Content delivery network security: A survey

M Ghaznavi, E Jalalpour… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
A content delivery network (CDN) is a distributed infrastructure to deliver digital contents to
end users with high performance. CDNs are critical to provide and protect the availability of …

How the Great Firewall of China detects and blocks fully encrypted traffic

M Wu, J Sippe, D Sivakumar, J Burg… - 32nd USENIX Security …, 2023 - usenix.org
One of the cornerstones in censorship circumvention is fully encrypted protocols, which
encrypt every byte of the payload in an attempt to “look like nothing”. In early November …

A long way to the top: Significance, structure, and stability of internet top lists

Q Scheitle, O Hohlfeld, J Gamba, J Jelten… - Proceedings of the …, 2018 - dl.acm.org
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …

{GFWeb}: Measuring the Great Firewall's Web Censorship at Scale

NP Hoang, J Dalek, M Crete-Nishihata… - 33rd USENIX Security …, 2024 - usenix.org
Censorship systems such as the Great Firewall (GFW) have been continuously refined to
enhance their filtering capabilities. However, most prior studies, and in particular the GFW …

TSPU: Russia's decentralized censorship system

D Xue, B Mixon-Baca, ValdikSS, A Ablove… - Proceedings of the …, 2022 - dl.acm.org
Russia's Sovereign RuNet was designed to build a Russian national firewall. Previous
anecdotes and isolated events in the past two years reflected centrally coordinated …

On the importance of {Encrypted-SNI}({{{{{ESNI}}}}}) to censorship circumvention

Z Chai, A Ghafari, A Houmansadr - 9th USENIX Workshop on Free and …, 2019 - usenix.org
With the increasing use of TLS encryption over web traffic, censors start to deploy SNI
filtering for more effective censorship. Specifically, a censor can identify the web domain …

Measuring and evading turkmenistan's internet censorship: A case study in large-scale measurements of a low-penetration country

S Nourin, V Tran, X Jiang, K Bock, N Feamster… - Proceedings of the …, 2023 - dl.acm.org
Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters
without Borders due to its extensively censored Internet and strictly regulated information …

Fingerprinting Obfuscated Proxy Traffic with Encapsulated {TLS} Handshakes

D Xue, M Kallitsis, A Houmansadr… - 33rd USENIX Security …, 2024 - usenix.org
The global escalation of Internet censorship by nation-state actors has led to an ongoing
arms race between censors and obfuscated circumvention proxies. Research over the past …

Poking a hole in the wall: Efficient censorship-resistant Internet communications by parasitizing on WebRTC

D Barradas, N Santos, L Rodrigues… - Proceedings of the 2020 …, 2020 - dl.acm.org
Many censorship circumvention tools rely on trusted proxies that allow users within
censored regions to access blocked Internet content by tunneling it through a covert channel …

Geneva: Evolving censorship evasion strategies

K Bock, G Hughey, X Qiang, D Levin - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading
to increasingly sophisticated Internet-scale censorship techniques and methods to evade …