{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:30:51Z","timestamp":1742949051549,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031157769"},{"type":"electronic","value":"9783031157776"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_14","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"240-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Blockchains for\u00a0Censorship-Resistant Bootstrapping in\u00a0Anonymity Networks"],"prefix":"10.1007","author":[{"given":"Yang","family":"Han","sequence":"first","affiliation":[]},{"given":"Dawei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"14_CR1","unstructured":"Aryan, S., Aryan, H., Halderman, J.A.: Internet censorship in Iran: a first look. In: 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13) (2013)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Yadav, T.K., Sinha, A., Gosain, D., Sharma, P.K., Chakravarty, S.: Where the light gets in: analyzing web censorship mechanisms in India. In: Proceedings of the Internet Measurement Conference 2018, pp. 252\u2013264 (2018)","DOI":"10.1145\/3278532.3278555"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Ramesh, R., et al.: Decentralized control: a case study of Russia. In: Network and Distributed Systems Security Symposium (2020)","DOI":"10.14722\/ndss.2020.23098"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Technical report, Naval Research Lab Washington DC (2004)","DOI":"10.21236\/ADA465464"},{"key":"14_CR5","unstructured":"Karlin, J., et al.: Decoy routing: toward unblockable internet communication. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI 11) (2011)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Mohajeri Moghaddam, H., Li, B., Derakhshani, M., Goldberg, I.: Skypemorph: protocol obfuscation for Tor bridges. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 97\u2013108 (2012)","DOI":"10.1145\/2382196.2382210"},{"issue":"2","key":"14_CR7","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1515\/popets-2015-0009","volume":"2015","author":"D Fifield","year":"2015","unstructured":"Fifield, D., Lan, C., Hynes, R., Wegmann, P., Paxson, V.: Blocking-resistant communication through domain fronting. Proc. Priv. Enhanc. Technol. 2015(2), 46\u201364 (2015). https:\/\/doi.org\/10.1515\/popets-2015-0009","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"14_CR8","unstructured":"Angel, Y.: obfs4 - the obfourscator. https:\/\/github.com\/Yawning\/obfs4\/"},{"key":"14_CR9","unstructured":"Brandom, R.: Amazon web services starts blocking domain-fronting, following Google\u2019s lead (2018). https:\/\/www.theverge.com\/2018\/4\/30\/17304782\/amazon-domain-fronting-google-discontinued"},{"key":"14_CR10","unstructured":"Snowflake: pluggable transport using WebRTC. https:\/\/gitlab.torproject.org\/tpo\/anti-censorship\/pluggable-transports\/snowflake\/"},{"key":"14_CR11","unstructured":"Snowflake moving to stable in Tor browser 10.5 (2021). https:\/\/blog.torproject.org\/ snowflake-in-tor-browser-stable\/"},{"key":"14_CR12","unstructured":"Users - Bridge user by transport. https:\/\/metrics.torproject.org\/userstats-bridge-transport.html?transport=obfs4 &transport=meek &transport=snowflake"},{"key":"14_CR13","unstructured":"BRIDGES. https:\/\/tb-manual.torproject.org\/bridges\/"},{"key":"14_CR14","unstructured":"Wang, Q., Lin, Z., Borisov, N., Hopper, N.: rBridge: user reputation based Tor bridge distribution with privacy preservation. In: Network and Distributed Systems Security Symposium (2013)"},{"issue":"4","key":"14_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1515\/popets-2016-0026","volume":"2016","author":"F Douglas","year":"2016","unstructured":"Douglas, F., Rorshach, W.P., Pan, W., Caesar, M.: Salmon: robust proxy distribution for censorship circumvention. Proc. Priv. Enhanc. Technol. 2016(4), 4\u201320 (2016). https:\/\/doi.org\/10.1515\/popets-2016-0026","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-319-69084-1_32","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"M Zamani","year":"2017","unstructured":"Zamani, M., Saia, J., Crandall, J.: TorBricks: blocking-resistant Tor bridge distribution. In: Spirakis, P., Tsigas, P. (eds.) SSS 2017. LNCS, vol. 10616, pp. 426\u2013440. