DEFENSES
mimicry Protocol mimicry
Make the proxy traffic look like a known-allowed protocol (HTTP, TLS, QUIC, etc.).
20 PAPERS ON FILE
- 2025-amnesty-pakistan-shadows Shadows of Control: Censorship and mass surveillance in Pakistan
- 2025-geedge-mesa-leak Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
- 2025-interseclab-internet-coup The Internet Coup
- 2025-zohaib-quic-sni Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China
- 2017-frolov-water-pluggable WATER: a programmable framework for pluggable transports
- 2024-xue-tspu-russia Tspu: Russia's decentralized censorship system
- 2023-jia-voiceover Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling
- 2023-wu-fully-encrypted-detect How the Great Firewall of China detects and blocks fully encrypted traffic
- 2022-blocking-tls-circumvention Large scale blocking of TLS-based censorship circumvention tools in China
- 2021-lorimer-oustralopithecus OUStralopithecus: Overt User Simulation for Censorship Circumvention
- 2020-alice-shadowsocks-detection How China Detects and Blocks Shadowsocks
- 2020-frolov-httpt HTTPT: A Probe-Resistant Proxy
- 2020-gfw-esni-blocking Exposing and Circumventing China's Censorship of ESNI
- 2015-frolov-the-use-of-tls The use of TLS in censorship circumvention
- 2017-li-lib-cdot-erate lib$\cdot$erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
- 2015-ensafi-active-probing Examining how the Great Firewall discovers hidden circumvention servers
- 2015-fifield-blocking-resistant Blocking-resistant communication through domain fronting
- 2015-wang-seeing Seeing through Network-Protocol Obfuscation
- 2013-houmansadr-parrot The Parrot is Dead: Observing Unobservable Network Communications
- 2011-bonneau-scrambling Scrambling for lightweight censorship resistance