdf, cached pdf, bib]
John Geddes, Max Schuchard, Nicholas Hopper
In Proc. of: Computer and Communications Security, 2013, ACM -
Message In A Bottle: Sailing Past Censorship
[pdf, cached pdf, bib]
Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
In Proc. of: Annual Computer Security Applications Conference, 2013, ACM -
Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran
[pdf, cached pdf, bib]
Collin Anderson
Technical Report, 2013, University of Pennsylvania
-
Secure Communication over Diverse Transports
[pdf, cached pdf, bib]
Michael Rogers, Eleanor Saitta
In Proc. of: Workshop on Privacy in the Electronic Society, 2012, ACM -
Hold-On: Protecting Against On-Path DNS Poisoning
[pdf, cached pdf, bib]
Haixin Duan, Nicholas Weaver, Zongxu Zhao, Meng Hu, Jinjin Liang, Jian Jiang, Kang Li, Vern Paxson
In Proc. of: Securing and Trusting Internet Names, 2012, National Physical Laboratory -
Evading Censorship with Browser-Based Proxies
[pdf, cached pdf, bib]
David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Roger Dingledine, Phil Porras, Dan Boneh
In Proc. of: Privacy Enhancing Technologies Symposium, 2012, Springer -
Adapting Social Spam Infrastructure for Political Censorship
[pdf, cached pdf, bib]
Kurt Thomas, Chris Grier, Vern Paxson
In Proc. of: Large-Scale Exploits and Emergent Threats, 2012, USENIX -
Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
[pdf, cached pdf, bib]
Zhen Ling, Xinwen Fu, Wei Yu, Junzhou Luo, Ming Yang
In Proc. of: INFOCOM, 2012, IEEE -
Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations
[pdf, cached pdf, bib]
Nicholas Aase, Jedidiah R. Crandall, Álvaro Díaz, Jeffrey Knockel, Jorge Oca Molinero, Jared Saia, Dan Wallach, Tao Zhu
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX -
OONI: Open Observatory of Network Interference
[pdf, cached pdf, bib]
Arturo Filastò, Jacob Appelbaum
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX -
Bootstrapping Communications into an Anti-Censorship System
[pdf, cached pdf, bib]
Patrick Lincoln, Ian Mason, Phillip Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Simpson, Paul Vixie, Dan Boneh
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX -
One-way indexing for plausible deniability in censorship resistant storage
[pdf, cached pdf, bib]
Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX -
Inferring Mechanics of Web Censorship Around the World
[pdf, cached pdf, bib]
John-Paul Verkamp, Minaxi Gupta
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX -
How the Great Firewall of China is Blocking Tor
[pdf, cached pdf, bib]
Philipp Winter, Stefan Lindskog
In Proc. of: Free and Open Communications on the Internet, 2012, USENIX -
SkypeMorph: Protocol Obfuscation for Tor Bridges
[pdf, cached pdf, bib]
Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg
In Proc. of: Computer and Communications Security, 2012, ACM -
Routing Around Decoys
[pdf, cached pdf, bib]
Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper
In Proc. of: Computer and Communications Security, 2012, ACM -
CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
[pdf, cached pdf, bib]
Qiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov
In Proc. of: Computer and Communications Security, 2012, ACM -
StegoTorus: A Camouflage Proxy for the Tor Anonymity System
[pdf, cached pdf, bib]
Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh
In Proc. of: Computer and Communications Security, 2012, ACM -
The Hidden Internet of Iran: Private Address Allocations on a National Network
[url, cached pdf, bib]
Collin Anderson
Technical Report, 2012, -
The Collateral Damage of Internet Censorship by DNS Injection
[pdf, cached pdf, bib]
Sparks, Neo, Tank, Smith, Dozer
Article in: SIGCOMM Computer Communication Review 42.3, 2012 -
How Censorship in China Allows Government Criticism but Silences Collective Expression
[pdf, cached pdf, bib]
Gary King, Jennifer Pan, Margaret E. Roberts
Article in: American Political Science Review ., 2012 -
Regional Variation in Chinese Internet Filtering
[url, cached pdf, bib]
Joss Wright
Technical Report, 2012, University of Oxford
-
BridgeSPA: Improving Tor Bridges with Single Packet Authorization
[pdf, cached pdf, bib]
Rob Smits, Divam Jain, Sarah Pidcock, Ian Goldberg, Urs Hengartner
In Proc. of: Workshop on Privacy in the Electronic Society, 2011, ACM -
Telex: Anticensorship in the Network Infrastructure
[pdf, cached pdf, bib]
Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman
In Proc. of: USENIX Security Symposium, 2011, USENIX -
Scrambling for lightweight censorship resistance
[pdf, cached pdf, bib]
Joseph Bonneau, Rubin Xu
In Proc. of: Security Protocols, 2011, Springer -
Internet Censorship in China: Where Does the Filtering Occur?
