2025
Issue 1
- Is Custom Congestion Control a Bad Idea for Circumvention Tools?
[PDF]
Wayne Wang (University of Michigan), Diwen Xue (University of Michigan), Piyush Kumar (University of Michigan), Ayush Mishra (ETH Zürich), Anonymous, Roya Ensafi (University of Michigan)
- I(ra)nconsistencies: Novel Insights into Iran’s Censorship
[PDF]
Felix Lange (Paderborn University), Niklas Niere (Paderborn University), Jonathan von Niessen (Paderborn University), Dennis Suermann (Paderborn University), Nico Heitmann (Paderborn University), Juraj Somorovsky (Paderborn University)
- Extended Abstract: Using TURN Servers for Censorship Evasion
[PDF]
Afonso Vilalonga (Universidade NOVA de Lisboa & NOVA LINCS), Kevin Gallagher (Universidade NOVA de Lisboa & NOVA LINCS), Osman Yaǧan (Carnegie Mellon University), João S. Resende (Universidade do Porto), Henrique Domingos (Universidade NOVA de Lisboa & NOVA LINCS)
- Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks
[PDF]
Esther Rodriguez (Arizona State University), Lobsang Gyatso (Tibet Action Institute), Tenzin Thayai (Tibet Action Institute), Jedidiah R. Crandall (Arizona State University)
- Examining Leading Pakistani Mobile Apps
[PDF]
Sana Habib (Arizona State University), Mohammad Taha Khan (Washington and Lee University), Jedidiah R. Crandall (Arizona State University)
Issue 2
- Fingerprint-resistant DTLS for usage in Snowflake
[PDF]
Theodor Signebøen Midtlien, David Palma (Norwegian University of Science and Technology)
- 1-800-Censorship: Analyzing internet censorship data using the Internet Yellow Pages
[PDF]
Friedemann Lipphardt (Max Planck Institute for Informatics), Malte Tashiro (IIJ Research Laboratory / SOKENDAI), Romain Fontugne (IIJ Research Laboratory)
- Hidden Links: Analyzing Secret Families of VPN Apps
[PDF]
Benjamin Mixon-Baca (ASU / Breakpointing Bad), Jeffrey Knockel (Citizen Lab / Bowdoin College), Jedidiah R. Crandall (Arizona State University)
- Evaluating Onion Address Collection Methods
[PDF]
Tobias Höller (Johannes Kepler University), René Mayrhofer (Johannes Kepler University)
- Extended Abstract: Shaperd: Easily Adoptable Real-Time Traffic Shaper for Fully Encrypted Protocols
[PDF]
Sarah Wilson (University of Waterloo), Stella Tian (University of Waterloo), Sina Kamali (University of Waterloo)
- Extended Abstract: Traffic Shaping for Network Protocols: A Modular and Developer-Friendly Framework
[PDF]
Hugo Santos Pereira (Universidade NOVA de Lisboa & NOVA LINCS), Afonso Vilalonga (Universidade NOVA de Lisboa & NOVA LINCS), Kevin Gallagher (Universidade NOVA de Lisboa & NOVA LINCS), Henrique Domingos (Universidade NOVA de Lisboa & NOVA LINCS)
- Extended Abstract: Nobody’s Fault but Mine: Using Unauthenticated Unidirectional Pushes for Client Update
[PDF]
Paul Vines (Two Six Technologies)
- Position Paper: A Case for Machine-Checked Verification of Circumvention Systems
[PDF]
Vitor Pereira (Algoritmo Sapiente, LDA), Ahmed Irfan (SRI), Vinod Yegneswaran (SRI), Nick Feamster (University of Chicago), Prateek Mittal (Princeton University), Vitaly Shmatikov (Cornell Tech)
- An Improved BGP Internet Graph for Optimizing Refraction Proxy Placement
[PDF]
Harshith Umesh (Red Hat), Alden W. Jackson (Northeastern University)
- Extended Abstract: I’ll Shake Your Hand: What Happens After DNS Poisoning
[PDF]
Jade Sheffey (UMass Amherst), Ali Zohaib (UMass Amherst), Dayeon Kang (UMass Amherst), Dayeon Kang (Stanford University), Amir Houmansadr (UMass Amherst), Qiang Wu (GFW Report)
- Encrypted Client Hello (ECH) in Censorship Circumvention
[PDF]
Niklas Niere (Paderborn University), Felix Lange (Paderborn University), Nico Heitmann (Paderborn University), Juraj Somorovsky (Paderborn University)
- Probing the third-party infrastructure of digital news on the Web
[PDF]
Ido Sivan-Sevilla (The University of Maryland), Parthav Poudel (The University of Maryland)