Balboa: Bobbing and Weaving around Network Censorship
暂无分享,去创建一个
[1] Rob Johnson,et al. Games without Frontiers: Investigating Video Games as a Covert Channel , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[2] John K. Ousterhout,et al. NanoLog: A Nanosecond Scale Logging System , 2018, USENIX Annual Technical Conference.
[3] Nikita Borisov,et al. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention , 2013, NDSS.
[4] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[5] Luís Rodrigues,et al. Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC , 2020, CCS.
[6] Milad Nasr,et al. The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks , 2017, CCS.
[7] Ian Goldberg,et al. Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement , 2016, CCS.
[8] Thomas Shrimpton,et al. Marionette: A Programmable Network Traffic Obfuscation System , 2015, USENIX Security Symposium.
[9] Nicholas Hopper,et al. Cover your ACKs: pitfalls of covert channel censorship circumvention , 2013, CCS.
[10] Tadayoshi Kohno,et al. Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform , 2015, WPES@CCS.
[11] Ian Goldberg,et al. SoK: Making Sense of Censorship Resistance Systems , 2016, Proc. Priv. Enhancing Technol..
[12] Dave Levin,et al. Geneva: Evolving Censorship Evasion Strategies , 2019, CCS.
[13] Vern Paxson,et al. SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[14] Aditya Akella,et al. Seeing through Network-Protocol Obfuscation , 2015, CCS.
[15] Nuno Santos,et al. Effective Detection of Multimedia Protocol Tunneling using Machine Learning , 2018, USENIX Security Symposium.
[16] Vern Paxson,et al. Blocking-resistant communication through domain fronting , 2015, Proc. Priv. Enhancing Technol..
[17] Nuno Santos,et al. DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams , 2017, Proc. Priv. Enhancing Technol..
[18] Somesh Jha,et al. LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes , 2014, USENIX Security Symposium.
[19] W. Timothy Strayer,et al. Rebound: Decoy routing on asymmetric routes via error messages , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).
[20] Eric Wustrow,et al. The use of TLS in Censorship Circumvention , 2019, NDSS.
[21] Thomas Ristenpart,et al. Protocol misidentification made easy with format-transforming encryption , 2013, CCS.
[22] Charles V. Wright,et al. Uncovering Spoken Phrases in Encrypted Voice over IP Conversations , 2010, TSEC.
[23] Ian Goldberg,et al. Telex: Anticensorship in the Network Infrastructure , 2011, USENIX Security Symposium.
[24] Vitaly Shmatikov,et al. The Parrot Is Dead: Observing Unobservable Network Communications , 2013, 2013 IEEE Symposium on Security and Privacy.