SoK: Making Sense of Censorship Resistance Systems

Abstract An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. Several censorship resistance systems (CRSs) have emerged to help bypass such blocks. The diversity of the censor’s attack landscape has led to an arms race, leading to a dramatic speed of evolution of CRSs. The inherent complexity of CRSs and the breadth of work in this area makes it hard to contextualize the censor’s capabilities and censorship resistance strategies. To address these challenges, we conducted a comprehensive survey of CRSs-deployed tools as well as those discussed in academic literature-to systematize censorship resistance systems by their threat model and corresponding defenses. To this end, we first sketch a comprehensive attack model to set out the censor’s capabilities, coupled with discussion on the scope of censorship, and the dynamics that influence the censor’s decision. Next, we present an evaluation framework to systematize censorship resistance systems by their security, privacy, performance and deployability properties, and show how these systems map to the attack model. We do this for each of the functional phases that we identify for censorship resistance systems: communication establishment, which involves distribution and retrieval of information necessary for a client to join the censorship resistance system; and conversation, where actual exchange of information takes place. Our evaluation leads us to identify gaps in the literature, question the assumptions at play, and explore possible mitigations.

[1]  Lynne B. Sagalyn,et al.  Downtown malls and the city agenda , 1990 .

[2]  Robert N. M. Watson,et al.  Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.

[3]  Lili Qiu,et al.  Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[4]  Richard Clayton,et al.  Failures in a Hybrid Content Blocking System , 2005, Privacy Enhancing Technologies.

[5]  Wojciech Mazurczyk,et al.  Using transcoding for hidden communication in IP telephony , 2011, Multimedia Tools and Applications.

[6]  W. Timothy Strayer,et al.  Rebound: Decoy routing on asymmetric routes via error messages , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).

[7]  Nikita Borisov,et al.  IP over Voice-over-IP for censorship circumvention , 2012, ArXiv.

[8]  Collin Anderson,et al.  Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran , 2013, ArXiv.

[9]  Peter Dorfinger,et al.  Entropy Estimation for Real-Time Encrypted Traffic Identification (Short Paper) , 2011, TMA.

[10]  Damon McCoy,et al.  Proximax : A Measurement Based System for Proxies Dissemination , 2010 .

[11]  Nick Feamster,et al.  Thwarting Web Censorship with Untrusted Messenger Discovery , 2003, Privacy Enhancing Technologies.

[12]  Ian Goldberg,et al.  BridgeSPA: improving Tor bridges with single packet authorization , 2011, WPES.

[13]  R. Anderson The Eternity Service , 1996 .

[14]  Lorrie Faith Cranor,et al.  Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System , 2000, USENIX Security Symposium.

[15]  Nicholas Hopper,et al.  Cover your ACKs: pitfalls of covert channel censorship circumvention , 2013, CCS.

[16]  David D. Jensen,et al.  Privacy Vulnerabilities in Encrypted HTTP Streams , 2005, Privacy Enhancing Technologies.

[17]  Amir Houmansadr,et al.  CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content , 2015, CCS.

[18]  Vinod Yegneswaran,et al.  JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports , 2014, SecureComm.

[19]  Christopher Krügel,et al.  Message in a bottle: sailing past censorship , 2013, ACSAC.

[20]  H. A. Hazen,et al.  Fog , 1889, Science.

[21]  Rong Luo,et al.  GoHop: Personal VPN to defend from censorship , 2014, 16th International Conference on Advanced Communication Technology.

[22]  Nick Feamster,et al.  Infranet: Circumventing Web Censorship and Surveillance , 2002, USENIX Security Symposium.

[23]  Thomas Shrimpton,et al.  Marionette: A Programmable Network Traffic Obfuscation System , 2015, USENIX Security Symposium.

[24]  Neo,et al.  The collateral damage of internet censorship by DNS injection , 2012, Comput. Commun. Rev..

[25]  Eric Wustrow,et al.  TapDance: End-to-Middle Anticensorship without Flow Blocking , 2014, USENIX Security Symposium.

[26]  R. Dingledine,et al.  One Fast Guard for Life ( or 9 months ) , 2014 .

[27]  R. Dingledine,et al.  Design of a blocking-resistant anonymity system , 2006 .

[28]  Yixian Yang,et al.  SkyF2F: Censorship Resistant via Skype Overlay Network , 2009, 2009 WASE International Conference on Information Engineering.

[29]  Renata Teixeira,et al.  Early Recognition of Encrypted Applications , 2007, PAM.

[30]  Nikita Borisov,et al.  Cirripede: circumvention infrastructure using router redirection with plausible deniability , 2011, CCS '11.

[31]  Ian Goldberg,et al.  Changing of the guards: a framework for understanding and improving entry guard selection in tor , 2012, WPES '12.

[32]  Yasushi Shinjo,et al.  VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls , 2014, NSDI.

[33]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[34]  Nicholas Hopper,et al.  Routing around decoys , 2012, CCS.

[35]  Gabi Nakibly,et al.  OSS: Using Online Scanning Services for Censorship Circumvention , 2013, Privacy Enhancing Technologies.

[36]  Nick Feamster,et al.  Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search , 2014, FOCI.

[37]  Stefan Lindskog,et al.  How the Great Firewall of China is Blocking Tor , 2012, FOCI.

[38]  Vinod Yegneswaran,et al.  StegoTorus: a camouflage proxy for the Tor anonymity system , 2012, CCS.

