CENSORS
generic Generic / not censor-specific
Use for technique papers that don't evaluate against a specific censor.
299 PAPERS ON FILE
- 2026-almutairi-server Server, Client, or Relay? Dual-Role Detection of Circumvention Relays
- 2026-fares-game The Game Has Changed: Revisiting proxy distribution and game theory
- 2026-jois-assemblage Assemblage: Chipping Away at Censorship with Generative Steganography
- 2026-kamali-huma Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement
- 2026-lange-towards Towards Automated DNS Censorship Circumvention
- 2026-lee-quicstep QUICstep: Evaluating connection migration based QUIC censorship circumvention
- 2026-lipphardt-dual Dual Standards: Examining Content Moderation Disparities Between API and WebUI Interfaces in Large Language Models
- 2026-ratliff-mirage Mirage: Private, Mobility-based Routing for Censorship Evasion
- 2026-sheffey-geedge Geedge Cases: Censorship Measurement Insights from the Geedge Networks Leak
- 2026-tolley-architectural Architectural VPN Vulnerabilities, Disclosure Fatigue, and Structural Failures
- 2026-zohaib-extended Extended Abstract: CensorAlert -- Leveraging LLM Agents for Automated Censorship Report Aggregation and Analysis
- 2025-h-ller-evaluating Evaluating Onion Address Collection Methods
- 2025-inyangson-amigo Amigo: Secure Group Mesh Messaging in Realistic Protest Settings
- 2025-kamali-anix Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing
- 2025-lipphardt-1-800-censorship 1-800-Censorship: Analyzing internet censorship data using the Internet Yellow Pages
- 2025-midtlien-fingerprint-resistant Fingerprint-resistant DTLS for usage in Snowflake
- 2025-mixon-baca-hidden Hidden Links: Analyzing Secret Families of VPN Apps
- 2025-niere-encrypted Encrypted Client Hello (ECH) in Censorship Circumvention
- 2025-niere-transport Transport Layer Obscurity: Circumventing SNI Censorship on the TLS Layer
- 2025-nourin-nobody Is Nobody There? Good! Globally Measuring Connection Tampering without Responsive Endhosts
- 2025-pereira-extended Extended Abstract: Traffic Shaping for Network Protocols: A Modular and Developer-Friendly Framework
- 2025-pereira-position Position Paper: A Case for Machine-Checked Verification of Circumvention Systems
- 2025-rodriguez-revisiting Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks
- 2025-sharma-cenpush CenPush: Blocking-Resistant Control Channel Using Push Notifications
- 2025-sheffey-extended Extended Abstract: I’ll Shake Your Hand: What Happens After DNS Poisoning
- 2025-sivan-sevilla-probing Probing the third-party infrastructure of digital news on the Web
- 2025-umesh-improved An Improved BGP Internet Graph for Optimizing Refraction Proxy Placement
- 2025-vafa-learning Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies
- 2025-vilalonga-extended Extended Abstract: Using TURN Servers for Censorship Evasion
- 2025-vines-extended Extended Abstract: Nobody’s Fault but Mine: Using Unauthenticated Unidirectional Pushes for Client Update
- 2025-wails-censorship Censorship Evasion with Unidentified Protocol Generation
- 2025-wang-custom Is Custom Congestion Control a Bad Idea for Circumvention Tools?
