{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention

PTJ Kon, S Kamali, J Pei, D Barradas, A Chen… - 33rd USENIX Security …, 2024 - usenix.org
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …

Bypassing tor exit blocking with exit bridge onion services

Z Zhang, W Zhou, M Sherr - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Tor exit blocking, in which websites disallow clients arriving from Tor, is a growing and
potentially existential threat to the anonymity network. This paper introduces HebTor, a new …

Large-scale evaluation of malicious tor hidden service directory discovery

C Wang, Z Ling, W Wu, Q Chen… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Tor is the largest anonymous communication system, providing anonymous communication
services to approximately 2.8 million users and 170,000 hidden services per day. The Tor …

Holes in the Geofence: Privacy Vulnerabilities in" Smart" DNS Services

RA Fainchtein, AJ Aviv, M Sherr, S Ribaudo… - arXiv preprint arXiv …, 2020 - arxiv.org
Smart DNS (SDNS) services advertise access to" geofenced" content (typically, video
streaming sites such as Netflix or Hulu) that is normally inaccessible unless the client is …

Universal perturbation for flow correlation attack on tor

J Tian, G Gou, Y Guan, W Xia… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Tor is a popular anonymous social network. However, it is also concerned by censors or
other malicious attackers. A large body of work examines Tor's susceptibility to flow …

Connecting the Dots in the Sky: Website Fingerprinting in Low Earth Orbit Satellite Internet

P Singh, D Barradas, T Elahi, N Limam - 2024 - uwspace.uwaterloo.ca
Despite the implementation of encrypted channels, such as those offered by anonymity
networks like Tor, network adversaries have demonstrated the ability to compromise users' …

A Study on Security Analysis of the Unlinkability in Tor

J Tian, G Gou, Y Guan, W Xia… - MILCOM 2021-2021 …, 2021 - ieeexplore.ieee.org
Tor is an important tool for anonymous communication. However, due to its popularity, Tor is
also concerned by censors or other malicious attackers. A large body of existing work …

[PDF][PDF] SpotProxy: Rediscovering the Cloud for Censorship Circumvention

PTJKS Kamali, J Pei, D Barradas, ACM Sherr, M Yung - cs.uwaterloo.ca
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …