Network responses to Russia's invasion of Ukraine in 2022: a cautionary tale for internet freedom

R Ramesh, RS Raman, A Virkud, A Dirksen… - 32nd USENIX Security …, 2023 - usenix.org
Russia's invasion of Ukraine in February 2022 was followed by sanctions and restrictions: by
Russia against its citizens, by Russia against the world, and by foreign actors against …

Fingerprinting Obfuscated Proxy Traffic with Encapsulated {TLS} Handshakes

D Xue, M Kallitsis, A Houmansadr… - 33rd USENIX Security …, 2024 - usenix.org
The global escalation of Internet censorship by nation-state actors has led to an ongoing
arms race between censors and obfuscated circumvention proxies. Research over the past …

" All of them claim to be the best": Multi-perspective study of {VPN} users and {VPN} providers

R Ramesh, A Vyas, R Ensafi - 32nd USENIX Security Symposium …, 2023 - usenix.org
As more users adopt VPNs for a variety of reasons, it is important to develop empirical
knowledge of their needs and mental models of what a VPN offers. Moreover, studying VPN …

Bypassing tunnels: Leaking {VPN} client traffic by abusing routing tables

N Xue, Y Malla, Z **a, C Pöpper… - 32nd USENIX Security …, 2023 - usenix.org
Virtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users'
security and privacy, and are used in professional and personal settings to defend against …

AAE-DSVDD: A one-class classification model for VPN traffic identification

S Lv, C Wang, Z Wang, S Wang, B Wang, Y Zhang - Computer Networks, 2023 - Elsevier
Abstract Virtual Private Network (VPN) can provide a concealed transmission channel for
communication and protect the privacy of users. However, it also brings hidden dangers to …

AppSniffer: Towards robust mobile app fingerprinting against VPN

S Oh, M Lee, H Lee, E Bertino, H Kim - Proceedings of the ACM Web …, 2023 - dl.acm.org
Application fingerprinting is a useful data analysis technique for network administrators,
marketing agencies, and security analysts. For example, an administrator can adopt …

[HTML][HTML] A novel dataset for encrypted virtual private network traffic analysis

M Naas, J Fesl - Data in Brief, 2023 - Elsevier
Encryption of network traffic should guarantee anonymity and prevent potential interception
of information. Encrypted virtual private networks (VPNs) are designed to create special data …

Identifying VPN Servers through Graph-Represented Behaviors

C Wang, J Yin, Z Li, H Xu, Z Zhang, Q Liu - Proceedings of the ACM Web …, 2024 - dl.acm.org
Identifying VPN servers is a crucial task in various situations, such as geo-fraud detection,
bot traffic analysis and network attack identification. Although numerous studies that focus …

Bytes to schlep? Use a FEP: Hiding protocol metadata with fully encrypted protocols

E Fenske, A Johnson - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Fully Encrypted Protocols (FEPs) have arisen in practice as a technique to avoid network
censorship. Such protocols are designed to produce messages that appear completely …

A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges

S Wendzel, S Volpert, S Zillien, J Lenz, P Rünz… - arxiv preprint arxiv …, 2025 - arxiv.org
Internet censorship limits the access of nodes residing within a specific network environment
to the public Internet, and vice versa. During the last decade, techniques for conducting …