{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:35:04Z","timestamp":1725759304152},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1943240"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,10]]},"DOI":"10.1145\/3603269.3604875","type":"proceedings-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T16:16:29Z","timestamp":1693584989000},"page":"622-636","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Global, Passive Detection of Connection Tampering"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2411-8463","authenticated-orcid":false,"given":"Ram","family":"Sundara Raman","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, United States of America"},{"name":"Cloudflare, Inc., San Francisco, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0694-5489","authenticated-orcid":false,"given":"Louis-Henri","family":"Merino","sequence":"additional","affiliation":[{"name":"Decentralized and Distributed Systems Lab, EPFL, Lausanne, Switzerland"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4415-6026","authenticated-orcid":false,"given":"Kevin","family":"Bock","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0970-7972","authenticated-orcid":false,"given":"Marwan","family":"Fayed","sequence":"additional","affiliation":[{"name":"Cloudflare Inc., London, United Kingdom"},{"name":"University of St Andrews, St Andrews, United Kingdom"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4957-5131","authenticated-orcid":false,"given":"Dave","family":"Levin","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-0550-9228","authenticated-orcid":false,"given":"Nick","family":"Sullivan","sequence":"additional","affiliation":[{"name":"Cloudflare Inc., New York, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8936-0499","authenticated-orcid":false,"given":"Luke","family":"Valenta","sequence":"additional","affiliation":[{"name":"Cloudflare Inc., San Francisco, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9]]},"reference":[{"volume-title":"September","year":"1981","author":"Protocol Transmission Control","key":"e_1_3_2_1_1_1","unstructured":"Transmission Control Protocol. RFC 793, RFC Editor, September 1981."},{"volume-title":"The return of digital authoritarianism: Internet shutdowns","year":"2021","author":"Now Access","key":"e_1_3_2_1_2_1","unstructured":"Access Now. The return of digital authoritarianism: Internet shutdowns in 2021. https:\/\/www.accessnow.org\/wp-content\/uploads\/2022\/05\/2021-KIO-Report-May-24-2022.pdf, april 2022."},{"volume-title":"Internet Censorship in Iran: Findings from 2014--2017. https:\/\/blog.torproject.org\/internet-censorship-iran-findings-2014-2017","year":"2017","author":"Agrabeli Maria","key":"e_1_3_2_1_3_1","unstructured":"Maria Agrabeli. Internet Censorship in Iran: Findings from 2014--2017. https:\/\/blog.torproject.org\/internet-censorship-iran-findings-2014-2017, 2017."},{"volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2014","author":"Anderson Collin","key":"e_1_3_2_1_4_1","unstructured":"Collin Anderson, Philipp Winter, and Roya. Global Network Interference Detection over the RIPE Atlas Network. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2014."},{"volume-title":"Splinternet Behind the Great Firewall of China. ACM Queue, 10(11)","year":"2012","author":"Anderson Daniel","key":"e_1_3_2_1_5_1","unstructured":"Daniel Anderson. Splinternet Behind the Great Firewall of China. ACM Queue, 10(11), 2012."},{"volume-title":"The Collateral Damage of Internet Censorship. ACM SIGCOMM Computer Communication Review (CCR), 42(3):21--27","year":"2012","author":"Anonymous","key":"e_1_3_2_1_6_1","unstructured":"Anonymous. The Collateral Damage of Internet Censorship. ACM SIGCOMM Computer Communication Review (CCR), 42(3):21--27, 2012."},{"volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2014","author":"Anonymous","key":"e_1_3_2_1_7_1","unstructured":"Anonymous. Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2014."},{"volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2020","author":"Anonymous","key":"e_1_3_2_1_8_1","unstructured":"Anonymous, Arian Akhavan Niaki, Nguyen Phone Hoang, Phillipa Gill, and Amir Houmansadr. Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2020."