Network measurement methods for locating and examining censorship devices

RS Raman, M Wang, J Dalek, J Mayer… - Proceedings of the 18th …, 2022 - dl.acm.org
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …

{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention

PTJ Kon, S Kamali, J Pei, D Barradas, A Chen… - 33rd USENIX Security …, 2024 - usenix.org
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …

Retina: analyzing 100GbE traffic on commodity hardware

G Wan, F Gong, T Barbette, Z Durumeric - Proceedings of the ACM …, 2022 - dl.acm.org
As network speeds have increased to over 100 Gbps, operators and researchers have lost
the ability to easily ask complex questions of reassembled and parsed network traffic. In this …

PTPerf: On the performance evaluation of Tor pluggable transports

Z Umayya, D Malik, D Gosain… - Proceedings of the 2023 …, 2023 - dl.acm.org
Tor, one of the most popular censorship circumvention systems, faces regular blocking
attempts by censors. Thus, to facilitate access, it relies on" pluggable transports"(PTs) that …

The spectre of surveillance and censorship in future internet architectures

M Wrana, D Barradas, N Asokan - arXiv preprint arXiv:2401.15828, 2024 - arxiv.org
Recent initiatives known as Future Internet Architectures (FIAs) seek to redesign the Internet
to improve performance, scalability, and security. However, some governments perceive …

Netshuffle: Circumventing censorship with shuffle proxies at the edge

PTJ Kon, A Gattani, D Saharia, T Cao… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
NetShuffle is a censorship resistance system that offers" shuffle proxies," where regular
proxy services (eg, HTTPS proxies, Tor bridges) are decoupled from their addresses via …

Turbo Tunnel, a good way to design censorship circumvention protocols

D Fifield - 10th USENIX Workshop on Free and Open …, 2020 - usenix.org
This paper advocates for the use of an interior session and reliability layer in censorship
circumvention systems—some protocol that provides a reliable stream interface over a …

OUStralopithecus: Overt user simulation for censorship circumvention

AH Lorimer, L Tulloch, C Bocovich… - Proceedings of the 20th …, 2021 - dl.acm.org
In many parts of the world, censors are continuously increasing their capacity to fingerprint,
identify, and block censorship resistance tools to maintain control over what can and can not …

Towards a scalable censorship-resistant overlay network based on webrtc covert channels

D Barradas, N Santos - Proceedings of the 1st International Workshop …, 2020 - dl.acm.org
In many regions of the world, nation-states enforce Internet censorship policies that prevent
unrestricted access to information and services by their citizens. Over the years, many …

Lox: Protecting the social graph in bridge distribution

L Tulloch - 2022 - uwspace.uwaterloo.ca
Access to the open Internet, free from surveillance and censorship, is an important part of
fulfilling the right to privacy. Despite this, in many regions of the world, censorship of the …