[pdf, cached pdf, bib]
Xueyang Xu, Z. Morley Mao, J. Alex Halderman
In Proc. of: Passive and Active Measurement Conference, 2011, Springer -
Analysis of Country-wide Internet Outages Caused by Censorship
[pdf, cached pdf, bib]
Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapé
In Proc. of: Internet Measurement Conference, 2011, ACM -
Tor Instead of IP
[pdf, cached pdf, bib]
Vincent Liu, Seungyeop Han, Arvind Krishnamurthy, Thomas Anderson
In Proc. of: Hot Topics in Networks, 2011, ACM -
Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
[pdf, cached pdf, bib]
Nicholas Jones, Matvey Arye, Jacopo Cesareo, Michael J. Freedman
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX -
Automated Named Entity Extraction for Tracking Censorship of Current Events
[pdf, cached pdf, bib]
Antonio M. Espinoza, Jedidiah R. Crandall
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX -
Decoy Routing: Toward Unblockable Internet Communication
[pdf, cached pdf, bib]
Josh Karlin, Daniel Ellard, Alden W. Jackson, Christine E. Jones, Greg Lauer, David P. Mankins, W. Timothy Strayer
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX -
Bypassing Internet Censorship for News Broadcasters
[pdf, cached pdf, bib]
Karl Kathuria
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX -
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
[pdf, cached pdf, bib]
Jeffrey Knockel, Jedidiah R. Crandall, Jared Saia
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX -
Infrastructures of Censorship and Lessons from Copyright Resistance
[pdf, cached pdf, bib]
Wendy Seltzer
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX -
CensMon: A Web Censorship Monitor
[pdf, cached pdf, bib]
Andreas Sfakianakis, Elias Athanasopoulos, Sotiris Ioannidis
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX -
Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
[pdf, cached pdf, bib]
Joss Wright, Tulio Souza, Ian Brown
In Proc. of: Free and Open Communications on the Internet, 2011, USENIX -
Proximax: A Measurement Based System for Proxies Dissemination
[pdf, cached pdf, bib]
Damon McCoy, Jose Andre Morales, Kirill Levchenko
In Proc. of: Financial Cryptography and Data Security, 2011, Springer -
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
[pdf, cached pdf, bib]
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov
In Proc. of: Computer and Communications Security, 2011, ACM -
Mapping Local Internet Control
[pdf, cached pdf, bib]
Hal Roberts, David Larochelle, Rob Faris, John Palfrey
In Proc. of: Computer Communications Workshop, 2011, IEEE -
Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship
[pdf, cached pdf, bib]
Irina Shklovski, Nalini P. Kotamraju
In Proc. of: CHI Conference on Human Factors in Computing Systems, 2011, ACM -
#h00t: Censorship Resistant Microblogging
[pdf, cached pdf, bib]
Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright
Technical Report, 2011, Rice University and University of Texas at Arlington -
An anomaly-based censorship-detection system for Tor
[pdf, cached pdf, bib]
George Danezis
Technical Report, 2011, The Tor Project -
Dust: A Blocking-Resistant Internet Transport Protocol
[pdf, cached pdf, bib]
Brandon Wiley
Technical Report, 2011, University of Texas at Austin
-
Chipping Away at Censorship Firewalls with User-Generated Content
[pdf, cached pdf, bib]
Sam Burnett, Nick Feamster, Santosh Vempala
In Proc. of: USENIX Security Symposium, 2010, USENIX -
Fighting Censorship with Algorithms
[pdf, cached pdf, bib]
Mohammad Mahdian
In Proc. of: International Conference on Fun with Algorithms, 2010, Springer -
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China
[pdf, cached pdf, bib]
Jong Chun Park, Jedidiah R. Crandall
In Proc. of: Distributed Computing Systems, 2010, IEEE -
A
terminology for talking about privacy by data minimization: Anonymity,
Unlinkability, Undetectability, Unobservability, Pseudonymity, and
Identity Management
[pdf, cached pdf, bib]
Andreas Pfitzmann, Marit Hansen
Miscellaneous, 2010 Version 0.34
-
Anonymity and Censorship Resistance in Unstructured Overlay Networks
