[引用][C] The Brussels Effect: How the European Union Rules the World

A Bradford - 2020 - books.google.com
For many observers, the European Union is mired in a deep crisis. Between sluggish
growth; political turmoil following a decade of austerity politics; Brexit; and the rise of Asian …

Encrypted DNS--> privacy? A traffic analysis perspective

S Siby, M Juarez, C Diaz, N Vallina-Rodriguez… - arXiv preprint arXiv …, 2019 - arxiv.org
Virtually every connection to an Internet service is preceded by a DNS lookup which is
performed without any traffic-level protection, thus enabling manipulation, redirection …

" It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online

A McDonald, C Barwulor, ML Mazurek… - 30th USENIX Security …, 2021 - usenix.org
We investigate how a population of end-users with especially salient security and privacy
risks---sex workers---conceptualizes and manages their digital safety. The commercial sex …

ICLab: A global, longitudinal internet censorship measurement platform

AA Niaki, S Cho, Z Weinberg, NP Hoang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Researchers have studied Internet censorship for nearly as long as attempts to censor
contents have taken place. Most studies have however been limited to a short period of time …

How Great is the Great Firewall? Measuring China's {DNS} Censorship

NP Hoang, AA Niaki, J Dalek, J Knockel, P Lin… - 30th USENIX Security …, 2021 - usenix.org
The DNS filtering apparatus of China's Great Firewall (GFW) has evolved considerably over
the past two decades. However, most prior studies of China's DNS filtering were performed …

[PDF][PDF] Decentralized control: A case study of russia

R Ramesh, RS Raman, M Bernhard… - Network and …, 2020 - par.nsf.gov
Until now, censorship research has largely focused on highly centralized networks that rely
on government-run technical choke-points, such as the Great Firewall of China. Although it …

On the Importance of {Encrypted-SNI}({{{{{ESNI}}}}}) to Censorship Circumvention

Z Chai, A Ghafari, A Houmansadr - 9th USENIX Workshop on Free and …, 2019 - usenix.org
With the increasing use of TLS encryption over web traffic, censors start to deploy SNI
filtering for more effective censorship. Specifically, a censor can identify the web domain …

[PDF][PDF] VPNalyzer: systematic investigation of the VPN ecosystem

R Ramesh, L Evdokimov, D Xue… - Network and Distributed …, 2022 - reethika.info
Use of Virtual Private Networks (VPNs) has been growing rapidly due to increased public
awareness of online risks to privacy and security. This growth has fueled the VPN ecosystem …

[PDF][PDF] Measuring the Deployment of Network Censorship Filters at Global Scale.

RS Raman, A Stoll, J Dalek, R Ramesh, W Scott… - NDSS, 2020 - pdfs.semanticscholar.org
Measuring the Deployment of Network Censorship Filters at Global Scale Page 1 Measuring the
Deployment of Network Censorship Filters at Global Scale Ram Sundara Raman1, Adrian …

Weaponizing middleboxes for {TCP} reflected amplification

K Bock, A Alaraj, Y Fax, K Hurley, E Wustrow… - 30th USENIX Security …, 2021 - usenix.org
Reflective amplification attacks are a powerful tool in the arsenal of a DDoS attacker, but to
date have almost exclusively targeted UDP-based protocols. In this paper, we demonstrate …