2023
Issue 1
- Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation
[PDF]
Mizhang Streisand (GFW Report), Eric Wustrow (University of Colorado Boulder), Amir Houmansadr (University of Massachusetts, Amherst)
- Chasing Shadows: A security analysis of the ShadowTLS proxy
[PDF]
Gaukas Wang (University of Colorado Boulder), Anonymous (Anonymous Institution), Jackson Sippe (University of Colorado Boulder), Hai Chi (Anonymous Institution), Eric Wustrow (University of Colorado Boulder)
- Advancing the Art of Censorship Data Analysis
[PDF]
Ram Sundara Raman (University of Michigan), Apurva Virkud (University of Michigan), Sarah Laplante (Google Jigsaw), Vinicius Fortuna (Google Jigsaw), Roya Ensafi (University of Michigan)
- Security Notions for Fully Encrypted Protocols
[PDF]
Ellis Fenske (U.S. Naval Academy), Aaron Johnson (U.S. Naval Research Laboratory)
- Automated Detection of IPv6 Privacy Leakage in Home Networks
[PDF]
Ali Zohaib (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)
- CensorWatch: On the Implementation of Online Censorship in India
[PDF]
Divyank Katira (Centre for Internet and Society), Gurshabad Grover, Kushagra Singh, Varun Bansal
- Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law
[PDF]
Mona Wang (Princeton University), Jonathan Mayer (Princeton University)
Issue 2
- A Worldwide View of Nation-state Internet Censorship
[PDF]
Alexander Master (Purdue University), Christina Garman (Purdue University)
- The Use of Push Notification in Censorship Circumvention
[PDF]
Diwen Xue (University of Michigan), Roya Ensafi (University of Michigan)
- Detecting Network Interference Without Endpoint Participation
[PDF]
Sadia Nourin (University of Maryland), Kevin Bock (University of Maryland), Nguyen Phong Hoang (University of Chicago), Dave Levin (University of Maryland)
- Running a high-performance pluggable transports Tor bridge
[PDF]
David Fifield, Linus Nordberg
- Towards a Comprehensive Understanding of Russian Transit Censorship
[PDF]
Aaron Ortwein (University of Maryland), Kevin Bock (University of Maryland), Dave Levin (University of Maryland)
- Proteus: Programmable Protocols for Censorship Circumvention
[PDF]
Ryan Wails (U.S. Naval Research Laboratory and Georgetown University), Rob Jansen (U.S. Naval Research Laboratory), Aaron Johnson (U.S. Naval Research Laboratory), Micah Sherr (Georgetown University)
- Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
[PDF]
Watson Jia (Princeton University), Joseph Eichenhofer (Dropbox), Liang Wang (Princeton University), Prateek Mittal (Princeton University)
- Rethinking Realistic Adversaries for Anonymous Communication Systems
[PDF]
Kevin Gallagher (NOVA LINCS, NOVA School of Science and Technology), Diogo Barradas (University of Waterloo), Nuno Santos (INESC-ID and Instituto Superior Técnico)
- Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies
[PDF]
Nhi Tran (University of Maryland), Kevin Bock (University of Maryland), Dave Levin (University of Maryland)