SoK: Making Sense of Censorship Resistance Systems
暂无分享,去创建一个
Ian Goldberg | Steven J. Murdoch | Colleen Swanson | Laurent Simon | Tariq Elahi | Sheharbano Khattak | S. Murdoch | I. Goldberg | Laurent Simon | S. Khattak | T. Elahi | C. Swanson
[1] Lynne B. Sagalyn,et al. Downtown malls and the city agenda , 1990 .
[2] Robert N. M. Watson,et al. Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.
[3] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] Richard Clayton,et al. Failures in a Hybrid Content Blocking System , 2005, Privacy Enhancing Technologies.
[5] Wojciech Mazurczyk,et al. Using transcoding for hidden communication in IP telephony , 2011, Multimedia Tools and Applications.
[6] W. Timothy Strayer,et al. Rebound: Decoy routing on asymmetric routes via error messages , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).
[7] Nikita Borisov,et al. IP over Voice-over-IP for censorship circumvention , 2012, ArXiv.
[8] Collin Anderson,et al. Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran , 2013, ArXiv.
[9] Peter Dorfinger,et al. Entropy Estimation for Real-Time Encrypted Traffic Identification (Short Paper) , 2011, TMA.
[10] Damon McCoy,et al. Proximax : A Measurement Based System for Proxies Dissemination , 2010 .
[11] Nick Feamster,et al. Thwarting Web Censorship with Untrusted Messenger Discovery , 2003, Privacy Enhancing Technologies.
[12] Ian Goldberg,et al. BridgeSPA: improving Tor bridges with single packet authorization , 2011, WPES.
[13] R. Anderson. The Eternity Service , 1996 .
[14] Lorrie Faith Cranor,et al. Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System , 2000, USENIX Security Symposium.
[15] Nicholas Hopper,et al. Cover your ACKs: pitfalls of covert channel censorship circumvention , 2013, CCS.
[16] David D. Jensen,et al. Privacy Vulnerabilities in Encrypted HTTP Streams , 2005, Privacy Enhancing Technologies.
[17] Amir Houmansadr,et al. CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content , 2015, CCS.
[18] Vinod Yegneswaran,et al. JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports , 2014, SecureComm.
[19] Christopher Krügel,et al. Message in a bottle: sailing past censorship , 2013, ACSAC.
[20] H. A. Hazen,et al. Fog , 1889, Science.
[21] Rong Luo,et al. GoHop: Personal VPN to defend from censorship , 2014, 16th International Conference on Advanced Communication Technology.
[22] Nick Feamster,et al. Infranet: Circumventing Web Censorship and Surveillance , 2002, USENIX Security Symposium.
[23] Thomas Shrimpton,et al. Marionette: A Programmable Network Traffic Obfuscation System , 2015, USENIX Security Symposium.
[24] Neo,et al. The collateral damage of internet censorship by DNS injection , 2012, Comput. Commun. Rev..
[25] Eric Wustrow,et al. TapDance: End-to-Middle Anticensorship without Flow Blocking , 2014, USENIX Security Symposium.
[26] R. Dingledine,et al. One Fast Guard for Life ( or 9 months ) , 2014 .
[27] R. Dingledine,et al. Design of a blocking-resistant anonymity system , 2006 .
[28] Yixian Yang,et al. SkyF2F: Censorship Resistant via Skype Overlay Network , 2009, 2009 WASE International Conference on Information Engineering.
[29] Renata Teixeira,et al. Early Recognition of Encrypted Applications , 2007, PAM.
[30] Nikita Borisov,et al. Cirripede: circumvention infrastructure using router redirection with plausible deniability , 2011, CCS '11.
[31] Ian Goldberg,et al. Changing of the guards: a framework for understanding and improving entry guard selection in tor , 2012, WPES '12.
[32] Yasushi Shinjo,et al. VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls , 2014, NSDI.
[33] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[34] Nicholas Hopper,et al. Routing around decoys , 2012, CCS.
[35] Gabi Nakibly,et al. OSS: Using Online Scanning Services for Censorship Circumvention , 2013, Privacy Enhancing Technologies.
[36] Nick Feamster,et al. Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search , 2014, FOCI.
[37] Stefan Lindskog,et al. How the Great Firewall of China is Blocking Tor , 2012, FOCI.
[38] Vinod Yegneswaran,et al. StegoTorus: a camouflage proxy for the Tor anonymity system , 2012, CCS.
[39] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[40] Nicholas Hopper,et al. SilentKnock: practical, provably undetectable authentication , 2008, International Journal of Information Security.
[41] Nikita Borisov,et al. SWEET: Serving the Web by Exploiting Email Tunnels , 2012, IEEE/ACM Transactions on Networking.
[42] Andrew Hintz,et al. Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.
