We design, implement, and evaluate CovertCast, a censorship circumvention system that broadcasts the content of popular websites in real-time, encrypted video streams on common live-streaming services such as YouTube. CovertCast does not require any modifications to the streaming service and employs the same protocols, servers, and streaming software as any other user of the service. Therefore, CovertCast cannot be distinguished from other live streams by IP address filtering or protocol fingerprinting, raising the bar for censors.
If the inline PDF is not rendering correctly, you can download the PDF file here.
 Anonymizer. https://www.anonymizer.com/.
 BRUBAKER, C., HOUMANSADR, A., AND SHMATIKOV, V. CloudTransport: Using Cloud Storage for Censorship- Resistant Networking. In PETS (2014).
 BURNETT, S., FEAMSTER, N., AND VEMPALA, S. Chipping Away at Censorship Firewalls with User-Generated Content. In USENIX Security (2010).
 Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship. https://openitp.org/pdfs/CollateralFreedom.pdf, 2013.
 DINGLEDINE, R., AND MATHEWSON, N. Design of a Blocking- Resistant Anonymity System. https://svn.torproject.org/svn/projects/design-paper/blocking.html.
 DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. Tor: The Second-generation Onion Router. In USENIX Security (2004).
 FEAMSTER, N., BALAZINSKA, M., HARFST, G., BALAKRISHNAN, H., AND KARGER, D. Infranet: Circumventing Web Censorship and Surveillance. In USENIX Security (2002).
 FIFIELD, D., LAN, C., HYNES, R., WEGMANN, P., AND PAXSON, V. Blocking-resistant Communication through Domain Fronting. In PETS (2015).
 GEDDES, J., SCHUCHARD, M., AND HOPPER, N. Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention. In CCS (2013).
 HOLOWCZAK, J., AND HOUMANSADR, A. CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content. In CCS (2015).
 HOUMANSADR, A., BRUBAKER, C., AND SHMATIKOV, V. The Parrot Is Dead: Observing Unobservable Network Communications. In S&P (2013).
 HOUMANSADR, A., NGUYEN, G., CAESAR, M., AND BORISOV, N. Cirripede: Circumvention Infrastructure Using Router Redirection with Plausible Deniability. In CCS (2011).
 HOUMANSADR, A., RIEDL, T., BORISOV, N., AND SINGER, A. I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention. In NDSS (2013).
 HOUMANSADR, A., WONG, E. L., AND SHMATIKOV, V. No Direction Home: The True Cost of Routing Around Decoys. In NDSS (2014).
 HOUMANSADR, A., ZHOU, W., CAESAR, M., AND BORISOV, N. SWEET: Serving the Web by Exploiting Email Tunnels. In PETS (2013).
 KARLIN, J., ELLARD, D., JACKSON, A., JONES, C., LAUER, G., MANKINS, D., AND STRAYER, W. Decoy Routing: Toward Unblockable Internet Communication. In FOCI (2011).
 KULLBACK, S., AND LEIBLER, R. A. On information and sufficiency. The Annals of Mathematical Statistics (1951), 79-86.
 LI, S., SCHLIEP, M., AND HOPPER, N. Facet: Streaming over Videoconferencing for Censorship Circumvention. In WPES (2014).
 MAHDIAN, M. Fighting Censorship with Algorithms. In Fun with Algorithms (2010).
 MCCOY, D., MORALES, J. A., AND LEVCHENKO, K. Proximax: A Measurement Based System for Proxies Dissemination. In FC (2011).
 MCLACHLAN, J., AND HOPPER, N. On the Risks of Serving Whenever You Surf: Vulnerabilities in Tor’s Blocking Resistance Design. In WPES (2009).