[pdf, cached pdf, bib]
Michael Backes, Marek Hamerlik, Alessandro Linari, Matteo Maffei, Christos Tryfonopoulos, Gerhard Weikum
In Proc. of: On the Move to Meaningful Internet Systems, 2009, Springer -
Detecting Forged TCP Reset Packets
[pdf, cached pdf, bib]
Nicholas Weaver, Robin Sommer, Vern Paxson
In Proc. of: Network and Distributed System Security, 2009, The Internet Society -
SkyF2F: Censorship Resistant via Skype Overlay Network
[pdf, cached pdf, bib]
Shoufeng Cao, Longtao He, Zhongxian Li, Yixian Yang
In Proc. of: International Conference on Information Engineering, 2009, IEEE
-
Pass it on: Social Networks Stymie Censors
[pdf, cached pdf, bib]
Yair Sovran, Alana Libonati, Jinyang Li
In Proc. of: International Workshop on Peer-to-Peer Systems, 2008, USENIX -
“Good” Worms and Human Rights
[url, cached pdf, bib]
John Aycock, Alana Maurushat
Article in: SIGCAS Computers & Society 38.1, 2008
-
ConceptDoppler: A Weather Tracker for Internet Censorship
[pdf, cached pdf, bib]
Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, Rich East
In Proc. of: Computer and Communications Security, 2007, ACM -
The Great DNS Wall of China
[pdf, cached pdf, bib]
Graham Lowe, Patrick Winters, Michael L. Marcus
Technical Report, 2007, New York University
-
Ignoring the Great Firewall of China
[pdf, cached pdf, bib]
Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
In Proc. of: Privacy Enhancing Technologies, 2006, Springer -
Failures in a Hybrid Content Blocking System
[pdf, cached pdf, bib]
Richard Clayton
In Proc. of: Privacy Enhancing Technologies, 2006, Springer -
Investigating large-scale Internet content filtering
[url, cached pdf, bib]
Sebastian Wolfgarten
Technical Report, 2006, Dublin City University -
Design of a blocking-resistant anonymity system
[pdf, cached pdf, bib]
Roger Dingledine, Nick Mathewson
Technical Report, 2006, The Tor Project
-
Censorship Resistance Revisited
[pdf, cached pdf, bib]
Ginger Perng, Michael K. Reiter, Chenxi Wang
In Proc. of: International Conference on Information Hiding, 2005, Springer
-
How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
[pdf, cached pdf, bib]
Stefan Köpsell, Ulf Hillig
In Proc. of: Workshop on Privacy in the Electronic Society, 2004, ACM -
The Economics of Censorship Resistance
[pdf, cached pdf, bib]
George Danezis, Ross Anderson
In Proc. of: Economics and Information Security, 2004,
-
Thwarting Web Censorship with Untrusted Messenger Discovery
[pdf, cached pdf, bib]
Nick Feamster, Magdalena Balazinska, Winston Wang, Hari Balakrishnan, David Karger
In Proc. of: Privacy Enhancing Technologies, 2003, Springer -
Government mandated blocking of foreign Web content
[pdf, cached pdf, bib]
Maximillian Dornseif
In Proc. of: DFN-Arbeitstagung über Kommunikationsnetze, 2003, Gesellschaft für Informatik
-
Infranet: Circumventing Web Censorship and Surveillance
[pdf, cached pdf, bib]
Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger
In Proc. of: USENIX Security Symposium, 2002, USENIX -
Anonymizing Censorship Resistant Systems
[pdf, cached pdf, bib]
Andrei Serjantov
In Proc. of: International Workshop on Peer-To-Peer Systems, 2002, Springer
-
Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements
[ps, cached ps, bib]
Marc Waldman, David Mazières
In Proc. of: Computer and Communications Security, 2001, ACM -
Dagster: Censorship-Resistant Publishing Without Replication
[pdf, cached pdf, bib]
Adam Stubblefield, Dan S. Wallach
Technical Report, 2001, Rice University
-
Publius: A robust, tamper-evident, censorship-resistant web publishing system
[pdf, cached pdf, bib]
Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
In Proc. of: USENIX Security Symposium, 2000, USENIX
-
The Eternity Service
[pdf, cached pdf, bib]
Ross J. Anderson
In Proc. of: Theory and Applications of Cryptology, 1996, CTU Publishing House
-----------------
网站https://censorbib.nymity.ch/的源码:
https://github.com/NullHypothesis/censorbib
相关帖子:http://briteming.blogspot.com/2017/05/bibliograpy-bibtexhtml.html
No comments:
Post a Comment