Search Results

You are looking at 1 - 10 of 13 items for :

  • censorship circumvention x
Clear All
Open access

David Fifield, Chang Lan, Rod Hynes, Percy Wegmann and Vern Paxson

. Porras, and D. Boneh. Evading censorship with browser-based proxies. In Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS) . Springer, July 2012. https://crypto.stanford.edu/flashproxy/flashproxy.pdf . [23] J. Geddes, M. Schuchard, and N. Hopper. Cover your ACKs: Pitfalls of covert channel censorship circumvention. In Proceedings of the 20th ACM conference on Computer and Communications Security (CCS) , Nov. 2013. http://www-users.cs.umn.edu/~hopper/ccs13-cya.pdf . [24] GoAgent. https://github.com/goagent/goagent . [25

Open access

Cecylia Bocovich and Ian Goldberg

. USENIX Association. [14] John Geddes, Max Schuchard, and Nicholas Hopper. Cover your ACKs: Pitfalls of covert channel censorship circumvention. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS ’13, pages 361-372, New York, NY, USA, 2013. ACM. [15] Yihua He, Michalis Faloutsos, Srikanth Krishnamurthy, and Bradley Huffaker. On routing asymmetry in the internet. In Global Telecommunications Conference, 2005. GLOBE- COM’05. IEEE, volume 2, pages 6-pp. IEEE, 2006. [16] Dominik

Open access

Frederick Douglas, Rorshach, Weiyang Pan and Matthew Caesar

circumvention. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), pp. 361-372. [11] Houmansadr, A., Nguyen, G. T. K., Caesar, M., and Borisov, N. Cirripede: circumvention infrastructure using router redirection with plausible deniability. In Proceedings of CCS (2011). [12] Houmansadr, A., Riedl, T. J., Borisov, N., and Singer, A. C. IP over Voice-over-IP for censorship circumvention. CoRR abs/1207.2683 (2012). [13] Houmansadr, A., Wong, E. L., and Shmatikov, V. No direction home: The

Open access

Diogo Barradas, Nuno Santos and Luís Rodrigues

. 367–382. [8] T. Elahi, C. M. Swanson, and I. Goldberg, “Slipping past the cordon: A systematization of Internet censorship resistance,” in CACR Tech Report 2015-10 , 2015. [9] R. Ensafi, D. Fifield, P. Winter, N. Feamster, N. Weaver, and V. Paxson, “Examining how the great firewall discovers hidden circumvention servers,” in Proceedings of the 2015 ACM Conference on Internet Measurement Conference , Tokyo, Japan, 2015, pp. 445–458. [10] FFmpeg, https://ffmpeg.org , 2000, accessed: 2017-06-12. [11] D. Fifield, C. Lan, R. Hynes, P. Wegmann

Open access

Richard McPherson, Amir Houmansadr and Vitaly Shmatikov

References [1] Anonymizer. https://www.anonymizer.com/. [2] BRUBAKER, C., HOUMANSADR, A., AND SHMATIKOV, V. CloudTransport: Using Cloud Storage for Censorship- Resistant Networking. In PETS (2014). [3] BURNETT, S., FEAMSTER, N., AND VEMPALA, S. Chipping Away at Censorship Firewalls with User-Generated Content. In USENIX Security (2010). [4] Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship. https://openitp.org/pdfs/CollateralFreedom.pdf, 2013. [5

Open access

Tariq Elahi, John A. Doucette, Hadi Hosseini, Steven J. Murdoch and Ian Goldberg

. Schuchard, and N. Hopper. Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention. In Proceedings of the 20th ACM conference on Computer and Communications Security, 2013. [19] B. Hahn, R. Nithyanand, P. Gill, and R. Johnson. Games Without Frontiers: Investigating Video Games as a Covert Channel. http://arxiv.org/pdf/1503.05904v2.pdf, 2015. Retrieved May 2015. [20] A. Houmansadr, T. Riedl, N. Borisov, and A. Singer. IP over Voice-over-IP for Censorship Circumvention. arXiv preprint arXiv:1207.2683, 2012. [21] S

Open access

Vasile C. Perta, Marco V. Barbera, Gareth Tyson, Hamed Haddadi and Alessandro Mei

References [1] “Global surveillance disclosures (2013-present),” http://en. wikipedia.org/wiki/Global_surveillance_disclosures_(2013- present). [2] R. Clayton, S. J. Murdoch, and R. N. Watson, “Ignoring the Great Firewall of China,” in Proceedings of the 6th Workshop on Privacy Enhancing Technologies. Springer, 2006, LNCS vol. 4258, pp. 20-35. [3] S. Khattak, M. Javed, S. A. Khayam, Z. A. Uzmi, and V. Paxson, “A Look at the Consequences of Internet Censorship Through an ISP Lens,” in Proceedings of the 14th

Open access

Shuai Li and Nicholas Hopper

References [1] Collateral freedom: A snapshot of chinese internet users circumventing censorship, https://openitp.org/newsevents/collateral-freedom-a-snapshot-of-chinese-userscircumventing-censorship.html. [2] Email statistics report 2014-2018, http://www.radicati.com/wp/wp-content/uploads/2014/01/email-statisticsreport-2014-2018-executive-summary.pdf. [3] Enron dataset, https://www.cs.cmu.edu/./enron/. [4] Google approves an app that steals all your data, http

Open access

Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch and Ian Goldberg

://freedomhouse.org/report/freedom-world/freedom-world-2016, 2016. [4] T. Elahi, C. M. Swanson, and I. Goldberg, “Slipping Past the Cordon: A Systematization of Internet Censorship Resistance.” CACR Tech Report 2015-10, Aug. 2015. [5] S. Khattak, L. Simon, and S. J. Murdoch, “Systemization of Pluggable Transports for Censorship Resistance.” http://arxiv.org/pdf/1412.7448v1.pdf, 2014. [6] M. C. Tschantz, S. Afroz, D. Fifield, and V. Paxson, “SoK: Towards Grounding Censorship Circumvention in Empiricism,” in Proceedings of the IEEE Symposium on Security and Privacy, 2016

Open access

Zachary Weinberg, Mahmood Sharif, Janos Szurdi and Nicolas Christin

Global Internet Censorship and Circumvention: A Survey.” Communications of the IIMA 11.2 (2011). [56] Fei Sun, Dandan Song, and Lejian Liao. “DOM Based Content Extraction via Text Density.” Research and Development in Information Retrieval. ACM, 2011, pp. 245-254. [57] Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, and Chris Kanich. “The Long “Taile” of Typosquatting Domain Names.” USENIX Security Symposium. 2014, pp. 191-206. [58] The Common Crawl Foundation. Common Crawl. Web site