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69084-1_32"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Nasr, M., Farhang, S., Houmansadr, A., Grossklags, J.: Enemy at the gateways: censorship-resilient proxy distribution using game theory. In: Network and Distributed Systems Security Symposium (2019)","DOI":"10.14722\/ndss.2019.23496"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"RL Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552\u2013565. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_32"},{"key":"14_CR19","unstructured":"Tor Metrics. https:\/\/metrics.torproject.org"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Mani, A., Wilson-Brown, T., Jansen, R., Johnson, A., Sherr, M.: Understanding Tor usage with privacy-preserving measurement. In: 2018 Proceedings of the Internet Measurement Conference, pp. 175\u2013187 (2018)","DOI":"10.1145\/3278532.3278549"},{"key":"14_CR21","unstructured":"Choffnes, D., Gill, P., Mislove, A.: An empirical evaluation of deployed DPI middleboxes and their implications for policymakers. In: Proceedings of TPRC (2017)"},{"key":"14_CR22","doi-asserted-by":"publisher","unstructured":"Li, F., et al.: lib$$\\bullet $$ erate,(n) a library for exposing (traffic-classification) rules and avoiding them efficiently. In: Proceedings of the 2017 Internet Measurement Conference, pp. 128\u2013141 (2017). https:\/\/doi.org\/10.1145\/3131365.3131376","DOI":"10.1145\/3131365.3131376"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Matic, S., Troncoso, C., Caballero, J.: Dissecting Tor bridges: a security evaluation of their private and public infrastructures. In: Network and Distributed Systems Security Symposium, pp. 1\u201315. The Internet Society (2017)","DOI":"10.14722\/ndss.2017.23345"},{"key":"14_CR24","unstructured":"Jansen, R., Vaidya, T., Sherr, M.: Point break: a study of bandwidth $$\\{$$Denial-of-Service$$\\}$$ attacks against Tor. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1823\u20131840 (2019)"},{"key":"14_CR25","unstructured":"BridgeDB. https:\/\/bridges.torproject.org\/"},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Ling, Z., Luo, J., Yu, W., Yang, M., Fu, X.: Extensive analysis and large-scale empirical evaluation of Tor bridge discovery. In: 2012 Proceedings IEEE INFOCOM, pp. 2381\u20132389. IEEE (2012). https:\/\/doi.org\/10.1109\/infcom.2012.6195627","DOI":"10.1109\/infcom.2012.6195627"},{"key":"14_CR27","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: $$\\{$$ZMap$$\\}$$: fast internet-wide scanning and its security applications. In: 22nd USENIX Security Symposium (USENIX Security 13), pp. 605\u2013620 (2013)"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData congress), pp. 557\u2013564. IEEE (2017)","DOI":"10.1109\/BigDataCongress.2017.85"},{"issue":"2014","key":"14_CR29","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"14_CR30","unstructured":"Qu, M.: Sec 2: Recommended elliptic curve domain parameters. Certicom Res., Mississauga, ON, Canada, Technical report SEC2-Ver-0.6 (1999)"},{"key":"14_CR31","unstructured":"Ethereum Mainnet Statistics (2022). https:\/\/www.ethernodes.org\/countries"},{"key":"14_CR32","unstructured":"REACHABLE BITCOIN NODES (2022). https:\/\/bitnodes.io\/"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Recabarren, R., Carbunar, B.: Tithonus: a bitcoin based censorship resilient system. arXiv preprint arXiv:1810.00279 (2018)","DOI":"10.2478\/popets-2019-0005"},{"issue":"1","key":"14_CR34","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/tii.2019.2939797","volume":"16","author":"S He","year":"2019","unstructured":"He, S., Tang, Q., Wu, C.Q., Shen, X.: Decentralizing IoT management systems using blockchain for censorship resistance. IEEE Trans. Industr. Inf. 16(1), 715\u2013727 (2019). https:\/\/doi.org\/10.1109\/tii.2019.2939797","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"3","key":"14_CR35","doi-asserted-by":"publisher","first-page":"404","DOI":"10.2478\/popets-2020-0058","volume":"2020","author":"M Minaei","year":"2020","unstructured":"Minaei, M., Moreno-Sanchez, P., Kate, A.: MoneyMorph: censorship resistant rendezvous using permissionless cryptocurrencies. Proc. Priv. Enhanc. Technol. 