{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention

PTJ Kon, S Kamali, J Pei, D Barradas, A Chen… - 33rd USENIX Security …, 2024 - usenix.org
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …

Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape

D Xue, A Ablove, R Ramesh, GK Danciu… - 33rd USENIX Security …, 2024 - usenix.org
The ecosystem of censorship circumvention tools (CTs) remains one of the most opaque
and least understood, overshadowed by the precarious legal status around their usage and …

Global, passive detection of connection tampering

R Sundara Raman, LH Merino, K Bock… - Proceedings of the …, 2023 - dl.acm.org
In-network devices around the world monitor and tamper with connections for many reasons,
including intrusion prevention, combating spam or phishing, and country-level censorship …

Digital discrimination of users in sanctioned states: the case of the cuba embargo

A Ablove, S Chandrashekaran, H Le… - 33rd USENIX Security …, 2024 - usenix.org
We present one of the first in-depth and systematic end-user centered investigations into the
effects of sanctions on geoblocking, specifically in the case of Cuba. We conduct network …

Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies

EP Vafa, M Singhal, P Thota, SS Roy - 2025 IEEE Symposium on …, 2024 - computer.org
During periods of strict internet censorship, maintaining access to online information and
communication becomes paramount. However, users often have to navigate complicated …

Understanding Routing-Induced Censorship Changes Globally

A Bhaskar, P Pearce - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Internet censorship is pervasive, with significant effort dedicated to understanding what is
censored, and where. Prior censorship measurements however have identified significant …

Getting bored of cyberwar: Exploring the role of civilian hacktivists in the Russia-Ukraine conflict

AV Vu, DR Thomas, B Collier, A Hutchings… - arxiv preprint arxiv …, 2022 - arxiv.org
There has been substantial commentary on the role of cyberattacks and civilian hacktivists in
the Russia-Ukraine conflict. Drawing on a range of data sources, we argue that the widely …

Getting bored of cyberwar: exploring the role of low-level cybercrime actors in the Russia-Ukraine conflict

AV Vu, DR Thomas, B Collier, A Hutchings… - Proceedings of the …, 2024 - dl.acm.org
There has been substantial commentary on the role of cyberattacks carried out by low-level
cybercrime actors in the Russia-Ukraine conflict. We analyse 358k website defacement …

Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels

A Vilalonga, JS Resende… - Free and Open …, 2024 - petsymposium.org
Many censorship evasion systems rely on establishing a connection between the user and a
proxy that acts as the gateway to censored content. However, informing the user about proxy …

Why ET Can't Phone Home: A Global View on IP-based Geoblocking at VoWiFi

GK Gegenhuber, PÉ Frenzel, E Weippl - Proceedings of the 22nd Annual …, 2024 - dl.acm.org
In current cellular network generations (4G, 5G) the IMS (IP Multimedia Subsystem) plays an
integral role in terminating voice calls and short messages. Many operators use VoWiFi …