},{"volume-title":"An Analysis of TCP Reset Behaviour on the Internet. ACM SIGCOMM Computer Communication Review (CCR), 35(1):37--44","year":"2005","author":"Arlitt Martin","key":"e_1_3_2_1_9_1","unstructured":"Martin Arlitt and Carey Williamson. An Analysis of TCP Reset Behaviour on the Internet. ACM SIGCOMM Computer Communication Review (CCR), 35(1):37--44, 2005."},{"volume-title":"Internet Censorship in Iran: A First Look. In USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2013","author":"Aryan Simurgh","key":"e_1_3_2_1_10_1","unstructured":"Simurgh Aryan, Homa Aryan, and J. Alex Halderman. Internet Censorship in Iran: A First Look. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2013."},{"volume-title":"Bajpai and J\u00fcrgen Sch\u00f6nw\u00e4lder. Measuring the Effects of Happy Eyeballs. In Applied Networking Research Workshop","year":"2016","author":"Vaibhav","key":"e_1_3_2_1_11_1","unstructured":"Vaibhav Bajpai and J\u00fcrgen Sch\u00f6nw\u00e4lder. Measuring the Effects of Happy Eyeballs. In Applied Networking Research Workshop, 2016."},{"volume-title":"Measuring SNI based blocking in Iran. https:\/\/ooni.org\/post\/2020-iran-sni-blocking\/","year":"2020","author":"Basso Simone","key":"e_1_3_2_1_12_1","unstructured":"Simone Basso. Measuring SNI based blocking in Iran. https:\/\/ooni.org\/post\/2020-iran-sni-blocking\/, 2020."},{"key":"e_1_3_2_1_13_1","unstructured":"Berkman Klein Test Lists. https:\/\/github.com\/berkmancenter\/url-lists."},{"volume-title":"Dave Levin. Weaponizing Middleboxes for TCP Reflected Amplification. In USENIX Security Symposium","year":"2021","author":"Bock Kevin","key":"e_1_3_2_1_14_1","unstructured":"Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, and Dave Levin. Weaponizing Middleboxes for TCP Reflected Amplification. In USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00059"},{"volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2020","author":"Bock Kevin","key":"e_1_3_2_1_16_1","unstructured":"Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, and Dave Levin. Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Whitelister. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2020."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405889"},{"volume-title":"Dave Levin. Geneva: Evolving Censorship Evasion. In ACM Conference on Computer and Communications Security (CCS)","year":"2019","author":"Bock Kevin","key":"e_1_3_2_1_18_1","unstructured":"Kevin Bock, George Hughey, Xiao Qiang, and Dave Levin. Geneva: Evolving Censorship Evasion. In ACM Conference on Computer and Communications Security (CCS), 2019."},{"volume-title":"Anonymous, Louis-Henri Merino, David Fifield, Amir Houmansadr, and Dave Levin. Exposing and Circumventing China's Censorship of ESNI. https:\/\/geneva.cs.umd.edu\/posts\/china-censors-esni\/esni\/","year":"2020","author":"Bock Kevin","key":"e_1_3_2_1_19_1","unstructured":"Kevin Bock, iyouport, Anonymous, Louis-Henri Merino, David Fifield, Amir Houmansadr, and Dave Levin. Exposing and Circumventing China's Censorship of ESNI. https:\/\/geneva.cs.umd.edu\/posts\/china-censors-esni\/esni\/, 2020."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473604.3474559"},{"volume-title":"ACM SIGCOMM","year":"2015","author":"Burnett Sam","key":"e_1_3_2_1_21_1","unstructured":"Sam Burnett and Nick Feamster. Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests. In ACM SIGCOMM, 2015."},{"volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2019","author":"Chai Zimo","key":"e_1_3_2_1_22_1","unstructured":"Zimo Chai, Amirhossein Ghafari, and Amir Houmansadr. On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2019."},{"key":"e_1_3_2_1_23_1","unstructured":"CitizenLab Censorship Test Lists. https:\/\/github.com\/citizenlab\/test-lists."},{"volume-title":"Watson. Ignoring the Great Firewall of China. In Privacy Enhancing Technologies Symposium (PETS)","year":"2006","author":"Clayton Richard","key":"e_1_3_2_1_24_1","unstructured":"Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson. Ignoring the Great Firewall of China. In Privacy Enhancing Technologies Symposium (PETS), 2006."},{"volume-title":"Joss Wright. FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs. In Network Traffic Measurement and Analysis Conference (TMA)","year":"2017","author":"Darer Alexander","key":"e_1_3_2_1_25_1","unstructured":"Alexander Darer, Oliver Farnan, and Joss Wright. FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs. In Network Traffic Measurement and Analysis Conference (TMA), 2017."