
REFERENCES
[1]
A, S., A, H., H, J. A. Internet censorship in Iran : A rst
look. In Proceedings of the 3rd USENIX Workshop on Free and Open Communications
on the Internet (Washington, DC, USA, 2013).
[2]
B, D. Protozoa code repository. https://github.com/dmbb/Protozoa,
2020. Accessed: 2020-08-20.
[3]
B, D., S, N., R, L. Deltashaper: Enabling unob-
servable censorship-resistant tcp tunneling over videoconferencing streams. In
Proceedings on Privacy Enhancing Technologies (Minneapolis, MN, USA, 2017),
vol. 2017(4), pp. 5–22.
[4]
B, D., S, N., R, L. Eective detection of multimedia
protocol tunneling using machine learning. In Proceedings of the 27th USENIX
Security Symposium (Baltimore, MD, USA, 2018).
[5]
B, M., MG, D., N, M., C, E., N, K. The
secure real-time transport protocol (srtp). RFC 3711, March 2004.
[6]
B, K., H, G., Q, X., L, D. Geneva: Evolving censorship
evasion strategies. In Proceedings of the ACM SIGSAC Conference on Computer
and Communications Security (London, UK, 2019), pp. 2199–2214.
[7]
B, C., G, I. Slitheen: Perfectly imitated decoy routing
through trac replacement. In Proceedings of the 2016 ACM SIGSAC Conference
on Computer and Communications Security (Vienna, Austria, 2016), pp. 1702–1714.
[8]
B, C., G, I. Secure asymmetry and deployability for decoy
routing systems. In Proceedings on Privacy Enhancing Technologies (Barcelona,
Spain, 2018), vol. 2018 (3), pp. 43–62.
[9]
B, C., H, A., S,V. Cloudtransport: Using cloud
storage for censorship-resistant networking. In Privacy Enhancing Technologies,
vol. 8555 of Lecture Notes in Computer Science. Springer International Publishing,
2014, pp. 1–20.
[10]
C C R. Report says China internet rms censored coronavirus
terms, criticism early in outbreak. https://www.reuters.com/article/us-health-
coronavirus-china- censorship/report-says- china-internet- rms-censored-
corona vir us-ter ms- c rit icism - ear ly- in - outbreak- i dUS KBN 20Q1V S, 2020.
Accessed: 2020-08-20.
[11]
C, A., C, T., C, M., DC, E., F, A.,
K, M. A. Censorship in the wild: Analyzing Internet ltering in Syria. In
Proceedings of the 2014 Conference on Internet Measurement Conference (Vancouver,
BC, Canada, 2014), pp. 285–298.
[12]
C, V., B, A., K, V. Anomaly detection: A survey. ACM
computing surveys (CSUR) 41, 3 (2009).
[13]
D, R. Obfsproxy: the next step in the censorship arms race. https:
//blog.torproject.org/blog/obfsproxy- next-step- censorship-arms- race, 2012.
Accessed: 2020-08-20.
[14]
D, D., K, E. The Menlo report: Ethical principles guiding
information and communication technology research. In U.S.Department of
Homeland Security, Tech. Rep. (2012).
[15]
D, K. P., C, S. E., R, T., S, T. Protocol misidenti-
cation made easy with format-transforming encryption. In Proceedings of the
2013 ACM SIGSAC Conference on Computer & Communications Security (Berlin,
Germany, 2013), pp. 61–72.
[16]
D, K. P., C, S. E., S, T. Marionette: A programmable
network-trac obfuscation system. In Proceedings of the 24th USENIX Conference
on Security Symposium (Washington, D.C., USA, 2015), pp. 367–382.
[17]
E, D., J, C., M, V., S, W. T., T, B., V W,
M., J, A. Rebound: Decoy routing on asymmetric routes via error
messages. In Proceedings of the 2015 IEEE 40th Conference on Local Computer
Networks (LCN) (Clearwater Beach, FL, USA, 2015), pp. 91–99.
[18]
E, R., F, D., W, P., F, N., W, N., P,
V. Examining how the great rewall discovers hidden circumvention servers.
In Proceedings of the 2015 ACM Conference on Internet Measurement Conference
(Tokyo, Japan, 2015), pp. 445–458.
[19]
F, T. Roc graphs: Notes and practical considerations for researchers.
Machine Learning 31 (01 2004), 1–38.
[20] FF. https://mpeg.org, 2000. Accessed: 2020-08-20.
[21]
F, D. Threat modeling and circumvention of Internet censorship. PhD thesis,
EECS Department, University of California, Berkeley, 2017.
[22]
F, D., H, N., E, J., S, E., B, D., D, R.,
P, P. Evading censorship with browser-based proxies. In Proceedings of
the 12th International Conference on Privacy Enhancing Technologies (Vigo, Spain,
2012), pp. 239–258.
[23]
F, D., L, C., H, R., W, P., P, V. Blocking-resistant
communication through domain fronting. In Proceedings on Privacy Enhancing
Technologies 2015.2 (Philadelphia, PA, USA, 2015), pp. 46–64.
[24]
F, S., D, F., S, W., MD, A., VS, B., H,
R., K, A., K, M., R, D. G., S, S., B, N., H
, A., W, E. An ISP-Scale Deployment of TapDance . In
Proceedings of the 7th USENIX Workshop on Free and Open Communications on
the Internet (Vancouver, BC, 2017).
