{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:05:34Z","timestamp":1758891934276,"version":"3.40.3"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319458700"},{"type":"electronic","value":"9783319458717"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45871-7_16","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T04:25:24Z","timestamp":1472099124000},"page":"253-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Leveraging Internet Services to Evade Censorship"],"prefix":"10.1007","author":[{"given":"Apostolis","family":"Zarras","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"key":"16_CR1","unstructured":"MailMyWeb, June 2013. \n                      http:\/\/www.mailmyweb.com"},{"key":"16_CR2","unstructured":"The Foe Project, November 2013. \n                      https:\/\/code.google.com\/p\/foe-project"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: a system for anonymous and unobservable internet access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"16_CR4","unstructured":"Boyan, J.: The anonymizer - protecting user privacy on the web. Comput. Mediated Commun. Mag. 4(9) (1997)"},{"key":"16_CR5","unstructured":"Burnett, S., Feamster, N., Vempala, S.: Chipping away at censorship firewalls with user-generated content. In: USENIX Security Symposium (2010)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., De Cristofaro, E., Francillon, A., Kaafar, M.-A.: EphPub: toward robust Ephemeral Publishing. In: IEEE International Conference on Network Protocols (2011)","DOI":"10.1109\/ICNP.2011.6089048"},{"issue":"2","key":"16_CR7","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"16_CR8","volume-title":"The Social Economy: Unlocking Value and Productivity Through Social Technologies","author":"M Chui","year":"2012","unstructured":"Chui, M., Manyika, J., Bughin, J., Dobbs, R., Roxburgh, C., Sarrazin, H., Westergren, M.: The Social Economy: Unlocking Value and Productivity Through Social Technologies. McKinsey, New York (2012)"},{"key":"16_CR9","unstructured":"Crandall, J.R., Zinn, D., Byrd, M., Barr, E.T., East, R.: ConceptDoppler: a weather tracker for internet censorship. In: ACM Conference on Computer and Communications Security, CCS (2007)"},{"key":"16_CR10","unstructured":"Crispin, J.: The importance of VoIP and a business continuity plan for business survival, June 2011. \n                      http:\/\/www.tech2date.com\/the-importance-of-voip-and-a-business-continuity-plan-for-business-survival.html"},{"key":"16_CR11","unstructured":"Dai, W.: Pipenet 1.1. Usenet post (1996)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Squarcella, C., Aben, E., Claffy, K.C., Chiesa, M., Russo, M., Pescap\u00e9, A.: Analysis of country-wide internet outages caused by censorship. In: ACM SIGCOMM Conference on Internet Measurement, IMC (2011)","DOI":"10.1145\/2068816.2068818"},{"key":"16_CR13","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type III anonymous remailer protocol. In: IEEE Symposium on Security and Privacy (2003)"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-642-22792-9_27","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"R Dingledine","year":"2011","unstructured":"Dingledine, R.: Tor and circumvention: lessons learned. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 485\u2013486. Springer, Heidelberg (2011)"},{"key":"16_CR15","unstructured":"Dingledine, R., Mathewson, N.: Design of a blocking-resistant anonymity system. The Tor Project, Technical report, 11:15\u201316 (2006)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: USENIX Security Symposium (2004)","DOI":"10.21236\/ADA465464"},{"key":"16_CR17","unstructured":"Douglas, T.L.: The importance of VoIP, May 2010. \n                      http:\/\/ezinearticles.com\/?The-Importance-of-VoIP&id=4278231"},{"key":"16_CR18","unstructured":"Dynamic Internet Technology: Dynaweb, November 2013. \n                      http:\/\/www.dit-inc.us\/dynaweb"},{"key":"16_CR19","unstructured":"Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.R.: Infranet: circumventing web censorship and surveillance. In: USENIX Security Symposium (2002)"},{"key":"16_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-40956-4_9","volume-title":"Privacy Enhancing Technologies","author":"N Feamster","year":"2003","unstructured":"Feamster, N., Balazinska, M., Wang, W., Balakrishnan, H., Karger, D.R.: Thwarting web censorship with untrusted messenger discovery. