SOK: Making sense of censorship resistance systems

S Khattak, MT Elahi, L Simon… - Water Treatment …, 2016 - research.ed.ac.uk
An increasing number of countries implement Internet censorship at different scales and for
a variety of reasons. Several censorship resistance systems (CRSs) have emerged to help …

Secure asymmetry and deployability for decoy routing systems

C Bocovich, I Goldberg - Proceedings on Privacy Enhancing …, 2018 - petsymposium.org
Censorship circumvention is often characterized as a cat-and-mouse game between a
nation-state censor and the developers of censorship resistance systems. Decoy routing …

[PDF][PDF] Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory.

M Nasr, S Farhang, A Houmansadr, J Grossklags - NDSS, 2019 - freehaven.net
A core technique used by popular proxy-based circumvention systems like Tor is to privately
and selectively distribute the IP addresses of circumvention proxies among censored clients …

Systemization of pluggable transports for censorship resistance

S Khattak, L Simon, SJ Murdoch - arXiv preprint arXiv:1412.7448, 2014 - arxiv.org
An increasing number of countries implement Internet censorship at different scales and for
a variety of reasons. In particular, the link between the censored client and entry point to the …

[PDF][PDF] Slipping past the cordon: A systematization of Internet censorship resistance

T Elahi, CM Swanson, I Goldberg - Centre for Applied …, 2015 - cacr.uwaterloo.ca
The Internet censorship conflict is like a game of cat-and-mouse, in which the censor
discovers and acts on distinguishers that set the usage of censorship resistance systems …

Characterization of Internet censorship from multiple perspectives

S Khattak - 2017 - cl.cam.ac.uk
Internet censorship is rampant, both under the support of nation states and private actors,
with important socio-economic and policy implications. Yet many issues around Internet …

Recipes for Resistance: A Censorship circumvention cookbook

C Bocovich - 2018 - uwspace.uwaterloo.ca
The increasing centralization of Internet infrastructure and web services, along with
advancements in the application of machine learning techniques to analyze and classify …

[PDF][PDF] The Rise and Fall of Complex Family Structures: Coalition Formation, Stability, and Power Struggle.

A Brilliantova, A Pletenev, H Hosseini - AAMAS, 2019 - faculty.ist.psu.edu
ABSTRACT A complex family is a particular case of family structures in certain animal
groups that arises from cooperative breeding. Inspired by this phenomenon, we study the …

[PDF][PDF] The road not taken: Secure asymmetry and deployability for decoy routing systems

C Bocovich, I Goldberg - cacr.uwaterloo.ca
Censorship circumvention is often characterized as an arms race between a nation-state
censor and the developers of censorship resistance systems. Decoy routing systems offer a …

Evaluation of HTML Tag Susceptibility to Statistical Fingerprinting for Use in Censorship Evasion

KS French - 2016 - mavmatrix.uta.edu
The ability to speak freely has always been a source of conflict between rulers and the
people over which they exert power. This conflict usually takes the form of State-sponsored …