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201091"},{"volume-title":"https:\/\/subinsb.com\/default-device-ttl-values\/","year":"2014","author":"Time To Default TTL","key":"e_1_3_2_1_27_1","unstructured":"Default TTL (Time To Live) Values of Different OS. https:\/\/subinsb.com\/default-device-ttl-values\/, 2014."},{"volume-title":"Department of Homeland Security","year":"2012","author":"Dittrich D.","key":"e_1_3_2_1_28_1","unstructured":"D. Dittrich and E. Kenneally. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Technical report, U.S. Department of Homeland Security, Aug 2012."},{"volume-title":"Blocking of Unpublished Tor Bridges. In USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2018","author":"Dunna Arun","key":"e_1_3_2_1_29_1","unstructured":"Arun Dunna, Ciar\u00e1n O'Brien, and Phillipa Gill. Analyzing China's Blocking of Unpublished Tor Bridges. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2018."},{"volume-title":"Alex Halderman. ZMap: Fast Internet-wide Scanning and Its Security Applications. In USENIX Security Symposium","year":"2013","author":"Durumeric Zakir","key":"e_1_3_2_1_30_1","unstructured":"Zakir Durumeric, Eric Wustrow, and J Alex Halderman. ZMap: Fast Internet-wide Scanning and Its Security Applications. In USENIX Security Symposium, 2013."},{"volume-title":"Vern Paxson. Examining How the Great Firewall Discovers Hidden Circumvention Servers. In ACM Internet Measurement Conference (IMC)","year":"2015","author":"Ensafi Roya","key":"e_1_3_2_1_31_1","unstructured":"Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson. Examining How the Great Firewall Discovers Hidden Circumvention Servers. In ACM Internet Measurement Conference (IMC), 2015."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_11"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00046"},{"volume-title":"Fifield and Lynn Tsai. Censors' Delay in Blocking Circumvention Proxies. In USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2016","author":"David","key":"e_1_3_2_1_34_1","unstructured":"David Fifield and Lynn Tsai. Censors' Delay in Blocking Circumvention Proxies. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2016."},{"volume-title":"Filasto and Jacob Appelbaum. OONI: Open Observatory of Network Interference. In USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2012","author":"Arturo","key":"e_1_3_2_1_35_1","unstructured":"Arturo Filasto and Jacob Appelbaum. OONI: Open Observatory of Network Interference. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2012."},{"key":"e_1_3_2_1_36_1","unstructured":"fqrouter. Detailed GFW's three blocking methods for SMTP protocol. https:\/\/web.archive.org\/web\/20151121091522\/http:\/\/fqrouter.tumblr.com\/post\/43400982633\/%E8%AF%A6%E8%BF%B0gfw%E5%AF%B9smtp%E5%8D%8F%E8%AE%AE%E7%9A%84%E4%B8%89%E7%A7%8D%E5%B0%81%E9%94%81%E6%89%8B%E6%B3%95 2015."},{"key":"e_1_3_2_1_37_1","unstructured":"Freedom on the Net. https:\/\/freedomhouse.org\/report\/freedom-net."},{"volume-title":"Censorship of Blocked in China | GreatFire Analyzer. https:\/\/en.greatfire.org\/search\/blocked","year":"2019","key":"e_1_3_2_1_38_1","unstructured":"GreatFire. Censorship of Blocked in China | GreatFire Analyzer. https:\/\/en.greatfire.org\/search\/blocked, 2019."},{"volume-title":"https:\/\/cyber.harvard.edu\/research\/herdict","year":"2017","author":"Lists Herdict Test","key":"e_1_3_2_1_39_1","unstructured":"Herdict Test Lists. https:\/\/cyber.harvard.edu\/research\/herdict, 2017."},{"volume-title":"USENIX Security Symposium","year":"2022","author":"Hiesgen Raphael","key":"e_1_3_2_1_40_1","unstructured":"Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C Schmidt, and Matthias W\u00e4hlisch. Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. USENIX Security Symposium, 2022."},{"volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2019","author":"Hoang Nguyen Phong","key":"e_1_3_2_1_41_1","unstructured":"Nguyen Phong Hoang, Sadie Doreen, and Michalis Polychronakis. Measuring I2P Censorship at a Global Scale. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2019."},{"volume-title":"USENIX Security Symposium","year":"2021","author":"Hoang Nguyen Phong","key":"e_1_3_2_1_42_1","unstructured":"Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, and Michalis Polychronakis. How Great is the Great Firewall? Measuring China's DNS Censorship. In USENIX Security Symposium, 2021."