Censored planet: An internet-wide, longitudinal censorship observatory

R Sundara Raman, P Shenoy, K Kohls… - proceedings of the 2020 …, 2020‏ - dl.acm.org
Remote censorship measurement techniques offer capabilities for monitoring Internet
reachability around the world. However, operating these techniques continuously is labor …

ZDNS: a fast DNS toolkit for internet measurement

L Izhikevich, G Akiwate, B Berger… - Proceedings of the …, 2022‏ - dl.acm.org
Active DNS measurement is fundamental to understanding and improving the DNS
ecosystem. However, the absence of an extensible, high-performance, and easy-to-use …

[HTML][HTML] OpenVPN is open to VPN fingerprinting

D Xue, R Ramesh, A Jain, M Kallitsis… - Communications of the …, 2025‏ - dl.acm.org
VPN adoption has seen steady growth over the past decade due to increased public
awareness of privacy and surveillance threats. In response, certain governments are …

Network responses to Russia's invasion of Ukraine in 2022: a cautionary tale for internet freedom

R Ramesh, RS Raman, A Virkud, A Dirksen… - 32nd USENIX Security …, 2023‏ - usenix.org
Russia's invasion of Ukraine in February 2022 was followed by sanctions and restrictions: by
Russia against its citizens, by Russia against the world, and by foreign actors against …

Investigating large scale HTTPS interception in Kazakhstan

RS Raman, L Evdokimov, E Wurstrow… - Proceedings of the …, 2020‏ - dl.acm.org
Increased adoption of HTTPS has created a largely encrypted web, but these security gains
are on a collision course with governments that desire visibility into and control over user …

Fingerprinting Obfuscated Proxy Traffic with Encapsulated {TLS} Handshakes

D Xue, M Kallitsis, A Houmansadr… - 33rd USENIX Security …, 2024‏ - usenix.org
The global escalation of Internet censorship by nation-state actors has led to an ongoing
arms race between censors and obfuscated circumvention proxies. Research over the past …

Poking a hole in the wall: Efficient censorship-resistant Internet communications by parasitizing on WebRTC

D Barradas, N Santos, L Rodrigues… - Proceedings of the 2020 …, 2020‏ - dl.acm.org
Many censorship circumvention tools rely on trusted proxies that allow users within
censored regions to access blocked Internet content by tunneling it through a covert channel …

Network measurement methods for locating and examining censorship devices

RS Raman, M Wang, J Dalek, J Mayer… - Proceedings of the 18th …, 2022‏ - dl.acm.org
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …

Re‐Defining Borders Online: Russia's Strategic Narrative on Internet Sovereignty

A Litvinenko - Media and Communication, 2021‏ - refubium.fu-berlin.de
Over the past decades, internet governance has developed in a tug-of-war between the
democratic, transnational nature of the web, and attempts by national governments to put …

Website blocking in the European Union: Network interference from the perspective of Open Internet

V Ververis, L Lasota, T Ermakova, B Fabian - Policy & Internet, 2024‏ - Wiley Online Library
By establishing an infrastructure for monitoring and blocking networks in accordance with
European Union (EU) law on preventive measures against the spread of information, EU …