- 2025-wendzel-survey A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges
- 2025-wilson-extended Extended Abstract: Shaperd: Easily Adoptable Real-Time Traffic Shaper for Fully Encrypted Protocols
- 2025-wrana-sok-surveillance SoK: The Spectre of Surveillance and Censorship in Future Internet Architectures
- 2025-xue-discriminative The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic
- 2017-frolov-water-pluggable WATER: a programmable framework for pluggable transports
- 2024-ahmed-extended Extended Abstract: The Impact of Online Censorship on LLMs
- 2024-almutairi-fingerprinting Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model
- 2024-awwad-digital Digital Repression in Palestine
- 2024-bhaskar-understanding Understanding Routing-Induced Censorship Changes Globally
- 2024-bocovich-snowflake Snowflake, a censorship circumvention system using temporary WebRTC proxies
- 2024-calle-toward Toward Automated DNS Tampering Detection Using Machine Learning
- 2024-chen-extended Extended Abstract: Oscur0: One-shot Circumvention without Registration
- 2024-chi-just Just add WATER: WebAssembly-based Circumvention Transports
- 2024-durumeric-ten-years-zmap Ten Years of ZMap
- 2024-gao-extended Extended Abstract: Leveraging Large Language Models to Identify Internet Censorship through Network Data
- 2024-gosain-out Out in the Open: On the Implementation of Mobile App Filtering in India
- 2024-hanlon-detecting Detecting VPN Traffic through Encapsulated TCP Behavior
- 2024-holland-detorrent DeTorrent: An Adversarial Padding-only Traffic Analysis Defense
- 2024-kon-netshuffle NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge
- 2024-kon-spotproxy SpotProxy: Rediscovering the Cloud for Censorship Circumvention
- 2024-kujath-analyzing Analyzing Prominent Mobile Apps in Latin America
- 2024-lorimer-extended Extended Abstract: Traffic Splitting for Pluggable Transports
- 2024-m-ller-turning Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling
- 2024-mixon-baca-snitch Attacking Connection Tracking Frameworks as used by Virtual Private Networks
- 2024-moon-pryde Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments
- 2024-pu-exploring Exploring Amazon Simple Queue Service (SQS) for Censorship Circumvention
- 2024-ruo-lost Lost in Translation: Characterizing Automated Censorship in Online Translation Services
- 2024-tang-automatic Automatic Generation of Web Censorship Probe Lists
- 2024-tsai-modeling Modeling and Detecting Internet Censorship Events
- 2024-vilalonga-looking Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels
- 2024-vines-communication Communication Breakdown: Modularizing Application Tunneling for Signaling Around Censorship
- 2024-vines-ten Ten Years Gone: Revisiting Cloud Storage Transports to Reduce Censored User Burdens
- 2024-wails-precisely On Precisely Detecting Censorship Circumvention in Real-World Networks
- 2024-wang-identifying Identifying VPN Servers through Graph-Represented Behaviors
- 2024-xue-bridging Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape
- 2024-xue-fingerprinting Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
- 2024-zillien-look Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION
- 2023-amich-deresistor DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
- 2023-arora-detor-onion Provably Avoiding Geographic Regions for Tor's Onion Services
- 2023-bischof-destination Destination Unreachable: Characterizing Internet Outages and Shutdowns
- 2023-brown-augmenting Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning
- 2023-ding-discop Discop: Provably secure steganography in practice based on ``distribution copies''
- 2023-fenske-security Security Notions for Fully Encrypted Protocols
- 2023-fifield-comments Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
- 2023-fifield-running Running a high-performance pluggable transports Tor bridge
- 2023-jia-voiceover Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
- 2023-master-worldwide A Worldwide View of Nation-state Internet Censorship
- 2023-nourin-detecting Detecting Network Interference Without Endpoint Participation
- 2023-raman-advancing Advancing the Art of Censorship Data Analysis
- 2023-raman-global Global, Passive Detection of Connection Tampering
- 2023-ramesh-certainty CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates
- 2023-sharma-dolphin Dolphin: A Cellular Voice Based Internet Shutdown Resistance System
- 2023-sun-telepath TELEPATH: A Minecraft-based Covert Communication System
- 2023-tran-crowdsourcing Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies
- 2023-tulloch-lox Lox: Protecting the Social Graph in Bridge Distribution
- 2023-ververis-website Website blocking in the European Union: Network interference from the perspective of Open Internet
- 2023-wails-proteus Proteus: Programmable Protocols for Censorship Circumvention
- 2023-wang-chasing Chasing Shadows: A security analysis of the ShadowTLS proxy
- 2023-wang-self-censorship Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law
- 2023-xue-use The Use of Push Notification in Censorship Circumvention
- 2022-bhaskar-many Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
- 2022-cheng-in-depth In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolvers over Space and Time
- 2022-figueira-stegozoa Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