},{"volume-title":"Culture-Specific Blocklist for China. In USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2018","author":"Hounsel Austin","key":"e_1_3_2_1_43_1","unstructured":"Austin Hounsel, Prateek Mittal, and Nick Feamster. Automatically Generating a Large, Culture-Specific Blocklist for China. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2018."},{"volume-title":"Internet Outage Detection and Analysis. https:\/\/ioda.caida.org\/","year":"2023","author":"IODA","key":"e_1_3_2_1_44_1","unstructured":"IODA: Internet Outage Detection and Analysis. https:\/\/ioda.caida.org\/, 2023."},{"volume-title":"Standard","author":"The International","key":"e_1_3_2_1_45_1","unstructured":"The International Standard for country codes and codes for their subdivisions. Standard, International Organization for Standardization, Geneva, CH."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2793013.2793015"},{"volume-title":"Wouter Joosen. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Network and Distributed System Security Symposium (NDSS)","year":"2019","author":"Pochat Victor Le","key":"e_1_3_2_1_47_1","unstructured":"Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Network and Distributed System Security Symposium (NDSS), 2019."},{"volume-title":"ACM Internet Measurement Conference (IMC)","year":"2017","author":"Li Fangfan","key":"e_1_3_2_1_48_1","unstructured":"Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David Choffnes, Phillipa Gill, and Alan Mislove. lib.erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently. In ACM Internet Measurement Conference (IMC), 2017."},{"volume-title":"The million domains we find with the most referring subnets. https:\/\/majestic.com\/","year":"2021","author":"Million Majestic","key":"e_1_3_2_1_49_1","unstructured":"Majestic Million: The million domains we find with the most referring subnets. https:\/\/majestic.com\/, 2021."},{"volume-title":"The Mistake that Caused 1.1.1.3 to Block LGBTQIA+ Sites Today. https:\/\/blog.cloudflare.com\/the-mistake-that-caused-1-1-1-3-to-block-lgbtqia-sites-today, april","year":"2020","author":"Prince Matthew","key":"e_1_3_2_1_50_1","unstructured":"Matthew Prince. The Mistake that Caused 1.1.1.3 to Block LGBTQIA+ Sites Today. https:\/\/blog.cloudflare.com\/the-mistake-that-caused-1-1-1-3-to-block-lgbtqia-sites-today, april 2020."},{"volume-title":"Forbidden: A Global View of CDN Geoblocking. In ACM Internet Measurement Conference (IMC)","year":"2018","author":"McDonald Allison","key":"e_1_3_2_1_51_1","unstructured":"Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, and Roya Ensafi. 403 Forbidden: A Global View of CDN Geoblocking. In ACM Internet Measurement Conference (IMC), 2018."},{"volume-title":"Nabi. The Anatomy of Web Censorship in Pakistan. In USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2013","author":"Zubair","key":"e_1_3_2_1_52_1","unstructured":"Zubair Nabi. The Anatomy of Web Censorship in Pakistan. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2013."},{"volume-title":"https:\/\/netblocks.org\/","year":"2023","key":"e_1_3_2_1_53_1","unstructured":"NetBlocks. https:\/\/netblocks.org\/, 2023."},{"volume-title":"Longitudinal Internet Censorship Measurement Platform. In IEEE Symposium on Security and Privacy","year":"2020","author":"Niaki Arian Akhavan","key":"e_1_3_2_1_54_1","unstructured":"Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, and Phillipa Gill. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. In IEEE Symposium on Security and Privacy, 2020."},{"volume-title":"TCP Idle Scan. https:\/\/nmap.org\/book\/idlescan.html","year":"2023","key":"e_1_3_2_1_55_1","unstructured":"Nmap. TCP Idle Scan. https:\/\/nmap.org\/book\/idlescan.html, 2023."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583189"},{"volume-title":"Live event piracy: discussion paper: challenges and good practices from online intermediaries to prevent the use of their services for live event piracy","year":"2023","author":"Intellectual Property Office European Union","key":"e_1_3_2_1_57_1","unstructured":"European Union Intellectual Property Office. Live event piracy: discussion paper: challenges and good practices from online intermediaries to prevent the use of their services for live event piracy. 2023."},{"volume-title":"Study on dynamic blocking injunctions in the European Union","year":"2021","author":"Intellectual Property Office European Union","key":"e_1_3_2_1_58_1","unstructured":"European Union Intellectual Property Office, Giancarlo Frosio, and Oleksandr Bulayenko. Study on dynamic blocking injunctions in the European Union. 