[43] Vern Paxson,et al. SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[44] Vinod Yegneswaran,et al. TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography , 2014, FOCI.
[45] Shuai Li,et al. Facet: Streaming over Videoconferencing for Censorship Circumvention , 2014, WPES.
[46] Tadayoshi Kohno,et al. Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform , 2015, WPES@CCS.
[47] Ben Laurie,et al. \Proof-of-Work" Proves Not to Work , 2004 .
[48] Brandon Wiley. Dust : A Blocking-Resistant Internet Transport Protocol , 2011 .
[49] Vinod Yegneswaran,et al. Bootstrapping Communications into an Anti-Censorship System , 2012, FOCI.
[50] Jeffrey Knockel,et al. Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance , 2011, FOCI.
[51] Vitaly Shmatikov,et al. CloudTransport: Using Cloud Storage for Censorship-Resistant Networking , 2014, Privacy Enhancing Technologies.
[52] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[53] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.
[54] David A. Wagner,et al. TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web , 1998, First Monday.
[55] Vern Paxson,et al. Blocking-resistant communication through domain fronting , 2015, Proc. Priv. Enhancing Technol..
[56] David Mazières,et al. Tangler: a censorship-resistant publishing system based on document entanglements , 2001, CCS '01.
[57] Ian Goldberg,et al. SkypeMorph: protocol obfuscation for Tor bridges , 2012, CCS.
[58] Dan Boneh,et al. Evading Censorship with Browser-Based Proxies , 2012, Privacy Enhancing Technologies.
[59] Rob Johnson,et al. Games without Frontiers: Investigating Video Games as a Covert Channel , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[60] Aniket Kate,et al. POSTER: Identity-based steganography and its applications to censorship resistance , 2013, CCS.
[61] Ian Goldberg,et al. Telex: Anticensorship in the Network Infrastructure , 2011, USENIX Security Symposium.
[62] Santosh S. Vempala,et al. Chipping Away at Censorship Firewalls with User-Generated Content , 2010, USENIX Security Symposium.
[63] Charles V. Wright,et al. On Inferring Application Protocol Behaviors in Encrypted Network Traffic , 2006, J. Mach. Learn. Res..
[64] Xun Gong,et al. CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing , 2012, CCS.
[65] Andrei Serjantov,et al. Anonymizing Censorship Resistant Systems , 2002, IPTPS.
[66] W. Timothy Strayer,et al. Decoy Routing: Toward Unblockable Internet Communication , 2011, FOCI.
[67] Vitaly Shmatikov,et al. The Parrot Is Dead: Observing Unobservable Network Communications , 2013, 2013 IEEE Symposium on Security and Privacy.
[68] Vern Paxson,et al. Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion , 2013, FOCI.
[69] Michael K. Reiter,et al. Censorship Resistance Revisited , 2005, Information Hiding.
[70] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[71] Philipp Winter,et al. ScrambleSuit: a polymorphic network protocol to circumvent censorship , 2013, WPES.
[72] Brendan T. O'Connor,et al. Censorship and deletion practices in Chinese social media , 2012, First Monday.
[73] Steven J. Murdoch,et al. Systemization of Pluggable Transports for Censorship Resistance , 2014, ArXiv.
[74] Vern Paxson,et al. On Modeling the Costs of Censorship , 2014, ArXiv.
[75] R. Gastil,et al. Freedom in the World , 1998 .
[76] J. Wiest,et al. The Arab Spring| Social Media in the Egyptian Revolution: Reconsidering Resource Mobilization Theory , 2011 .
[77] Cameron Marlow,et al. A 61-million-person experiment in social influence and political mobilization , 2012, Nature.
[78] Stefan Köpsell,et al. How to achieve blocking resistance for existing systems enabling anonymous web surfing , 2004, WPES '04.
[79] Somesh Jha,et al. LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes , 2014, USENIX Security Symposium.
[80] Ian Goldberg,et al. A Framework for the Game-theoretic Analysis of Censorship Resistance , 2016, Proc. Priv. Enhancing Technol..
[81] Antonio Pescapè,et al. Issues and future directions in traffic classification , 2012, IEEE Network.
[82] Thomas Ristenpart,et al. Protocol misidentification made easy with format-transforming encryption , 2013, CCS.
[83] Dan S. Wallach,et al. The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions , 2013, USENIX Security Symposium.
[84] C. Leberknight. A Taxonomy of Internet Censorship and Anti-Censorship Draft Version December 31 , 2010 , 2011 .
[85] Alex Biryukov,et al. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization , 2013, 2013 IEEE Symposium on Security and Privacy.
[86] I. Goldberg,et al. Slipping Past the Cordon : A Systematization of Internet Censorship Resistance , 2015 .