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 125\u2013140. Springer, Heidelberg (2003)"},{"key":"16_CR21","unstructured":"Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: USENIX Security Symposium (2009)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Geddes, J., Schuchard, M., Hopper, N.: Cover your ACKs: pitfalls of covert channel censorship circumvention. In: ACM Conference on Computer and Communications Security, CCS (2013)","DOI":"10.1145\/2508859.2516742"},{"key":"16_CR23","unstructured":"Global Internet Freedom Consortium (GIFC): The great firewall revealed, December 2002. \n                      http:\/\/www.internetfreedom.org\/files\/WhitePaper\/ChinaGreatFirewallRevealed.pdf"},{"key":"16_CR24","unstructured":"Gulcu, C., Tsudik, G.: Mixing e-mail with Babel. In: ISOC Network and Distributed System Security Symposium, NDSS (1996)"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Houmansadr, A., Brubaker, C., Shmatikov, V.: The parrot is dead: observing unobservable network communications. In: IEEE Symposium on Security and Privacy (2013)","DOI":"10.1109\/SP.2013.14"},{"key":"16_CR26","unstructured":"Houmansadr, A., Riedl, T., Borisov, N., Singer, A.: I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. In: ISOC Network and Distributed System Security Symposium, NDSS (2013)"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Leberknight, C.S., Chiang, M., Poor, H.V., Wong, F.: A taxonomy of internet censorship and anti-censorship, December 2012. \n                      http:\/\/www.princeton.edu\/chiangm\/anticensorship.pdf","DOI":"10.4018\/jep.2012040104"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Leiba, B.: RFC 2177: IMAp. 4 IDLE Command, June 1997","DOI":"10.17487\/rfc2177"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Horvitz, E.: Planetary-scale views on a large instant-messaging network. In: International Conference on World Wide Web, WWW (2008)","DOI":"10.1145\/1367497.1367620"},{"issue":"3","key":"16_CR30","doi-asserted-by":"publisher","first-page":"213","DOI":"10.3233\/JCS-2002-10302","volume":"10","author":"BN Levine","year":"2002","unstructured":"Levine, B.N., Shields, C.: Hordes: a multicast based protocol for anonymity. J. Comput. Secur. 10(3), 213\u2013240 (2002)","journal-title":"J. Comput. Secur."},{"key":"16_CR31","unstructured":"MacKinnon, R.: Race to the bottom-corporate complicity in Chinese internet censorship. In: Human Rights Watch, HRW (2009)"},{"key":"16_CR32","unstructured":"Mathewson, N.: The Tor project - a simple obfuscating proxy, November 2013. \n                      https:\/\/gitweb.torproject.org\/obfsproxy.git"},{"key":"16_CR33","unstructured":"McCoy, D., Morales, J.A., Levchenko, K.: Proximax: a measurement based system for proxies dissemination. In: International Conference on Financial Cryptography and Data Security, FC (2011)"},{"key":"16_CR34","unstructured":"McMillan, R.: China\u2019s great firewall spreads overseas, March 2010. \n                      http:\/\/www.networkworld.com\/news\/2010\/032510-chinas-great-firewall-spreads.html"},{"key":"16_CR35","unstructured":"Moghaddam, H.M., Li, B., Derakhshani, M., Goldberg, I.: SkypeMorph: protocol obfuscation for Tor bridges. In: ACM Conference on Computer and Communications Security, CCS (2012)"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., Zarras, A., Holz, T., Markatos, E.P.: K-subscription: privacy-preserving microblogging browsing through obfuscation. In: Annual Computer Security Applications Conference, ACSAC (2013)","DOI":"10.1145\/2523649.2523671"},{"key":"16_CR37","first-page":"51","volume":"1","author":"R Perlman","year":"2005","unstructured":"Perlman, R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. (JISSec) 1, 51\u201368 (2005)","journal-title":"J. Inf. Syst. Secur. (JISSec)"},{"key":"16_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-39650-5_7","volume-title":"Computer Security \u2013 ESORICS 2003","author":"A Serjantov","year":"2003","unstructured":"Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116\u2013131. Springer, Heidelberg (2003)"},{"key":"16_CR39","unstructured":"Sherwood, R., Bhattacharjee, B., Srinivasan, A.: \n                      \n                        \n                      \n                      $$P^5$$\n                    : a protocol for scalable anonymous communication. In: IEEE Symposium on Security and Privacy (2002)"},{"key":"16_CR40","unstructured":"Statista: Daily time spent playing video games per capita in the United States, September 2014. \n                      http:\/\/www.statista.com\/statistics\/186960\/time-spent-with-videogames-in-the-us-since-2002"},{"key":"16_CR41","unstructured":"Statistic Brain: Skype statistics, September 2012. \n                      http:\/\/www.statisticbrain.com\/skype-statistics"},{"key":"16_CR42","unstructured":"Ultrareach Internet Corporation: Ultrasurf, November 2013. \n                      http:\/\/www.ultrasurf.us"},{"key":"16_CR43","unstructured":"Walsh, K., Sirer, E.G.: Experience with an object reputation system for peer-to-peer filesharing. In: USENIX Symposium on Networked Systems Design and Implementation, NSDI (2006)"},{"key":"16_CR44","doi-asserted-by":"crossref","unstructured":"Wang, Q., Gong, X., Nguyen, G.T., Houmansadr, A., Borisov, N.: CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing. In: ACM Conference on Computer and Communications Security, CCS (2012)","DOI":"10.1145\/2382196.2382212"},{"key":"16_CR45","doi-asserted-by":"crossref","unstructured":"Weinberg, Z., Wang, J., Yegneswaran, V., Briesemeister, L., Cheung, S., Wang, F., Boneh, D.: StegoTorus: a camouflage proxy for the Tor anonymity system. In: ACM Conference on Computer and Communications Security, CCS (2012)","DOI":"10.1145\/2382196.2382211"},{"key":"16_CR46","unstructured":"Wilkins, B.: 25 shocking facts about Chinese censorship, July 2009. \n                      http:\/\/www.onlinecollege.org\/2009\/07\/05\/25-shocking-facts-about-chinese-censorship"},{"key":"16_CR47","doi-asserted-by":"crossref","unstructured":"Zander, S., Armitage, G., Branch, P.: Covert channels in multiplayer first person shooter online games. In: IEEE Conference on Local Computer Networks, LCN (2008)","DOI":"10.1109\/LCN.2008.4664172"},{"key":"16_CR48","doi-asserted-by":"crossref","unstructured":"Zander, S., Armitage, G., Branch, P.: Reliable transmission over covert channels in first person shooter multiplayer games. In: IEEE Conference on Local Computer Networks, LCN (2009)","DOI":"10.1109\/LCN.2009.5355205"},{"key":"16_CR49","doi-asserted-by":"crossref","unstructured":"Zarras, A., Kohls, K., D\u00fcrmuth, M., P\u00f6pper, C.: Neuralyzer: flexible expiration times for the revocation of online data. In: ACM Conference on Data and Application Security and Privacy, CODASPY (2016)","DOI":"10.1145\/2857705.2857714"},{"key":"16_CR50","unstructured":"Zhou, W., Houmansadr, A., Caesar, M., Borisov, N.: SWEET: serving the web by exploiting email tunnels. In: Privacy Enhancing Technologies Symposium, PETS (2013)"},{"key":"16_CR51","unstructured":"Zhu, T., Bronk, C., Wallach, D.S.: An analysis of Chinese search engine filtering. arXiv preprint \n                      arXiv:1107.3794\n                      \n                     (2011)"},{"key":"16_CR52","unstructured":"Zhu, T., Phipps, D., Pridgen, A., Crandall, J.R., Wallach, D.S.: The velocity of censorship: high-fidelity detection of microblog post deletions. In: USENIX Security Symposium (2013)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45871-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:08:22Z","timestamp":1558314502000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45871-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458700","9783319458717"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45871-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"26 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Honolulu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}