Network measurement methods for locating and examining censorship devices

RS Raman, M Wang, J Dalek, J Mayer… - Proceedings of the 18th …, 2022 - dl.acm.org
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …

TSPU: Russia's decentralized censorship system

D Xue, B Mixon-Baca, ValdikSS, A Ablove… - Proceedings of the …, 2022 - dl.acm.org
Russia's Sovereign RuNet was designed to build a Russian national firewall. Previous
anecdotes and isolated events in the past two years reflected centrally coordinated …

Investigating package related security threats in software registries

Y Gu, L Ying, Y Pu, X Hu, H Chai… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Package registries host reusable code assets, allowing developers to share and reuse
packages easily, thus accelerating the software development process. Current software …

Measuring and evading turkmenistan's internet censorship: A case study in large-scale measurements of a low-penetration country

S Nourin, V Tran, X Jiang, K Bock, N Feamster… - Proceedings of the …, 2023 - dl.acm.org
Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters
without Borders due to its extensively censored Internet and strictly regulated information …

{DeResistor}: Toward {Detection-Resistant} Probing for Evasion of Internet Censorship

A Amich, B Eshete, V Yegneswaran… - 32nd USENIX Security …, 2023 - usenix.org
The arms race between Internet freedom advocates and censors has catalyzed the
emergence of sophisticated blocking techniques and directed significant research emphasis …

Domain name encryption is not enough: Privacy leakage via IP-based website fingerprinting

NP Hoang, AA Niaki, P Gill, M Polychronakis - arXiv preprint arXiv …, 2021 - arxiv.org
Although the security benefits of domain name encryption technologies such as DNS over
TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their …

Target acquired? Evaluating target generation algorithms for IPv6

L Steger, L Kuang, J Zirngibl, G Carle… - 2023 7th Network …, 2023 - ieeexplore.ieee.org
Internet measurements are a crucial foundation of IPv6-related research. Due to the
infeasibility of full address space scans for IPv6 however, those measurements rely on …

Metis: understanding and enhancing in-network regular expressions

Z Zhang, Y Huang, G Duan, Q Li… - Advances in …, 2024 - proceedings.neurips.cc
Regular expressions (REs) offer one-shot solutions for many networking tasks, eg, network
intrusion detection. However, REs purely rely on expert knowledge and cannot utilize …

Measuring the accessibility of domain name encryption and its impact on internet filtering

NP Hoang, M Polychronakis, P Gill - International Conference on Passive …, 2022 - Springer
Most online communications rely on DNS to map domain names to their hosting IP address
(es). Previous work has shown that DNS-based network interference is widespread due to …

Certainty: Detecting dns manipulation at scale using tls certificates

E Tsai, D Kumar, RS Raman, G Li, Y Eiger… - arXiv preprint arXiv …, 2023 - arxiv.org
DNS manipulation is an increasingly common technique used by censors and other network
adversaries to prevent users from accessing restricted Internet resources and hijack their …