{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:46Z","timestamp":1772041606000,"version":"3.50.1"},"reference-count":125,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016682","name":"VMware","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016682","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008064","name":"Georgetown University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008064","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,19]]},"DOI":"10.1109\/sp54263.2024.00036","type":"proceedings-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:32Z","timestamp":1725558992000},"page":"3497-3514","source":"Crossref","is-referenced-by-count":2,"title":["NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge"],"prefix":"10.1109","author":[{"given":"Patrick Tser Jern","family":"Kon","sequence":"first","affiliation":[{"name":"Rice University"}]},{"given":"Aniket","family":"Gattani","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Dhiraj","family":"Saharia","sequence":"additional","affiliation":[{"name":"Georgetown University"}]},{"given":"Tianyu","family":"Cao","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Diogo","family":"Barradas","sequence":"additional","affiliation":[{"name":"University of Waterloo"}]},{"given":"Ang","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[{"name":"Georgetown University"}]},{"given":"Benjamin E.","family":"Ujcich","sequence":"additional","affiliation":[{"name":"Georgetown University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/13510347.2021.1922390"},{"key":"ref2","volume-title":"Freedom on the net. the rise of digital authoritarianism","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046730"},{"key":"ref6","first-page":"159","article-title":"TapDance: End-to-Middle Anticensorship without Flow Blocking","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Wustrow"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0051"},{"key":"ref8","article-title":"Telex: Anticensorship in the network infrastructure","volume-title":"Proceedigns of the 20th USENIX Security Symposium","author":"Wustrow"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363218"},{"key":"ref10","article-title":"Decoy routing: Toward unblockable internet communication","volume-title":"USENIX workshop on free and open communications on the Internet (FOCI 11)","author":"Karlin"},{"key":"ref11","article-title":"Lantern"},{"key":"ref12","article-title":"Psiphon"},{"key":"ref13","first-page":"3327","article-title":"Domain shadowing: Leveraging content delivery networks for robust blocking-resistant communications","volume-title":"Proceedings of the 30th USENIX Security Symposium","author":"Wei"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v14i2.2378"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1353\/jod.2011.0022"},{"key":"ref16","article-title":"Promoting Global Internet Freedom: Policy and Technology","volume":"23","author":"Figliola","year":"2013","journal-title":"Congressional Research Service"},{"key":"ref17","article-title":"[torproject] Tor blocking events in Belarus from 2020-2021"},{"key":"ref18","article-title":"Tor Manual: Bridges","year":"2022"},{"key":"ref19","article-title":"Research problems: Ten ways to discover Tor bridges","volume-title":"Tor, Blog Post","author":"Dingledine","year":"2011"},{"key":"ref20","article-title":"How the great firewall of china is blocking tor","volume-title":"Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23496"},{"key":"ref22","article-title":"Analyzing china\u2019s blocking of unpublished Tor bridges","volume-title":"Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet","author":"Dunna"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0075"},{"key":"ref25","article-title":"[tor-project] domain fronting to app engine stopped working"},{"key":"ref26","article-title":"Verge: Amazon web services starts blocking domain-fronting, following google\u2019s lead"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134608"},{"key":"ref28","article-title":"[AWS Security Blog] Enhanced domain protections for Amazon CloudFront requests","author":"MacCarthaigh","year":"2018"},{"key":"ref29","article-title":"Gogle Disables \u201dDomain Fronting\" Capability Used to Evade Censors","volume-title":"Ars Technica","author":"Gallagher","year":"2018"},{"key":"ref30","article-title":"Microsoft: Securing our approach to domain fronting within Azure"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813696"},{"key":"ref32","article-title":"Wedge 100bf-32x 100gbe data center switch"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472937"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472889"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0026"},{"key":"ref36","article-title":"Pass it on: social networks stymie censors","volume-title":"Proceedings of the 7th international conference on Peer-to-peer systems","author":"Sovran"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417245"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0029"},{"key":"ref39","article-title":"rBridge: User reputation based Tor bridge distribution with privacy preservation","volume-title":"Proceedings of the 20th Annual Network & Distributed System Security Symposium","author":"Wang"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_13"},{"key":"ref41","volume-title":"Threat modeling and circumvention of Internet censorship.","author":"Fifield","year":"2017"},{"key":"ref42","article-title":"Turbo tunnel, a good way to design censorship circumvention protocols","volume-title":"Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet","author":"Fifield"},{"key":"ref43","article-title":"Evaluating snowflake as an indistinguishable censorship circumvention tool","author":"MacMillan","year":"2020"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3232787"},{"key":"ref45","article-title":"Decoy switching: Circumventing censorship with emerging switch hardware","author":"Lawson"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978365"},{"key":"ref47","article-title":"Signal: A letter from amazon"},{"key":"ref48","article-title":"AWS: Enhanced Domain Protections for Amazon CloudFront Requests"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0023"},{"key":"ref50","article-title":"Tor blog: The Trouble with CloudFlare"},{"key":"ref51","article-title":"[CNBC] Amazon drops Parler from its web hosting service, citing violent posts"},{"key":"ref52","article-title":"[Cloudflare blog] Why We Terminated Daily Stormer"},{"key":"ref53","article-title":"Tor: Fact Sheet: Cloudflare and the Tor