A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Blocking-resistant communication through domain fronting

D Fifield, C Lan, R Hynes, P Wegmann… - … on Privacy Enhancing …, 2015 - petsymposium.org
We describe “domain fronting,” a versatile censorship circumvention technique that hides
the remote endpoint of a communication. Domain fronting works at the application layer …

The parrot is dead: Observing unobservable network communications

A Houmansadr, C Brubaker… - 2013 IEEE Symposium …, 2013 - ieeexplore.ieee.org
In response to the growing popularity of Tor and other censorship circumvention systems,
censors in non-democratic countries have increased their technical capabilities and can …

Meteor: Cryptographically secure steganography for realistic distributions

G Kaptchuk, TM Jois, M Green, AD Rubin - Proceedings of the 2021 …, 2021 - dl.acm.org
Despite a long history of research and wide-spread applications to censorship resistant
systems, practical steganographic systems capable of embedding messages into realistic …

Seeing through network-protocol obfuscation

L Wang, KP Dyer, A Akella, T Ristenpart… - Proceedings of the 22nd …, 2015 - dl.acm.org
Censorship-circumvention systems are designed to help users bypass Internet censorship.
As more sophisticated deep-packet-inspection (DPI) mechanisms have been deployed by …

Protocol misidentification made easy with format-transforming encryption

KP Dyer, SE Coull, T Ristenpart… - Proceedings of the 2013 …, 2013 - dl.acm.org
Deep packet inspection (DPI) technologies provide much-needed visibility and control of
network traffic using port-independent protocol identification, where a network flow is …

ScrambleSuit: A polymorphic network protocol to circumvent censorship

P Winter, T Pulls, J Fuss - Proceedings of the 12th ACM workshop on …, 2013 - dl.acm.org
Deep packet inspection technology became a cornerstone of Internet censorship by
facilitating cheap and effective filtering of what censors consider undesired information …

Geneva: Evolving censorship evasion strategies

K Bock, G Hughey, X Qiang, D Levin - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading
to increasingly sophisticated Internet-scale censorship techniques and methods to evade …

Poking a hole in the wall: Efficient censorship-resistant Internet communications by parasitizing on WebRTC

D Barradas, N Santos, L Rodrigues… - Proceedings of the 2020 …, 2020 - dl.acm.org
Many censorship circumvention tools rely on trusted proxies that allow users within
censored regions to access blocked Internet content by tunneling it through a covert channel …