[39]  Thomas Engel,et al.  Website fingerprinting in onion routing based anonymization networks , 2011, WPES.

[40]  Nicholas Hopper,et al.  SilentKnock: practical, provably undetectable authentication , 2008, International Journal of Information Security.

[41]  Nikita Borisov,et al.  SWEET: Serving the Web by Exploiting Email Tunnels , 2012, IEEE/ACM Transactions on Networking.

[42]  Andrew Hintz,et al.  Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.

[43]  Vern Paxson,et al.  SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[44]  Vinod Yegneswaran,et al.  TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography , 2014, FOCI.

[45]  Shuai Li,et al.  Facet: Streaming over Videoconferencing for Censorship Circumvention , 2014, WPES.

[46]  Tadayoshi Kohno,et al.  Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform , 2015, WPES@CCS.

[47]  Ben Laurie,et al.  \Proof-of-Work" Proves Not to Work , 2004 .

[48]  Brandon Wiley Dust : A Blocking-Resistant Internet Transport Protocol , 2011 .

[49]  Vinod Yegneswaran,et al.  Bootstrapping Communications into an Anti-Censorship System , 2012, FOCI.

[50]  Jeffrey Knockel,et al.  Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance , 2011, FOCI.

[51]  Vitaly Shmatikov,et al.  CloudTransport: Using Cloud Storage for Censorship-Resistant Networking , 2014, Privacy Enhancing Technologies.

[52]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[53]  Micah Sherr,et al.  Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.

[54]  David A. Wagner,et al.  TAZ Servers and the Rewebber Network: Enabling Anonymous Publishing on the World Wide Web , 1998, First Monday.

[55]  Vern Paxson,et al.  Blocking-resistant communication through domain fronting , 2015, Proc. Priv. Enhancing Technol..

[56]  David Mazières,et al.  Tangler: a censorship-resistant publishing system based on document entanglements , 2001, CCS '01.

[57]  Ian Goldberg,et al.  SkypeMorph: protocol obfuscation for Tor bridges , 2012, CCS.

[58]  Dan Boneh,et al.  Evading Censorship with Browser-Based Proxies , 2012, Privacy Enhancing Technologies.

[59]  Rob Johnson,et al.  Games without Frontiers: Investigating Video Games as a Covert Channel , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[60]  Aniket Kate,et al.  POSTER: Identity-based steganography and its applications to censorship resistance , 2013, CCS.

[61]  Ian Goldberg,et al.  Telex: Anticensorship in the Network Infrastructure , 2011, USENIX Security Symposium.

[62]  Santosh S. Vempala,et al.  Chipping Away at Censorship Firewalls with User-Generated Content , 2010, USENIX Security Symposium.

[63]  Charles V. Wright,et al.  On Inferring Application Protocol Behaviors in Encrypted Network Traffic , 2006, J. Mach. Learn. Res..

[64]  Xun Gong,et al.  CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing , 2012, CCS.

[65]  Andrei Serjantov,et al.  Anonymizing Censorship Resistant Systems , 2002, IPTPS.

[66]  W. Timothy Strayer,et al.  Decoy Routing: Toward Unblockable Internet Communication , 2011, FOCI.

[67]  Vitaly Shmatikov,et al.  The Parrot Is Dead: Observing Unobservable Network Communications , 2013, 2013 IEEE Symposium on Security and Privacy.

[68]  Vern Paxson,et al.  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion , 2013, FOCI.

[69]  Michael K. Reiter,et al.  Censorship Resistance Revisited , 2005, Information Hiding.

[70]  Vern Paxson,et al.  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[71]  Philipp Winter,et al.  ScrambleSuit: a polymorphic network protocol to circumvent censorship , 2013, WPES.

[72]  Brendan T. O'Connor,et al.  Censorship and deletion practices in Chinese social media , 2012, First Monday.

[73]  Steven J. Murdoch,et al.  Systemization of Pluggable Transports for Censorship Resistance , 2014, ArXiv.

[74]  Vern Paxson,et al.  On Modeling the Costs of Censorship , 2014, ArXiv.

[75]  R. Gastil,et al.  Freedom in the World , 1998 .

[76]  J. Wiest,et al.  The Arab Spring| Social Media in the Egyptian Revolution: Reconsidering Resource Mobilization Theory , 2011 .

[77]  Cameron Marlow,et al.  A 61-million-person experiment in social influence and political mobilization , 2012, Nature.

[78]  Stefan Köpsell,et al.  How to achieve blocking resistance for existing systems enabling anonymous web surfing , 2004, WPES '04.

[79]  Somesh Jha,et al.  LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes , 2014, USENIX Security Symposium.

[80]  Ian Goldberg,et al.  A Framework for the Game-theoretic Analysis of Censorship Resistance , 2016, Proc. Priv. Enhancing Technol..

[81]  Antonio Pescapè,et al.  Issues and future directions in traffic classification , 2012, IEEE Network.

[82]  Thomas Ristenpart,et al.  Protocol misidentification made easy with format-transforming encryption , 2013, CCS.

[83]  Dan S. Wallach,et al.  The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions , 2013, USENIX Security Symposium.

[84]  C. Leberknight A Taxonomy of Internet Censorship and Anti-Censorship Draft Version December 31 , 2010 , 2011 .

[85]  Alex Biryukov,et al.  Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization , 2013, 2013 IEEE Symposium on Security and Privacy.

[86]  I. Goldberg,et al.  Slipping Past the Cordon : A Systematization of Internet Censorship Resistance , 2015 .