TECHNIQUES
active-probing Active probing
Censor-initiated connections to suspected proxy endpoints to confirm the protocol before blocking. Hallmark of GFW since 2012; now seen in IR and RU.
29 PAPERS ON FILE
- 2025-geedge-mesa-leak Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
- 2025-interseclab-internet-coup The Internet Coup
- 2025-nourin-nobody Is Nobody There? Good! Globally Measuring Connection Tampering without Responsive Endhosts
- 2025-sivan-sevilla-probing Probing the third-party infrastructure of digital news on the Web
- 2024-sakamoto-bleeding Bleeding Wall: A Hematologic Examination on the Great Firewall
- 2023-amich-deresistor DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
- 2020-alice-shadowsocks-detection How China Detects and Blocks Shadowsocks
- 2020-bock-detecting Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter
- 2020-frolov-detecting Detecting Probe-resistant Proxies
- 2020-frolov-httpt HTTPT: A Probe-Resistant Proxy
- 2020-v2ray-weaknesses Summary on Recently Discovered V2Ray Weaknesses
- 2019-hoang-measuring Measuring I2P Censorship at a Global Scale
- 2019-nasr-enemy Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
- 2018-hoang-empirical An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
- 2017-pearce-augur Augur: Internet-Wide Detection of Connectivity Disruptions
- 2016-fifield-censors Censors' Delay in Blocking Circumvention Proxies
- 2016-khattak-sok SoK: Making Sense of Censorship Resistance Systems
- 2016-tschantz-sok SoK: Towards Grounding Censorship Circumvention in Empiricism
- 2015-ensafi-active-probing Examining how the Great Firewall discovers hidden circumvention servers
- 2015-ensafi-analyzing Analyzing the Great Firewall of China Over Space and Time
- 2014-wang-gohop GoHop: Personal VPN to Defend from Censorship
- 2013-khattak-towards Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion
- 2013-winter-towards Towards a Censorship Analyser for Tor
- 2012-ling-extensive Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
- 2012-winter-great How the Great Firewall of China is Blocking Tor
- 2011-liu-tor Tor Instead of IP
- 2011-smits-bridgespa BridgeSPA: Improving Tor Bridges with Single Packet Authorization
- 2009-mclachlan-risks On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design
- 2006-dingledine-design Design of a blocking-resistant anonymity system