Censorship and deletion practices in Chinese social media

D Bamman, B O'Connor, N Smith - First Monday, 2012 - firstmonday.org
Abstract With Twitter and Facebook blocked in China, the stream of information from
Chinese domestic social media provides a case study of social media behavior under the …

Repeatable reverse engineering with PANDA

B Dolan-Gavitt, J Hodosh, P Hulin, T Leek… - Proceedings of the 5th …, 2015 - dl.acm.org
We present PANDA, an open-source tool that has been purpose-built to support whole
system reverse engineering. It is built upon the QEMU whole system emulator, and so …

ICLab: A global, longitudinal internet censorship measurement platform

AA Niaki, S Cho, Z Weinberg, NP Hoang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Researchers have studied Internet censorship for nearly as long as attempts to censor
contents have taken place. Most studies have however been limited to a short period of time …

The parrot is dead: Observing unobservable network communications

A Houmansadr, C Brubaker… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
In response to the growing popularity of Tor and other censorship circumvention systems,
censors in non-democratic countries have increased their technical capabilities and can …

[PDF][PDF] Measuring the Deployment of Network Censorship Filters at Global Scale.

RS Raman, A Stoll, J Dalek, R Ramesh, W Scott… - NDSS, 2020 - pdfs.semanticscholar.org
Measuring the Deployment of Network Censorship Filters at Global Scale Page 1 Measuring the
Deployment of Network Censorship Filters at Global Scale Ram Sundara Raman1, Adrian …

[PDF][PDF] I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.

A Houmansadr, TJ Riedl, N Borisov, AC Singer - NDSS, 2013 - censorbib.nymity.ch
Open communication over the Internet poses a serious threat to countries with repressive
regimes, leading them to develop and deploy censorship mechanisms within their networks …

Censorship in the wild: Analyzing Internet filtering in Syria

A Chaabane, T Chen, M Cunche… - Proceedings of the …, 2014 - dl.acm.org
Internet censorship is enforced by numerous governments worldwide, however, due to the
lack of publicly available information, as well as the inherent risks of performing active …

Quack: Scalable Remote Measurement of {Application-Layer} Censorship

B VanderSloot, A McDonald, W Scott… - 27th USENIX Security …, 2018 - usenix.org
Remote censorship measurement tools can now detect DNS-and IP-based blocking at
global scale. However, a major unmonitored form of interference is blocking triggered by …

Internet censorship detection: A survey

G Aceto, A Pescapé - Computer Networks, 2015 - Elsevier
Internet Censorship is a phenomenon that crosses several study fields, from computer
networking and computer security to social sciences; together with censorship detection and …

Cover your acks: Pitfalls of covert channel censorship circumvention

J Geddes, M Schuchard, N Hopper - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
In response to increasingly sophisticated methods of blocking access to censorship
circumvention schemes such as Tor, recently proposed systems such as Skypemorph …