Geneva: Evolving censorship evasion strategies K Bock, G Hughey, X Qiang, D Levin Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 78 | 2019 |
{unCaptcha}: A {Low-Resource} Defeat of {reCaptcha's} Audio Challenge K Bock, D Patel, G Hughey, D Levin 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017 | 71 | 2017 |
Weaponizing Middleboxes for TCP Reflected Amplification K Bock, A Alaraj, Y Fax, K Hurley, E Wustrow, D Levin 30th USENIX Security Symposium (USENIX Security 21), 2021 | 45 | 2021 |
How the Great Firewall of China detects and blocks fully encrypted traffic M Wu, J Sippe, D Sivakumar, J Burg, P Anderson, X Wang, K Bock, ... 32nd USENIX Security Symposium (USENIX Security 23), 2653-2670, 2023 | 44 | 2023 |
King of the hill: A novel cybersecurity competition for teaching penetration testing K Bock, G Hughey, D Levin 2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018 | 43 | 2018 |
Detecting and evading {Censorship-in-Depth}: A case study of {Iran’s} protocol whitelister K Bock, Y Fax, K Reese, J Singh, D Levin 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20), 2020 | 35 | 2020 |
Come as you are: Helping unmodified clients bypass censorship with server-side evasion K Bock, G Hughey, LH Merino, T Arya, D Liscinsky, R Pogosian, D Levin Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | 29 | 2020 |
Measuring and evading turkmenistan’s internet censorship: A case study in large-scale measurements of a low-penetration country S Nourin, V Tran, X Jiang, K Bock, N Feamster, NP Hoang, D Levin Proceedings of the ACM Web Conference 2023, 1969-1979, 2023 | 21 | 2023 |
Even censors have a backup: Examining china's double https censorship middleboxes K Bock, G Naval, K Reese, D Levin Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications …, 2021 | 21 | 2021 |
Application of routine activity theory to cyber intrusion location and time K Bock, S Shannon, Y Movahedi, M Cukier 2017 13th European Dependable Computing Conference (EDCC), 139-146, 2017 | 21 | 2017 |
Exposing and Circumventing China’s Censorship of ESNI K Bock, iyouport, Anonymous, D Merino, Louis-Henri, Fifield, ... https://geneva.cs.umd.edu/posts/china-censors-esni/esni/, 2020 | 20* | 2020 |
{GET}/out: Automated discovery of {Application-Layer} censorship evasion strategies M Harrity, K Bock, F Sell, D Levin 31st USENIX Security Symposium (USENIX Security 22), 465-483, 2022 | 14 | 2022 |
Your censor is my censor: Weaponizing censorship infrastructure for availability attacks K Bock, P Bharadwaj, J Singh, D Levin 2021 IEEE Security and Privacy Workshops (SPW), 398-409, 2021 | 12 | 2021 |
iyouport, Anonymous, L K Bock H. Merino, D. Fifield, A. Houmansadr, and D. Levin,“Exposing and …, 2020 | 7 | 2020 |
A global measurement of routing loops on the Internet A Alaraj, K Bock, D Levin, E Wustrow International Conference on Passive and Active Network Measurement, 373-399, 2023 | 6 | 2023 |
Global, passive detection of connection tampering R Sundara Raman, LH Merino, K Bock, M Fayed, D Levin, N Sullivan, ... Proceedings of the ACM SIGCOMM 2023 Conference, 622-636, 2023 | 3 | 2023 |
Towards a Comprehensive Understanding of Russian Transit Censorship A Ortwein, K Bock, D Levin Workshop on Free and Open Communication on the Internet (FOCI), 2023 | 1 | 2023 |
Detecting network interference without endpoint participation S Nourin, K Bock, NP Hoang, D Levin Free and Open Communications on the Internet, 2023 | 1 | 2023 |
Automating the censorship arms race K Bock, D Levin XRDS: Crossroads, The ACM Magazine for Students 27 (2), 30-35, 2020 | 1 | 2020 |
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies N Tran, K Bock, D Levin Free and Open Communications on the Internet, 2023 | | 2023 |