[25]
F, S., W, J., T, S. C., H, J. A., B, N., W
, E. Conjure: Summoning proxies from unused address space. In Proceedings
of the 2019 ACM SIGSAC Conference on Computer and Communications Security
(London, United Kingdom, 2019), p. 2215–2229.
[26]
G, G., A, A., K, T. Internet censorship in Thailand:
User practices and potential threats. In Proceedings of the 2nd IEEE European
Symposium on Security & Privacy (Paris, France, 2017).
[27]
G, J., S, M., H, N. Cover your acks: Pitfalls of covert
channel censorship circumvention. In Proceedings of the 2013 ACM SIGSAC
Conference on Computer and Communications Security (Berlin, Germany, 2013),
pp. 361–372.
[28]
G D WRTC. Getting started with WebRTC. https://webrtc.o
rg/getting-started/overview, 2019. Accessed: 2020-08-20.
[29]
H, B., N, R., G, P., J, R. Games without frontiers:
Investigating video games as a covert channel. In 2016 IEEE European Symposium
on Security and Privacy (Saarbrucken, Germany, 2016), IEEE, pp. 63–77.
[30]
H, S. Network emulation with netem. 6th Linux and open source
conference for Australia and New Zealand - linux.conf.au (2005).
[31]
H, J. C. As China Cracks Down on Coronavirus Coverage, Journalists
Fight Back. https://www.nytimes.com/2020/03/14/business/media/coronavirus-
china-journalists.html, 2020. Accessed: 2020-08-20.
[32]
H, C., L, Z., G, E. Algorithmically bypassing
censorship on Sina Weibo with nondeterministic homophone substitutions. In
Proceedings of the 9th International Conference on Web and Social Media (Oxford,
UK, 2015), AAAI.
[33]
H, J., H, A. Cachebrowser: Bypassing chinese cen-
sorship without proxies using cached content. In Proceedings of the 22nd ACM
SIGSAC Conference on Computer and Communications Security (2015), pp. 70–83.
[34]
H, A., B, C., S, V. The parrot is dead: Ob-
serving unobservable network communications. In Proceedings of the 2013 IEEE
Symposium on Security and Privacy (San Francisco, CA, USA, 2013), pp. 65–79.
[35]
H, A., N, G. T., C, M., B, N. Cirripede:
Circumvention infrastructure using router redirection with plausible deniability.
In Proceedings of the 18th ACM Conference on Computer and Communications
Security (Chicago, IL, USA, 2011), pp. 187–200.
[36]
H, A., R, T. J., B, N., S, A. C. I want my voice to
be heard: IP over Voice-over-IP for unobservable censorship circumvention. In
Proceedings of the 20th Annual Network & Distributed System Security Symposium
(San Diego, CA, USA, 2013).
[37]
J, B., G, T., G, V., K, F., Z, G. Performance
evaluation of webrtc-based video conferencing. ACM SIGMETRICS Performance
Evaluation Review 45, 2 (2018), 56–68.
[38]
K, J., E, D., J, A., J, C., L, G., M, D.,
S, T. Decoy routing: Toward unblockable Internet communication. In
Proceedings of the USENIX Workshop on Free and Open Communications on the
Internet (San Francisco, CA, USA, 2011).
[39]
K, S., E, T., S, L., S, C. M., M, S. J., G
, I. Sok: Making sense of censorship resistance systems. In Proceedings on
Privacy Enhancing Technologies (Darmstadt, Germany, 2016), vol. 2016, pp. 37–61.
[40]
K, S., J, M., A, P. D., P, V. Towards illuminating a
censorship monitor’s model to facilitate evasion. In Proceedings of the 3rd USENIX
Workshop on Free and Open Communications on the Internet (Washington, D.C.,
USA, 2013).
[41]
K, G., P, J., R, M. E. Reverse-engineering censorship in china:
Randomized experimentation and participant observation. Science 345, 6199
(2014).
[42]
K, J., CN, M., N, J. Q., S, A., C, J. R.
Every rose has its thorn: Censorship and surveillance on social video platforms
in China. In Proceedings of the 5th USENIX Workshop on Free and Open Communi-
cations on the Internet (Washington, D.C., USA, 2015).
[43]
K, J., R, L., CN, M. An analysis of automatic image
ltering on wechat moments. In Proceedings of the 8th USENIX Workshop on Free
and Open Communications on the Internet (Baltimore, MD, USA, 2018).
[44]
K, K., H, T., K, D., P, C. SkypeLine: Robust hidden data
transmission for VoIP. In Proceedings of the 2016 ASIA Computer and Communi-
cations Security (Xi’an, China, 2016).
[45]
L, F., R, A., K, A. M., N, A. A., C, D., G, P.,
M, A. lib
•
erate,(n) a library for exposing (trac-classication) rules and
avoiding them eciently. In Proceedings of the Internet Measurement Conference
(London, UK, 2017), pp. 128–141.
[46]
L, S., S, M., H, N. Facet: Streaming over videoconferencing for
censorship circumvention. In Proceedings of the 13th Workshop on Privacy in the
Electronic Society (Scottsdale, AZ, USA, 2014), pp. 163–172.
[47]
L, S., R, S. P. Real-time communications in the web: Issues,
achievements, and ongoing standardization eorts. IEEE Internet Computing 16,
5 (2012), 68–73.
[48]
MG, D., R, E. Datagram transport layer security (dtls) extension
to establish keys for the secure real-time transport protocol (srtp). RFC 5764,
May 2010.
Session 1A: Anonymous Routing and Censorship
CCS '20, November 9–13, 2020, Virtual Event, USA