Censored planet: An internet-wide, longitudinal censorship observatory
Remote censorship measurement techniques offer capabilities for monitoring Internet
reachability around the world. However, operating these techniques continuously is labor …
reachability around the world. However, operating these techniques continuously is labor …
[HTML][HTML] OpenVPN is open to VPN fingerprinting
VPN adoption has seen steady growth over the past decade due to increased public
awareness of privacy and surveillance threats. In response, certain governments are …
awareness of privacy and surveillance threats. In response, certain governments are …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
{GFWeb}: Measuring the Great Firewall's Web Censorship at Scale
Censorship systems such as the Great Firewall (GFW) have been continuously refined to
enhance their filtering capabilities. However, most prior studies, and in particular the GFW …
enhance their filtering capabilities. However, most prior studies, and in particular the GFW …
Meteor: Cryptographically secure steganography for realistic distributions
Despite a long history of research and wide-spread applications to censorship resistant
systems, practical steganographic systems capable of embedding messages into realistic …
systems, practical steganographic systems capable of embedding messages into realistic …
Investigating large scale https interception in kazakhstan
RS Raman, L Evdokimov, E Wurstrow… - Proceedings of the …, 2020 - dl.acm.org
Increased adoption of HTTPS has created a largely encrypted web, but these security gains
are on a collision course with governments that desire visibility into and control over user …
are on a collision course with governments that desire visibility into and control over user …
Weaponizing middleboxes for {TCP} reflected amplification
Reflective amplification attacks are a powerful tool in the arsenal of a DDoS attacker, but to
date have almost exclusively targeted UDP-based protocols. In this paper, we demonstrate …
date have almost exclusively targeted UDP-based protocols. In this paper, we demonstrate …
Network measurement methods for locating and examining censorship devices
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …
censorship devices that can perform large-scale, highly-performant content blocking. While …
Network responses to Russia's invasion of Ukraine in 2022: a cautionary tale for internet freedom
Russia's invasion of Ukraine in February 2022 was followed by sanctions and restrictions: by
Russia against its citizens, by Russia against the world, and by foreign actors against …
Russia against its citizens, by Russia against the world, and by foreign actors against …
A large-scale investigation into geodifferences in mobile apps
Recent studies on the web ecosystem have been raising alarms on the increasing
geodifferences in access to Internet content and services due to Internet censorship and …
geodifferences in access to Internet content and services due to Internet censorship and …