Accurate decentralized application identification via encrypted traffic analysis using graph neural networks
Decentralized Applications (DApps) are increasingly developed and deployed on
blockchain platforms such as Ethereum. DApp fingerprinting can identify users' visits to …
blockchain platforms such as Ethereum. DApp fingerprinting can identify users' visits to …
Thirty years of DNS insecurity: Current issues and perspectives
G Schmid - IEEE Communications Surveys & Tutorials, 2021 - ieeexplore.ieee.org
When DNS was created, nobody expected that it would have become the base for the digital
economy and a prime target for cybercriminals. And nobody expected that one main asset of …
economy and a prime target for cybercriminals. And nobody expected that one main asset of …
A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …
Censored planet: An internet-wide, longitudinal censorship observatory
R Sundara Raman, P Shenoy, K Kohls… - proceedings of the 2020 …, 2020 - dl.acm.org
Remote censorship measurement techniques offer capabilities for monitoring Internet
reachability around the world. However, operating these techniques continuously is labor …
reachability around the world. However, operating these techniques continuously is labor …
How Great is the Great Firewall? Measuring China's {DNS} Censorship
The DNS filtering apparatus of China's Great Firewall (GFW) has evolved considerably over
the past two decades. However, most prior studies of China's DNS filtering were performed …
the past two decades. However, most prior studies of China's DNS filtering were performed …
Fingerprinting Obfuscated Proxy Traffic with Encapsulated {TLS} Handshakes
The global escalation of Internet censorship by nation-state actors has led to an ongoing
arms race between censors and obfuscated circumvention proxies. Research over the past …
arms race between censors and obfuscated circumvention proxies. Research over the past …
Reproducibility and replicability of web measurement studies
Web measurement studies can shed light on not yet fully understood phenomena and thus
are essential for analyzing how the modern Web works. This often requires building new …
are essential for analyzing how the modern Web works. This often requires building new …
Network measurement methods for locating and examining censorship devices
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …
censorship devices that can perform large-scale, highly-performant content blocking. While …
Poking a hole in the wall: Efficient censorship-resistant Internet communications by parasitizing on WebRTC
Many censorship circumvention tools rely on trusted proxies that allow users within
censored regions to access blocked Internet content by tunneling it through a covert channel …
censored regions to access blocked Internet content by tunneling it through a covert channel …
{GFWeb}: Measuring the Great Firewall's Web Censorship at Scale
NP Hoang, J Dalek, M Crete-Nishihata… - 33rd USENIX Security …, 2024 - usenix.org
Censorship systems such as the Great Firewall (GFW) have been continuously refined to
enhance their filtering capabilities. However, most prior studies, and in particular the GFW …
enhance their filtering capabilities. However, most prior studies, and in particular the GFW …