A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

Unveiling the mystery of internet packet forwarding: A survey of network path validation

K Bu, A Laird, Y Yang, L Cheng, J Luo, Y Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Validating the network paths taken by packets is critical in constructing a secure Internet
architecture. Any feasible solution must both enforce packet forwarding along end-host …

Geneva: Evolving censorship evasion strategies

K Bock, G Hughey, X Qiang, D Levin - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading
to increasingly sophisticated Internet-scale censorship techniques and methods to evade …

Findings of the NLP4IF-2021 shared tasks on fighting the COVID-19 infodemic and censorship detection

S Shaar, F Alam, GDS Martino, A Nikolov… - arXiv preprint arXiv …, 2021 - arxiv.org
We present the results and the main findings of the NLP4IF-2021 shared tasks. Task 1
focused on fighting the COVID-19 infodemic in social media, and it was offered in Arabic …

Mapping the routes of the Internet for geopolitics: The case of Eastern Ukraine

K Limonier, F Douzet, L Pétiniaud, L Salamatian… - First Monday, 2021 - firstmonday.org
In this paper, we argue that data routing is of geopolitical significance. We propose new
methodologies to understand and represent the new forms of power rivalries and …

{GET}/out: Automated discovery of {Application-Layer} censorship evasion strategies

M Harrity, K Bock, F Sell, D Levin - 31st USENIX Security Symposium …, 2022 - usenix.org
The censorship arms race has recently gone through a transformation, thanks to recent
efforts showing that new ways to evade censorship can be discovered in an automated …

The spectre of surveillance and censorship in future internet architectures

M Wrana, D Barradas, N Asokan - arXiv preprint arXiv:2401.15828, 2024 - arxiv.org
Recent initiatives known as Future Internet Architectures (FIAs) seek to redesign the Internet
to improve performance, scalability, and security. However, some governments perceive …

[PDF][PDF] On the Challenges of Geographical Avoidance for Tor.

K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper - NDSS, 2019 - poepper.net
Traffic-analysis attacks are a persisting threat for Tor users. When censors or law
enforcement agencies try to identify users, they conduct traffic-confirmation attacks and …

Secure data communications in wireless networks using multi-path avoidance routing

K Sakai, MT Sun, WS Ku, J Wu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Due to software implementation failure and misuse of cryptography, data encryption can no
longer be considered a safeguard from security attacks. As a result, adversaries with …

Alidrone: Enabling trustworthy proof-of-alibi for commercial drone compliance

T Liu, A Hojjati, A Bates… - 2018 IEEE 38th …, 2018 - ieeexplore.ieee.org
Commercial use of Unmanned Aerial Vehicles (UAVs), or drones, promises to revolutionize
the way in which consumers interact with retail services. However, the further adoption of …