2020(3), 404\u2013424 (2020). https:\/\/doi.org\/10.2478\/popets-2020-0058","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"14_CR36","unstructured":"Ahsan, K.: Covert channel analysis and data hiding in TCP\/IP. MA Sc. thesis, Department of Electrical and Computer Engineering, University of Toronto (2002)"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15\u201329 (2014)","DOI":"10.1145\/2660267.2660379"},{"issue":"3","key":"14_CR38","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/cryptography2030018","volume":"2","author":"J Partala","year":"2018","unstructured":"Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3), 18 (2018). https:\/\/doi.org\/10.3390\/cryptography2030018","journal-title":"Cryptography"},{"issue":"2","key":"14_CR39","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.001.1900225","volume":"34","author":"F Gao","year":"2020","unstructured":"Gao, F., Zhu, L., Gai, K., Zhang, C., Liu, S.: Achieving a covert channel over an open blockchain network. IEEE Netw. 34(2), 6\u201313 (2020)","journal-title":"IEEE Netw."},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Alsalami, N., Zhang, B.: Uncontrolled randomness in blockchains: covert bulletin board for illicit activity. In: 2020 IEEE\/ACM 28th International Symposium on Quality of Service (IWQoS), pp. 1\u201310. IEEE (2020)","DOI":"10.1109\/IWQoS49365.2020.9213064"},{"key":"14_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2021.3057333","author":"L Zhang","year":"2021","unstructured":"Zhang, L., Zhang, Z., Wang, W., Jin, Z., Su, Y., Chen, H.: Research on a covert communication model realized by using smart contracts in blockchain environment. IEEE Syst. J. (2021). https:\/\/doi.org\/10.1109\/jsyst.2021.3057333","journal-title":"IEEE Syst. J."},{"key":"14_CR42","unstructured":"Buy ethereum anonymously. https:\/\/www.cryptimi.com\/buy-cryptocurrency\/buy-ethereum-eth#buy-ethereum-anonymously"},{"key":"14_CR43","unstructured":"Gayoso Mart\u00ednez, V., Hern\u00e1ndez Encinas, L., S\u00e1nchez \u00c1vila, C.: A survey of the elliptic curve integrated encryption scheme (2010)"},{"key":"14_CR44","unstructured":"Understanding denial-of-service attacks (2019). https:\/\/www.cisa.gov\/uscert\/ncas \/tips\/ST04-015"},{"key":"14_CR45","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on $$\\{$$Bitcoin\u2019s$$\\}$$$$\\{$$peer-to-peer$$\\}$$ network. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 129\u2013144 (2015)"},{"key":"14_CR46","doi-asserted-by":"publisher","unstructured":"Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (S &P), pp. 375\u2013392. IEEE (2017). https:\/\/doi.org\/10.1109\/sp.2017.29","DOI":"10.1109\/sp.2017.29"},{"key":"14_CR47","doi-asserted-by":"crossref","unstructured":"Mirkin, M., Ji, Y., Pang, J., Klages-Mundt, A., Eyal, I., Juels, A.: BDoS: blockchain denial-of-service. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 601\u2013619 (2020)","DOI":"10.1145\/3372297.3417247"},{"key":"14_CR48","unstructured":"Average Transaction Fee Chart. https:\/\/etherscan.io\/chart\/avg-txfee-usd"},{"key":"14_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-642-14992-4_19","volume-title":"Financial Cryptography and Data Security","author":"K Loesing","year":"2010","unstructured":"Loesing, K., Murdoch, S.J., Dingledine, R.: A case study on measuring statistical data in the Tor anonymity network. In: Sion, R., et al. (eds.) FC 2010. LNCS, vol. 6054, pp. 203\u2013215. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14992-4_19"},{"key":"14_CR50","unstructured":"Ethereum Node Tracker. https:\/\/etherscan.io\/nodetracker"},{"key":"14_CR51","unstructured":"An example of request transaction. https:\/\/4el5.short.gy\/VMT3U0"},{"key":"14_CR52","unstructured":"An example of response transaction. https:\/\/4el5.short.gy\/s9Mi4R"},{"key":"14_CR53","doi-asserted-by":"crossref","unstructured":"Andre, G., Alexandra, D., Samuel, K.: SmarTor: smarter tor with smart contracts: improving resilience of topology distribution in the Tor network. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 677\u2013691 (2018)","DOI":"10.1145\/3274694.3274722"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:07:32Z","timestamp":1709831252000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}