{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention

PTJ Kon, S Kamali, J Pei, D Barradas, A Chen… - 33rd USENIX Security …, 2024 - usenix.org
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …

Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape

D Xue, A Ablove, R Ramesh, GK Danciu… - 33rd USENIX Security …, 2024 - usenix.org
The ecosystem of censorship circumvention tools (CTs) remains one of the most opaque
and least understood, overshadowed by the precarious legal status around their usage and …

Enhanced detection of obfuscated HTTPS tunnel traffic using heterogeneous information network

M Liu, G Gou, G Xiong, J Shi, Z Guan, H Miao, Y Li - Computer Networks, 2025 - Elsevier
HTTPS tunnel-based VPN services are increasingly used for malicious activities, such as
remote control and data exfiltration. As detection mechanisms improve, some adversaries …

Yesterday Once More: Global Measurement of Internet Traffic Shadowing Behaviors

Y Xing, C Lu, B Liu, H Duan, J Sun, Z Li - … of the 2024 ACM on Internet …, 2024 - dl.acm.org
We present a global, large-scale measurement of Internet traffic shadowing, a less-studied
yet covert format of on-path manipulation. As part of pervasive monitoring, data within …

Detecting vpn traffic through encapsulated tcp behavior

M Hanlon, G Wan, A Ascheman… - Free and Open …, 2024 - petsymposium.org
Virtual Private Networks (VPNs) are increasingly being used to protect online users' privacy
and security. However, there is an ongoing arms race between censors that aim to detect …

CensorLab: A Testbed for Censorship Experimentation

J Sheffey, A Houmansadr - arXiv preprint arXiv:2412.16349, 2024 - arxiv.org
Censorship and censorship circumvention are closely connected, and each is constantly
making decisions in reaction to the other. When censors deploy a new Internet censorship …

[PDF][PDF] MIRACE: MULTI-PATH INTEGRATED ROUTING ARCHITECTURE FOR CENSORSHIP EVASION

HGDOSS PEREIRA - 2024 - run.unl.pt
Contemporary research has underscored the alarming surveillance and censorship
practices of totalitarian regimes and government agencies in observing traffic in …

An Investigation of VPN Fingerprinting

A Orofino - 2024 - research-collection.ethz.ch
The increasing prevalence of Internet censorship in several regions of the world has
necessitated the development of advanced censorshipresistant technologies. Virtual Private …

[PDF][PDF] SpotProxy: Rediscovering the Cloud for Censorship Circumvention

PTJKS Kamali, J Pei, D Barradas, ACM Sherr, M Yung - cs.uwaterloo.ca
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …