{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:23:39Z","timestamp":1743071019112,"version":"3.40.3"},"publisher-location":"Cham","reference-count":72,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031562518"},{"type":"electronic","value":"9783031562525"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56252-5_2","type":"book-chapter","created":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T06:51:26Z","timestamp":1710831086000},"page":"19-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Out in\u00a0the\u00a0Open: On the\u00a0Implementation of\u00a0Mobile App Filtering in\u00a0India"],"prefix":"10.1007","author":[{"given":"Devashish","family":"Gosain","sequence":"first","affiliation":[]},{"given":"Kartikey","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Rishi","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Jithin","family":"Suresh Babu","sequence":"additional","affiliation":[]},{"given":"Sambuddho","family":"Chakravaty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"key":"2_CR1","unstructured":"Indian government bans 220 apps. https:\/\/bit.ly\/31ECpeA"},{"key":"2_CR2","unstructured":"The Indian telecom services performance indicators report. https:\/\/www.trai.gov.in\/sites\/default\/files\/QPIR_0.pdf"},{"key":"2_CR3","unstructured":"Iran bans messaging apps. https:\/\/en.radiofarda.com\/a\/iran-lawmakers-aim-to-fully-ban-all-foreign-messaging-apps\/30802448.html"},{"key":"2_CR4","unstructured":"Jadx decompiler. https:\/\/github.com\/skylot\/jadx"},{"key":"2_CR5","unstructured":"List of blocked apps. https:\/\/pib.gov.in\/PressReleseDetailm.aspx?PRID=1635206"},{"key":"2_CR6","unstructured":"List of blocked apps. https:\/\/pib.gov.in\/PressReleasePage.aspx?PRID=1650669"},{"key":"2_CR7","unstructured":"List of blocked apps. https:\/\/www.pib.gov.in\/PressReleasePage.aspx?PRID=1675335"},{"key":"2_CR8","unstructured":"Missing links: A comparison of search censorship in China. https:\/\/citizenlab.ca\/2023\/04\/a-comparison-of-search-censorship-in-china\/"},{"key":"2_CR9","unstructured":"Mitm proxy. https:\/\/mitmproxy.org\/"},{"key":"2_CR10","unstructured":"No access: Lgbtiq website censorship in six countries. https:\/\/citizenlab.ca\/2021\/08\/no-access-lgbtiq-website-censorship-in-six-countries\/"},{"key":"2_CR11","unstructured":"Not OK on VK an analysis of in-platform censorship on Russia\u2019s VKontakte. https:\/\/citizenlab.ca\/2023\/07\/an-analysis-of-in-platform-censorship-on-russias-vkontakte\/"},{"key":"2_CR12","unstructured":"Planet blue coat: Mapping global censorship and surveillance tools. https:\/\/citizenlab.ca\/2013\/01\/planet-blue-coat-mapping-global-censorship-and-surveillance-tools\/"},{"key":"2_CR13","unstructured":"Press Information Bureau (Government of India) officially confirms the ban of 59 Chinese apps. https:\/\/pib.gov.in\/PressReleseDetailm.aspx?PRID=1635206"},{"key":"2_CR14","unstructured":"Pubg to be relaunched in India. https:\/\/bit.ly\/39viUcu"},{"key":"2_CR15","unstructured":"Tiktok blocked in India. https:\/\/www.nytimes.com\/2020\/06\/29\/world\/asia\/tik-tok-banned-india-china.html"},{"key":"2_CR16","unstructured":"Total downloads of Tiktok app. https:\/\/www.theverge.com\/2020\/4\/29\/21241788\/tiktok-app-download-numbers-update-2-billion-users"},{"key":"2_CR17","unstructured":"Triple threat: NSO group\u2019s pegasus spyware returns in 2022 with a trio of iOS 15 and iOS 16 zero-click exploit chains. https:\/\/citizenlab.ca\/2023\/04\/nso-groups-pegasus-spyware-returns-in-2022\/"},{"key":"2_CR18","unstructured":"Website of Canadian bobsledder blocked in Russia due to collateral filtering. https:\/\/citizenlab.ca\/2014\/02\/website-of-canadian-bobsledder-blocked-in-sochi\/"},{"key":"2_CR19","unstructured":"what-do-ooni-probe-tests-do? https:\/\/ooni.org\/support\/faq\/_what-do-ooni-probe-tests-do"},{"key":"2_CR20","unstructured":"What is citizen lab? https:\/\/citizenlab.ca\/about\/"},{"key":"2_CR21","unstructured":"You move, they follow: Uncovering Iran\u2019s mobile legal intercept system. https:\/\/citizenlab.ca\/2023\/01\/uncovering-irans-mobile-legal-intercept-system\/"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Aceto, G., et al.: Internet censorship in Italy: an analysis of 3G\/4G networks. In: IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICC.2017.7996467"},{"key":"2_CR23","unstructured":"Alharbi, F., et al.: Opening digital borders cautiously yet decisively: digital filtering in Saudi Arabia. In: 10th USENIX Workshop on Free and Open Communications on the Internet (2020)"},{"key":"2_CR24","unstructured":"Anonymous: Censored Commemoration Chinese Live Streaming Platform YY Focuses Censorship on June 4 Memorials and Activism in Hong Kong. https:\/\/citizenlab.ca\/2019\/06\/censored-commemoration-chinese-live-streaming-platform-yy-focuses-censorship-june-4-memorials-activism-hong-kong\/"},{"key":"2_CR25","unstructured":"Niaki, A.A., Hoang, N.P., Gill, P., Houmansadr, A.: Triplet censors: demystifying great firewall\u2019s DNS censorship behavior. In: USENIX workshop on Free and Open Communications on the Internet (FOCI). USENIX Association (2020)"},{"key":"2_CR26","unstructured":"Aryan, S., et al.: Internet censorship in Iran: a first look. In: USENIX workshop on Free and Open Communications on the Internet (FOCI) (2013)"},{"key":"2_CR27","unstructured":"BBC: China bans mobile apps. https:\/\/www.bbc.com\/news\/technology-55230654"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Beauchamp, T.L.: The belmont report. In: The Oxford Textbook of Clinical Research Ethics, pp. 149\u2013155 (2008)","DOI":"10.1093\/oso\/9780195168655.003.0015"},{"key":"2_CR29","unstructured":"Beznazwy, J., Houmansadr, A.: How China detects and blocks shadowsocks. In: Proceedings of the Internet Measurement Conference, pp. 111\u2013124 (2020)"},{"key":"2_CR30","unstructured":"Bock, K., et al.: Detecting and evading $$\\{$$Censorship-in-Depth$$\\}$$: a case study of $$\\{$$Iran\u2019s$$\\}$$ protocol whitelister. In: 10th USENIX Workshop on Free and Open Communications on the Internet (2020)"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Calder, M., et al.: Mapping the expansion of Google\u2019s serving infrastructure. In: Proceedings Internet Measurement Conference, pp. 313\u2013326. ACM (2013)","DOI":"10.1145\/2504730.2504754"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Calder, M., et al.: Analyzing the performance of an anycast CDN. In: Proceedings of Internet Measurement Conference, pp. 531\u2013537. ACM (2015)","DOI":"10.1145\/2815675.2815717"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Chaabane, A., et al.: Censorship in the wild: analyzing internet filtering in Syria. In: Proceedings of Internet Measurement Conference, pp. 285\u2013298. ACM (2014)","DOI":"10.1145\/2663716.2663720"},{"key":"2_CR34","unstructured":"Chai, Z., et al.: On the importance of encrypted-SNI (ESNI) to censorship circumvention. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2019)"},{"key":"2_CR35","unstructured":"Cicalese, D., et al.: A first look at anycast CDN traffic. arXiv preprint arXiv:1505.00946 (2015)"},{"key":"2_CR36","unstructured":"Deibert, R.: Citizel lab\u2019s list of publication. https:\/\/citizenlab.ca\/publications\/\/"},{"key":"2_CR37","unstructured":"Dittrich, D., et al.: The menlo report: ethical principles guiding information and communication technology research. Technical report, US Department of Homeland Security (2012)"},{"key":"2_CR38","unstructured":"Dunna, A., et al.: Analyzing China\u2019s blocking of unpublished tor bridges. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2018)"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Ensafi, R., et al.: Examining how the great firewall discovers hidden circumvention servers. In: Proceedings of Internet Measurement Conference, pp. 445\u2013458 (2015)","DOI":"10.1145\/2815675.2815690"},{"key":"2_CR40","unstructured":"Filasto, A., Appelbaum, J.: OONI: open observatory of network interference. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2012)"},{"key":"2_CR41","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-319-78813-5_21","volume-title":"Security and Privacy in Communication Systems","author":"D Gosain","year":"2017","unstructured":"Gosain, D., et al.: Mending wall: on the implementation of censorship in India. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017, pp. 418\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-78813-5_21"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Griffiths, J.: The Great Firewall of China: How to build and control an alternative version of the internet. Zed Books Ltd. (2019)","DOI":"10.5040\/9781350225497"},{"key":"2_CR43","unstructured":"Jermyn, J., Weaver, N.: Autosonda: discovering rules and triggers of censorship devices. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2017)"},{"key":"2_CR44","unstructured":"Khattak, S., et al.: Towards illuminating a censorship monitor\u2019s model to facilitate evasion. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2013)"},{"key":"2_CR45","unstructured":"Knockel, J., Ruan, L.: Bada Bing, Bada Boom: Microsoft Bing\u2019s Chinese Political Censorship of Autosuggestions in North America. https:\/\/citizenlab.ca\/2022\/05\/bada-bing-bada-boom-microsoft-bings-chinese-political-censorship-autosuggestions-north-america\/"},{"key":"2_CR46","unstructured":"Knockel, J., et al.: Measuring decentralization of Chinese keyword censorship via mobile games. In: USENIX workshop on Free and Open Communications on the Internet (FOCI) (2017)"},{"key":"2_CR47","unstructured":"Kumar, R., et al.: A large-scale investigation into geodifferences in mobile apps. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 1203\u20131220 (2022)"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Levis, P.: The collateral damage of internet censorship by DNS injection. ACM SIGCOMM CCR 42(3) (2012)","DOI":"10.1145\/2317307.2317311"},{"key":"2_CR49","doi-asserted-by":"crossref","unstructured":"Li, F., et al.: lib$$\\bullet $$ erate,(n) a library for exposing (traffic-classification) rules and avoiding them efficiently. In: Proceedings of Internet Measurement Conference, pp. 128\u2013141 (2017)","DOI":"10.1145\/3131365.3131376"},{"key":"2_CR50","unstructured":"MacRae, P.: India-china border tension: app developers, tech sector win with chinese apps banned. https:\/\/www.scmp.com\/week-asia\/economics\/article\/3170368\/india-china-border-tension-app-developers-tech-sector-win"},{"key":"2_CR51","unstructured":"Marczak, B., et al.: An analysis of China\u2019s great cannon. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2015)"},{"key":"2_CR52","unstructured":"Marczak, B., et al.: China\u2019s great cannon. Citizen Lab 10 (2015)"},{"key":"2_CR53","doi-asserted-by":"crossref","unstructured":"McDonald, A., et al.: 403 forbidden: a global view of CDN geoblocking. In: Proceedings of the Internet Measurement Conference 2018, pp. 218\u2013230 (2018)","DOI":"10.1145\/3278532.3278552"},{"key":"2_CR54","unstructured":"Nabi, Z.: The anatomy of web censorship in Pakistan. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2013)"},{"key":"2_CR55","doi-asserted-by":"crossref","unstructured":"Niaki, A.A., et al.: IClab: a global, longitudinal internet censorship measurement platform. In: IEEE Symposium on Security and Privacy (SP), pp. 135\u2013151 (2020)","DOI":"10.1109\/SP40000.2020.00014"},{"key":"2_CR56","unstructured":"O\u2019Driscoll, A.: Apps banned in Russia. https:\/\/www.comparitech.com\/blog\/vpn-privacy\/websites-blocked-russia\/"},{"key":"2_CR57","unstructured":"Punj, V.: App ban in India could be temporary. https:\/\/www.businesstoday.in\/current\/economy-politics\/tiktok-denies-plans-for-legal-recourse-against-ban\/story\/408741.html"},{"key":"2_CR58","doi-asserted-by":"crossref","unstructured":"Ramesh, R., et al.: Decentralized