- 2022-harrity-get GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies
- 2022-hoang-measuring Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering
- 2022-raman-network Network Measurement Methods for Locating and Examining Censorship Devices
- 2022-ramesh-vpnalyzer VPNalyzer: Systematic Investigation of the VPN Ecosystem
- 2022-waheed-darwin-s Darwin's Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models
- 2022-xue-openvpn OpenVPN is Open to VPN Fingerprinting
- 2021-basso-measuring Measuring DoT/DoH blocking using OONI Probe: a preliminary study
- 2021-bock-weaponizing Weaponizing Middleboxes for TCP Reflected Amplification
- 2021-bock-your Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
- 2021-elmenhorst-web Web censorship measurements of HTTP/3 over QUIC
- 2021-gosain-too Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs
- 2021-kaptchuk-meteor Meteor: Cryptographically Secure Steganography for Realistic Distributions
- 2021-kwan-exploring Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels
- 2021-lorimer-oustralopithecus OUStralopithecus: Overt User Simulation for Censorship Circumvention
- 2021-rosen-balboa Balboa: Bobbing and Weaving around Network Censorship
- 2021-satija-blindtls BlindTLS: Circumventing TLS-Based HTTPS Censorship
- 2021-sharma-camoufler Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
- 2021-ververis-understanding Understanding Internet Censorship in Europe: The Case of Spain
- 2021-wei-domain Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications
- 2020-barradas-poking Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC
- 2020-barradas-towards Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels
- 2020-birtel-slitheen Slitheen++: Stealth TLS-based Decoy Routing
- 2020-bock-come Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
- 2020-fifield-turbo Turbo Tunnel, a good way to design censorship circumvention protocols
- 2020-frolov-detecting Detecting Probe-resistant Proxies
- 2020-frolov-httpt HTTPT: A Probe-Resistant Proxy
- 2020-govil-mimiq MIMIQ: Masking IPs with Migration in QUIC
- 2020-minaei-moneymorph MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
- 2020-nasr-massbrowser MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
- 2020-niaki-iclab ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
- 2020-oakley-protocol Protocol Proxy: An FTE-based covert channel
- 2020-raman-censored Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
- 2020-raman-measuring Measuring the Deployment of Network Censorship Filters at Global Scale
- 2020-sharma-siegebreaker SiegeBreaker: An SDN Based Practical Decoy Routing System
- 2020-vandersloot-running Running Refraction Networking for Real
- 2020-wang-symtcp SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery
- 2019-bock-geneva Geneva: Evolving Censorship Evasion Strategies
- 2019-chai-importance On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention
- 2019-frolov-conjure Conjure: Summoning Proxies from Unused Address Space
- 2019-hoang-measuring Measuring I2P Censorship at a Global Scale
- 2019-iszaevich-distributed Distributed Detection of Tor Directory Authorities Censorship in Mexico
- 2019-nasr-enemy Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
- 2019-sheffey-improving Improving Meek With Adversarial Techniques
- 2018-barradas-effective Effective Detection of Multimedia Protocol Tunneling using Machine Learning
- 2018-bocovich-secure Secure asymmetry and deployability for decoy routing systems
- 2018-hoang-empirical An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
- 2018-hobbs-sudden How Sudden Censorship Can Increase Access to Information
- 2018-manfredi-multiflow MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
- 2018-martiny-proof-of-censorship Proof-of-Censorship: Enabling centralized censorship-resistant content providers
- 2018-mcdonald-403 403 Forbidden: A Global View of CDN Geoblocking
- 2018-nisar-incentivizing Incentivizing Censorship Measurements via Circumvention
- 2018-tschantz-bestiary A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
- 2018-vandersloot-quack Quack: Scalable Remote Measurement of Application-Layer Censorship
- 2018-wright-identifying On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship
- 2017-barradas-deltashaper DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
- 2017-bocovich-lavinia Lavinia: An audit-payment protocol for censorship-resistant storage
- 2017-cho-churn A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography
- 2017-darer-filteredweb FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs
- 2017-frolov-isp-scale An ISP-Scale Deployment of TapDance
- 2017-gebhart-internet Internet Censorship in Thailand: User Practices and Potential Threats
- 2017-gosain-devil-s The Devil's in The Details: Placing Decoy Routers in the Internet
- 2017-heydari-scalable Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
- 2017-javaid-online Online Advertising under Internet Censorship
- 2017-jermyn-autosonda Autosonda: Discovering Rules and Triggers of Censorship Devices
- 2017-lee-usability A Usability Evaluation of Tor Launcher
- 2017-li-detor DeTor: Provably Avoiding Geographic Regions in Tor
- 2017-li-lib-cdot-erate lib$\cdot$erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