2021."},{"volume-title":"The case of Iran amid autumn 2022 protests. https:\/\/rsf.org\/en\/index","year":"2022","author":"Technical","key":"e_1_3_2_1_59_1","unstructured":"Technical multi-stakeholder report on Internet shutdowns: The case of Iran amid autumn 2022 protests. https:\/\/rsf.org\/en\/index, 2022."},{"key":"e_1_3_2_1_60_1","unstructured":"Open Rights Group. Blocked! https:\/\/www.blocked.org.uk\/about."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"volume-title":"Vern Paxson. Augur: Internet-Wide Detection of Connectivity Disruptions. In IEEE Symposium on Security and Privacy","year":"2017","author":"Pearce Paul","key":"e_1_3_2_1_62_1","unstructured":"Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, and Vern Paxson. Augur: Internet-Wide Detection of Connectivity Disruptions. In IEEE Symposium on Security and Privacy, 2017."},{"volume-title":"Vern Paxson. Global Measurement of DNS Manipulation. In USENIX Security Symposium","year":"2017","author":"Pearce Paul","key":"e_1_3_2_1_63_1","unstructured":"Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, and Vern Paxson. Global Measurement of DNS Manipulation. In USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Jon Postel. Internet Protocol. RFC 791 September 1981.","DOI":"10.17487\/rfc0791"},{"key":"e_1_3_2_1_65_1","unstructured":"Press Freedom Index. https:\/\/rsf.org\/en\/index."},{"volume-title":"Roya Ensafi. Decentralized Control: A Case Study of Russia. In Network and Distributed System Security Symposium (NDSS)","year":"2020","author":"Ramesh Reethika","key":"e_1_3_2_1_66_1","unstructured":"Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Annie Edmundson, S. Sprecher, Muhammad Ikram, and Roya Ensafi. Decentralized Control: A Case Study of Russia. In Network and Distributed System Security Symposium (NDSS), 2020."},{"volume-title":"USENIX Security Symposium","year":"2023","author":"Ramesh Reethika","key":"e_1_3_2_1_67_1","unstructured":"Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, and Roya Ensafi. Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom. In USENIX Security Symposium, 2023."},{"volume-title":"March","year":"2013","author":"Borders Reporters Without","key":"e_1_3_2_1_68_1","unstructured":"Reporters Without Borders. Enemies of the Internet 2013 Report. https:\/\/surveillance.rsf.org\/en\/wp-content\/uploads\/sites\/2\/2013\/03\/enemies-of-the-internet_2013.pdf, March 2013."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76481-8_18"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8305"},{"volume-title":"Vern Paxson. Characterizing the Nature and Dynamics of Tor Exit Blocking. In USENIX Security Symposium","year":"2017","author":"Singh Rachee","key":"e_1_3_2_1_71_1","unstructured":"Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson. Characterizing the Nature and Dynamics of Tor Exit Blocking. In USENIX Security Symposium, 2017."},{"volume-title":"Roya Ensafi. Investigating Large Scale HTTPS Interception in Kazakhstan. In ACM Internet Measurement Conference (IMC)","year":"2015","author":"Raman Ram Sundara","key":"e_1_3_2_1_72_1","unstructured":"Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, Alex Halderman, and Roya Ensafi. Investigating Large Scale HTTPS Interception in Kazakhstan. In ACM Internet Measurement Conference (IMC), 2015."},{"volume-title":"Longitudinal Censorship Observatory. In ACM Conference on Computer and Communications Security (CCS)","year":"2020","author":"Raman Ram Sundara","key":"e_1_3_2_1_73_1","unstructured":"Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, and Roya Ensafi. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. In ACM Conference on Computer and Communications Security (CCS), 2020."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23099"},{"volume-title":"Roya Ensafi. Network Measurement Methods for Locating and Examining Censorship Devices. In ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT)","year":"2022","author":"Raman Ram Sundara","key":"e_1_3_2_1_75_1","unstructured":"Ram Sundara Raman, Mona Wang, Jakub Dalek, Jonathan Mayer, and Roya Ensafi. Network Measurement Methods for Locating and Examining Censorship Devices. In ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2022."