2016
DOI: 10.1515/popets-2016-0028
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Making Sense of Censorship Resistance Systems

Abstract: An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. In particular, the link between the censored client and entry point to the uncensored network is a frequent target of censorship due to the ease with which a nation-state censor can control it. A number of censorship resistance systems have been developed thus far to help circumvent blocking on this link, which we refer to as link circumvention systems (LCs). The variety and profusion of attack vec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(31 citation statements)
references
References 58 publications
0
31
0
Order By: Relevance
“…Yet, the censor can still disrupt access to subsequent queried domains (subdomains and thirdparties). We note that quality degradation is a strategy already used in the wild as a stealthy form of censorship [68].…”
Section: Censor Dns-blocking Strategymentioning
confidence: 99%
“…Yet, the censor can still disrupt access to subsequent queried domains (subdomains and thirdparties). We note that quality degradation is a strategy already used in the wild as a stealthy form of censorship [68].…”
Section: Censor Dns-blocking Strategymentioning
confidence: 99%
“…In 2013, tunneling loss-intolerant protocols over loss-tolerant cover channels, was shown [26] to allow censors to interfere with the channel safely, without disrupting intended use of cover-protocol. For details on observability and traffic analysis resistance of existing anti-censorship tools, reader can refer to Systematizations of Knowledge [33], [59]. lib•erate [37] is a library, that takes alternative approach, and instead of hiding the traffic, it features numerous techniques that use bugs in DPI to evade identification.…”
Section: Traffic Obfuscation Analysismentioning
confidence: 99%
“…Open HTTP Proxies: Users also resort to Open HTTP proxies and other censorship resistance systems to anonymize their traffic [16,42]. One of these services is VPN Gate, an open and free service analyzed by Nobori et al [23].…”
Section: Vpn-based Measurementsmentioning
confidence: 99%