Censored planet: An internet-wide, longitudinal censorship observatory

R Sundara Raman, P Shenoy, K Kohls… - proceedings of the 2020 …, 2020 - dl.acm.org
Remote censorship measurement techniques offer capabilities for monitoring Internet
reachability around the world. However, operating these techniques continuously is labor …

[HTML][HTML] OpenVPN is open to VPN fingerprinting

D Xue, R Ramesh, A Jain, M Kallitsis… - Communications of the …, 2025 - dl.acm.org
VPN adoption has seen steady growth over the past decade due to increased public
awareness of privacy and surveillance threats. In response, certain governments are …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

{GFWeb}: Measuring the Great Firewall's Web Censorship at Scale

NP Hoang, J Dalek, M Crete-Nishihata… - 33rd USENIX Security …, 2024 - usenix.org
Censorship systems such as the Great Firewall (GFW) have been continuously refined to
enhance their filtering capabilities. However, most prior studies, and in particular the GFW …

Meteor: Cryptographically secure steganography for realistic distributions

G Kaptchuk, TM Jois, M Green, AD Rubin - Proceedings of the 2021 …, 2021 - dl.acm.org
Despite a long history of research and wide-spread applications to censorship resistant
systems, practical steganographic systems capable of embedding messages into realistic …

Investigating large scale https interception in kazakhstan

RS Raman, L Evdokimov, E Wurstrow… - Proceedings of the …, 2020 - dl.acm.org
Increased adoption of HTTPS has created a largely encrypted web, but these security gains
are on a collision course with governments that desire visibility into and control over user …

Weaponizing middleboxes for {TCP} reflected amplification

K Bock, A Alaraj, Y Fax, K Hurley, E Wustrow… - 30th USENIX Security …, 2021 - usenix.org
Reflective amplification attacks are a powerful tool in the arsenal of a DDoS attacker, but to
date have almost exclusively targeted UDP-based protocols. In this paper, we demonstrate …

Network measurement methods for locating and examining censorship devices

RS Raman, M Wang, J Dalek, J Mayer… - Proceedings of the 18th …, 2022 - dl.acm.org
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …

Network responses to Russia's invasion of Ukraine in 2022: a cautionary tale for internet freedom

R Ramesh, RS Raman, A Virkud, A Dirksen… - 32nd USENIX Security …, 2023 - usenix.org
Russia's invasion of Ukraine in February 2022 was followed by sanctions and restrictions: by
Russia against its citizens, by Russia against the world, and by foreign actors against …

A large-scale investigation into geodifferences in mobile apps

R Kumar, A Virkud, RS Raman, A Prakash… - 31st USENIX Security …, 2022 - usenix.org
Recent studies on the web ecosystem have been raising alarms on the increasing
geodifferences in access to Internet content and services due to Internet censorship and …