Accurate decentralized application identification via encrypted traffic analysis using graph neural networks

M Shen, J Zhang, L Zhu, K Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Decentralized Applications (DApps) are increasingly developed and deployed on
blockchain platforms such as Ethereum. DApp fingerprinting can identify users' visits to …

Thirty years of DNS insecurity: Current issues and perspectives

G Schmid - IEEE Communications Surveys & Tutorials, 2021 - ieeexplore.ieee.org
When DNS was created, nobody expected that it would have become the base for the digital
economy and a prime target for cybercriminals. And nobody expected that one main asset of …

A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Censored planet: An internet-wide, longitudinal censorship observatory

R Sundara Raman, P Shenoy, K Kohls… - proceedings of the 2020 …, 2020 - dl.acm.org
Remote censorship measurement techniques offer capabilities for monitoring Internet
reachability around the world. However, operating these techniques continuously is labor …

How Great is the Great Firewall? Measuring China's {DNS} Censorship

NP Hoang, AA Niaki, J Dalek, J Knockel, P Lin… - 30th USENIX Security …, 2021 - usenix.org
The DNS filtering apparatus of China's Great Firewall (GFW) has evolved considerably over
the past two decades. However, most prior studies of China's DNS filtering were performed …

Fingerprinting Obfuscated Proxy Traffic with Encapsulated {TLS} Handshakes

D Xue, M Kallitsis, A Houmansadr… - 33rd USENIX Security …, 2024 - usenix.org
The global escalation of Internet censorship by nation-state actors has led to an ongoing
arms race between censors and obfuscated circumvention proxies. Research over the past …

Reproducibility and replicability of web measurement studies

N Demir, M Große-Kampmann, T Urban… - Proceedings of the …, 2022 - dl.acm.org
Web measurement studies can shed light on not yet fully understood phenomena and thus
are essential for analyzing how the modern Web works. This often requires building new …

Network measurement methods for locating and examining censorship devices

RS Raman, M Wang, J Dalek, J Mayer… - Proceedings of the 18th …, 2022 - dl.acm.org
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …

Poking a hole in the wall: Efficient censorship-resistant Internet communications by parasitizing on WebRTC

D Barradas, N Santos, L Rodrigues… - Proceedings of the 2020 …, 2020 - dl.acm.org
Many censorship circumvention tools rely on trusted proxies that allow users within
censored regions to access blocked Internet content by tunneling it through a covert channel …

{GFWeb}: Measuring the Great Firewall's Web Censorship at Scale

NP Hoang, J Dalek, M Crete-Nishihata… - 33rd USENIX Security …, 2024 - usenix.org
Censorship systems such as the Great Firewall (GFW) have been continuously refined to
enhance their filtering capabilities. However, most prior studies, and in particular the GFW …