},{"volume-title":"Iran and Beyond. https:\/\/techpolicy.press\/internet-shutdowns-and-censorship-in-iran-and-beyond\/","year":"2022","author":"Shutdowns Internet","key":"e_1_3_2_1_76_1","unstructured":"Internet Shutdowns and Censorship, in Iran and Beyond. https:\/\/techpolicy.press\/internet-shutdowns-and-censorship-in-iran-and-beyond\/, 2022."},{"volume-title":"Updated Specification of the IPv4 ID Field. RFC","year":"2013","author":"Touch Joe","key":"e_1_3_2_1_77_1","unstructured":"Joe Touch. Updated Specification of the IPv4 ID Field. RFC 6864, February 2013."},{"volume-title":"Roya Ensafi. Quack: Scalable Remote Measurement of Application-Layer Censorship. In USENIX Security Symposium","year":"2018","author":"VanderSloot Benjamin","key":"e_1_3_2_1_78_1","unstructured":"Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi. Quack: Scalable Remote Measurement of Application-Layer Censorship. In USENIX Security Symposium, 2018."},{"volume-title":"Verkamp and Minaxi Gupta. Inferring Mechanics of Web Censorship Around the World. In USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2012","author":"John-Paul","key":"e_1_3_2_1_79_1","unstructured":"John-Paul Verkamp and Minaxi Gupta. Inferring Mechanics of Web Censorship Around the World. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2012."},{"key":"e_1_3_2_1_80_1","unstructured":"W3Techs Web Technology Surveys. Usage statistics and market share of Cloudflare. https:\/\/w3techs.com\/technologies\/details\/cn-cloudflare last accessed 01\/2022."},{"key":"e_1_3_2_1_81_1","unstructured":"W3Techs Web Technology Surveys. Usage statistics of Cloudflare Server. https:\/\/w3techs.com\/technologies\/details\/ws-cloudflare last accessed 01\/2022."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131374"},{"volume-title":"Braun. SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In Network and Distributed System Security Symposium (NDSS)","year":"2020","author":"Wang Zhongjie","key":"e_1_3_2_1_83_1","unstructured":"Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, and Tracy D. Braun. SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In Network and Distributed System Security Symposium (NDSS), 2020."},{"volume-title":"Vern Paxson. Detecting Forged TCP Reset Packets. In Network and Distributed System Security Symposium (NDSS)","year":"2009","author":"Weaver Nicholas","key":"e_1_3_2_1_84_1","unstructured":"Nicholas Weaver, Robin Sommer, and Vern Paxson. Detecting Forged TCP Reset Packets. In Network and Distributed System Security Symposium (NDSS), 2009."},{"volume-title":"Happy Eyeballs: Success with Dual-Stack Hosts. RFC","year":"2012","author":"Wing Dan","key":"e_1_3_2_1_85_1","unstructured":"Dan Wing and Andrew Yourtchenko. Happy Eyeballs: Success with Dual-Stack Hosts. RFC 6555, April 2012."},{"volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","year":"2012","author":"Winter Philipp","key":"e_1_3_2_1_86_1","unstructured":"Philipp Winter and Stefan Lindskog. How the Great Firewall of China is Blocking Tor. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2012."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19260-9_14"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561461"},{"volume-title":"Sambuddho Chakravarty. Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. In ACM Internet Measurement Conference (IMC)","year":"2018","author":"Yadav Tarun Kumar","key":"e_1_3_2_1_89_1","unstructured":"Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, and Sambuddho Chakravarty. Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. In ACM Internet Measurement Conference (IMC), 2018."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-07-2016-0204"}],"event":{"name":"ACM SIGCOMM '23: ACM SIGCOMM 2023 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"New York NY USA","acronym":"ACM SIGCOMM '23"},"container-title":["Proceedings of the ACM SIGCOMM 2023 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603269.3604875","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603269.3604875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T19:04:23Z","timestamp":1715972663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603269.3604875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":90,"alternative-id":["10.1145\/3603269.3604875","10.1145\/3603269"],"URL":"https:\/\/doi.org\/10.1145\/3603269.3604875","relation":{},"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"2023-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}