- 2017-matic-dissecting Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
- 2017-morshed-when When the Internet Goes Down in Bangladesh
- 2017-nasr-waterfall The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
- 2017-pearce-augur Augur: Internet-Wide Detection of Connectivity Disruptions
- 2017-pearce-global Global Measurement of DNS Manipulation
- 2017-singh-characterizing Characterizing the Nature and Dynamics of Tor Exit Blocking
- 2017-tanash-decline The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup
- 2017-ververis-internet Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Blocklisting
- 2017-wang-your Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
- 2017-weinberg-topics Topics of Controversy: An Empirical Analysis of Web Censorship Lists
- 2016-akbar-dns-sly DNS-sly: Avoiding Censorship through Network Complexity
- 2016-bocovich-slitheen Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
- 2016-douglas-ghostpost GhostPost: Seamless Restoration of Censored Social Media Posts
- 2016-douglas-salmon Salmon: Robust Proxy Distribution for Censorship Circumvention
- 2016-elahi-framework A Framework for the Game-theoretic Analysis of Censorship Resistance
- 2016-fifield-censors Censors' Delay in Blocking Circumvention Proxies
- 2016-fifield-fingerprintability Fingerprintability of WebRTC
- 2016-hahn-games Games Without Frontiers: Investigating Video Games as a Covert Channel
- 2016-khattak-sok SoK: Making Sense of Censorship Resistance Systems
- 2016-kohls-skypeline SkypeLine: Robust Hidden Data Transmission for VoIP
- 2016-li-mailet Mailet: Instant Social Networking under Censorship
- 2016-mcpherson-covertcast CovertCast: Using Live Streaming to Evade Internet Censorship
- 2016-nasr-game Game of Decoys: Optimal Decoy Routing Through Game Theory
- 2016-safaka-matryoshka Matryoshka: Hiding Secret Communication in Plain Sight
- 2016-scott-satellite Satellite: Joint Analysis of CDNs and Network-Level Interference
- 2016-singh-politics The Politics of Routing: Investigating the Relationship Between AS Connectivity and Internet Freedom
- 2016-tschantz-sok SoK: Towards Grounding Censorship Circumvention in Empiricism
- 2016-zarras-leveraging Leveraging Internet Services to Evade Censorship
- 2016-zolfaghari-practical Practical Censorship Evasion Leveraging Content Delivery Networks
- 2015-aceto-internet Internet Censorship detection: A survey
- 2015-aceto-monitoring Monitoring Internet Censorship with UBICA
- 2015-burnett-encore Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
- 2015-crandall-forgive Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering
- 2015-dyer-marionette Marionette: A Programmable Network-Traffic Obfuscation System
- 2015-ellard-rebound Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
- 2015-fifield-blocking-resistant Blocking-resistant communication through domain fronting
- 2015-gill-characterizing Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data
- 2015-jones-can Can Censorship Measurements Be Safe(r)?
- 2015-jones-ethical Ethical Concerns for Censorship Measurement
- 2015-levin-alibi Alibi Routing
- 2015-narayanan-no No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement
- 2015-nisar-case A Case for Marrying Censorship Measurements with Circumvention
- 2015-vines-rook Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform
- 2015-wang-seeing Seeing through Network-Protocol Obfuscation
- 2014-anderson-global Global Network Interference Detection over the RIPE Atlas Network
- 2014-brubaker-cloudtransport CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
- 2014-connolly-trist TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
- 2014-ensafi-detecting Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels
- 2014-houmansadr-no No Direction Home: The True Cost of Routing Around Decoys
- 2014-jones-automated Automated Detection and Fingerprinting of Censorship Block Pages
- 2014-jones-facade Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
- 2014-li-facet Facet: Streaming over Videoconferencing for Censorship Circumvention
- 2014-luchaup-libfte LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
- 2014-nobori-vpn VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls
- 2014-roos-measuring Measuring Freenet in the Wild: Censorship-resilience under Observation
- 2014-tan-censorship Censorship Resistance as a Side-Effect
- 2014-wachs-censorship-resistant A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
- 2014-wustrow-tapdance TapDance: End-to-Middle Anticensorship without Flow Blocking
- 2013-benson-gaining Gaining Insight into AS-level Outages through Analysis of Internet Background Radiation
- 2013-dalek-method A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship
- 2013-das-self-censorship Self-Censorship on Facebook
- 2013-detal-revealing Revealing Middlebox Interference with Tracebox
- 2013-durumeric-zmap ZMap: Fast Internet-wide Scanning and its Security Applications
- 2013-dyer-protocol Protocol Misidentification Made Easy with Format-Transforming Encryption
- 2013-fifield-oss OSS: Using Online Scanning Services for Censorship Circumvention
- 2013-geddes-cover Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
- 2013-hasan-building Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
- 2013-houmansadr-i I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention
- 2013-houmansadr-parrot The Parrot is Dead: Observing Unobservable Network Communications
- 2013-invernizzi-message Message In A Bottle: Sailing Past Censorship
- 2013-khattak-towards Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion
- 2013-ruffing-identity-based Identity-Based Steganography and Its Applications to Censorship Resistance
- 2013-verkamp-five Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest
- 2013-wachs-feasibility On the Feasibility of a Censorship Resistant Decentralized Name System
- 2013-wang-rbridge rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
- 2013-winter-scramblesuit ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
- 2013-winter-towards Towards a Censorship Analyser for Tor
- 2013-zhou-sweet SWEET: Serving the Web by Exploiting Email Tunnels
- 2012-duan-hold-on Hold-On: Protecting Against On-Path DNS Poisoning
- 2012-fifield-evading Evading Censorship with Browser-Based Proxies
- 2012-filast-ooni OONI: Open Observatory of Network Interference
- 2012-lincoln-bootstrapping Bootstrapping Communications into an Anti-Censorship System
- 2012-ling-extensive Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
- 2012-moghaddam-skypemorph SkypeMorph: Protocol Obfuscation for Tor Bridges
- 2012-rogers-secure Secure Communication over Diverse Transports
- 2012-schuchard-routing Routing Around Decoys
- 2012-sparks-collateral The Collateral Damage of Internet Censorship by DNS Injection
- 2012-thomas-adapting Adapting Social Spam Infrastructure for Political Censorship
- 2012-vasserman-one-way One-way indexing for plausible deniability in censorship resistant storage
- 2012-verkamp-inferring Inferring Mechanics of Web Censorship Around the World
- 2012-wang-censorspoofer CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
- 2012-weinberg-stegotorus StegoTorus: A Camouflage Proxy for the Tor Anonymity System
- 2011-bachrach-h00t \#h00t: Censorship Resistant Microblogging
- 2011-bonneau-scrambling Scrambling for lightweight censorship resistance
- 2011-dainotti-analysis Analysis of Country-wide Internet Outages Caused by Censorship
- 2011-danezis-anomaly-based An anomaly-based censorship-detection system for Tor
- 2011-espinoza-automated Automated Named Entity Extraction for Tracking Censorship of Current Events
- 2011-houmansadr-cirripede Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
- 2011-jones-hiding Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
- 2011-karlin-decoy Decoy Routing: Toward Unblockable Internet Communication
- 2011-kathuria-bypassing Bypassing Internet Censorship for News Broadcasters
- 2011-liu-tor Tor Instead of IP
- 2011-mccoy-proximax Proximax: A Measurement Based System for Proxies Dissemination
- 2011-roberts-mapping Mapping Local Internet Control
- 2011-seltzer-infrastructures Infrastructures of Censorship and Lessons from Copyright Resistance
- 2011-sfakianakis-censmon CensMon: A Web Censorship Monitor
- 2011-shklovski-online Online Contribution Practices in Countries that Engage in Internet Blocking and Censorship
- 2011-smits-bridgespa BridgeSPA: Improving Tor Bridges with Single Packet Authorization
- 2011-wiley-dust Dust: A Blocking-Resistant Internet Transport Protocol
- 2011-wright-fine-grained Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
- 2011-wustrow-telex Telex: Anticensorship in the Network Infrastructure
- 2010-burnett-chipping Chipping Away at Censorship Firewalls with User-Generated Content
- 2010-mahdian-fighting Fighting Censorship with Algorithms
- 2010-pfitzmann-terminology A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
- 2009-backes-anonymity Anonymity and Censorship Resistance in Unstructured Overlay Networks
- 2009-cao-skyf2f SkyF2F: Censorship Resistant via Skype Overlay Network
- 2009-mclachlan-risks On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design
- 2009-weaver-detecting Detecting Forged TCP Reset Packets
- 2008-aycock-good ``Good'' Worms and Human Rights
- 2008-sovran-pass Pass it on: Social Networks Stymie Censors
- 2007-crandall-conceptdoppler ConceptDoppler: A Weather Tracker for Internet Censorship
- 2006-clayton-failures Failures in a Hybrid Content Blocking System
- 2006-dingledine-design Design of a blocking-resistant anonymity system
- 2006-wolfgarten-investigating Investigating large-scale Internet content filtering
- 2005-perng-censorship Censorship Resistance Revisited
- 2004-danezis-economics The Economics of Censorship Resistance
- 2004-k-psell-achieve How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
- 2003-dornseif-government Government mandated blocking of foreign Web content
- 2003-feamster-thwarting Thwarting Web Censorship with Untrusted Messenger Discovery
- 2002-feamster-infranet Infranet: Circumventing Web Censorship and Surveillance
- 2002-serjantov-anonymizing Anonymizing Censorship Resistant Systems
- 2001-handley-network Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
- 2001-stubblefield-dagster Dagster: Censorship-Resistant Publishing Without Replication
- 2001-waldman-tangler Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements
- 2000-waldman-publius Publius: A robust, tamper-evident, censorship-resistant web publishing system
- 1998-ptacek-insertion Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
- 1996-anderson-eternity The Eternity Service