control: a case study of Russia. In: Network and Distributed Systems Security (NDSS) Symposium (2020)","DOI":"10.14722\/ndss.2020.23098"},{"key":"2_CR59","unstructured":"Rowley, J.: Certificate pinning. https:\/\/www.digicert.com\/dc\/blog\/certificate-pinning-what-is-certificate-pinning\/"},{"key":"2_CR60","doi-asserted-by":"crossref","unstructured":"Singh, K., et al.: How India censors the web. In: 12th ACM Conference on Web Science, pp. 21\u201328 (2020)","DOI":"10.1145\/3394231.3397891"},{"key":"2_CR61","doi-asserted-by":"crossref","unstructured":"Sundara Raman, R., et al.: Censored planet: an internet-wide, longitudinal censorship observatory. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 49\u201366 (2020)","DOI":"10.1145\/3372297.3417883"},{"key":"2_CR62","unstructured":"Bansal, V.: VPN Providers Flee India as a New Data Law Takes Hold. https:\/\/www.wired.co.uk\/article\/vpn-firms-flee-india-data-collection-law"},{"key":"2_CR63","unstructured":"Verkamp, J.P., Gupta, M.: Inferring mechanics of web censorship around the world. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2012)"},{"key":"2_CR64","doi-asserted-by":"crossref","unstructured":"Ververis, V., et al.: Understanding internet censorship in Europe: the case of Spain. In: 13th ACM Web Science Conference 2021, pp. 319\u2013328 (2021)","DOI":"10.1145\/3447535.3462638"},{"key":"2_CR65","doi-asserted-by":"crossref","unstructured":"Ververis, V., et al.: Shedding light on mobile app store censorship. In: Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization, pp. 193\u2013198 (2019)","DOI":"10.1145\/3314183.3324965"},{"key":"2_CR66","unstructured":"Ververis, V., et al.: Understanding internet censorship policy: the case of Greece. In: USENIX Workshop on Free and Open Communications on the Internet (2015)"},{"key":"2_CR67","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Your state is not mine: a closer look at evading stateful internet censorship. In: Proceedings of the Internet Measurement Conference, pp. 114\u2013127 (2017)","DOI":"10.1145\/3131365.3131374"},{"key":"2_CR68","unstructured":"Winter, P., Lindskog, S.: How the great firewall of china is blocking tor. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI) (2012)"},{"key":"2_CR69","doi-asserted-by":"crossref","unstructured":"Wohlfart, F., et al.: Leveraging interconnections for performance: the serving infrastructure of a large CDN. In: Proceedings of the SIGCOMM 2018, pp. 206\u2013220 (2018)","DOI":"10.1145\/3230543.3230576"},{"key":"2_CR70","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-19260-9_14","volume-title":"Passive and Active Network Measurement","author":"X Xu","year":"2011","unstructured":"Xu, X., et al.: Internet censorship in China: where does the filtering occur? In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol. 6579, pp. 133\u2013142. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19260-9_14"},{"key":"2_CR71","doi-asserted-by":"crossref","unstructured":"Xue, D., et al.: TSPU: Russia\u2019s decentralized censorship system. In: Proceedings of the 22nd ACM Internet Measurement Conference, pp. 179\u2013194 (2022)","DOI":"10.1145\/3517745.3561461"},{"key":"2_CR72","doi-asserted-by":"crossref","unstructured":"Yadav, T.K., et al.: Where the light gets in: analyzing web censorship mechanisms in India. In: Proceedings of the Internet Measurement Conference 2018 (2018)","DOI":"10.1145\/3278532.3278555"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56252-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T15:34:22Z","timestamp":1731598462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56252-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031562518","9783031562525"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56252-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2024.cs.northwestern.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.42","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}