Project"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487853"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23511"},{"key":"ref56","article-title":"Tor: Bridges"},{"key":"ref57","article-title":"Snowflake"},{"key":"ref58","first-page":"171","article-title":"{SwiSh}: Distributed shared state abstractions for programmable switches","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Zeno"},{"key":"ref59","article-title":"[Akamai] IPv6 Adoption Visualization"},{"key":"ref60","article-title":"[Cisco] 6lab - The place to monitor IPv6 adoption"},{"key":"ref61","article-title":"[Google] IPv6 statistics"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106947"},{"key":"ref63","article-title":"{HTTPT}: A {Probe-Resistant} proxy","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Frolov"},{"key":"ref64","article-title":"Slitheen++: Stealth TLS-based decoy routing","volume-title":"Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet","author":"Birtel"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23087"},{"key":"ref66","article-title":"shadowsocks-libev"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278562"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561434"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1035"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2766330.2766335"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2567561.2567568"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2559218"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663718"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472922"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472928"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602210"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft54395.2022.9844109"},{"key":"ref78","article-title":"TLSFingerprint.io"},{"key":"ref79","first-page":"667","article-title":"A high-speed load-balancer design with guaranteed per-connection-consistency","volume-title":"Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation","author":"Barbette"},{"key":"ref80","volume-title":"NetShuffle Source Code","year":"2023"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278534"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102941"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23186"},{"key":"ref84","article-title":"Censors\u2019 delay in blocking circumvention proxies","author":"Fifield","year":"2016"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355568"},{"key":"ref86","article-title":"CloudFlare DNS"},{"key":"ref87","article-title":"Google Domains"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ITNAC50341.2020.9315007"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259355"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"ref91","article-title":"Intel\u00ae tofino\u2122 2"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787472"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3286062.3286063"},{"key":"ref94","article-title":"Hysteria.network"},{"key":"ref95","first-page":"3829","article-title":"Jaqen: A {High-Performance}{Switch-Native} approach for detecting and mitigating volumetric {DDoS} with switches","volume-title":"30th Security attacks programmable in USENIX Symposium (USENIX Security 21)","author":"Liu"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3426744.3431323"},{"key":"ref97","volume-title":"Recipes for Resistance: A Censorship Circumvention Cookbook.","author":"Bocovich","year":"2018"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417883"},{"key":"ref99","volume-title":"[Carnegie Endowment] Government Internet Shutdowns Are Changing. How Should Citizens and Democracies Respond"},{"key":"ref100","article-title":"[Bloomberg] World\u2019s Worst Internet Clampdown Cost Myanmar $3 Billion in 2021"},{"key":"ref101","article-title":"[Top10VPN] Cost of Internet Shutdowns 2021: Government Internet Shutdowns Cost $5.5 Billion in 2021","author":"Woodhams"},{"key":"ref102","article-title":"[Deloitte] The economic impact of disruptions to Internet connectivity"},{"key":"ref103","volume-title":"[accessnow] #KeepItOn update: who is shutting down the internet in 2021"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143386"},{"key":"ref105","article-title":"How great is the great firewall? measuring China\u2019s DNS censorship","author":"Hoang","year":"2021"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3473604.3474562"},{"key":"ref107","article-title":"[Freedom House] Countering an Authoritarian Overhaul of the Internet"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00014"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978367"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134075"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382209"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23292"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978312"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3503954.3503957"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883401"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2016.7423322"},{"key":"ref118","article-title":"Command & control: Understanding, denying and detecting-a review of malware c2 techniques, detection and defences","author":"Gardiner","year":"2014"},{"key":"ref119","article-title":"Measuring and detecting fast-flux service networks","volume-title":"Proceedings of the 16th Annual Network & Distributed System Security Symposium","author":"Holz"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690854"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"ref122","article-title":"MIMIQ: Masking IPs with migration in QUIC","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"Govil"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0077"},{"key":"ref124","article-title":"Spine: Surveillance protection in the network elements","volume-title":"9th USENIX Workshop on Free and Open Communications on the Internet","author":"Datta"},{"key":"ref125","article-title":"nsupdate"}],"event":{"name":"2024 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2024,5,19]]},"end":{"date-parts":[[2024,5,23]]}},"container-title":["2024 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10646615\/10646598\/10646652.pdf?arnumber=10646652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:24:43Z","timestamp":1748582683000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10646652\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,19]]},"references-count":125,"URL":"https:\/\/doi.org\/10.1109\/sp54263.2024.00036","relation":{},"subject":[],"published":{"date-parts":[[2024,5,19]]}}}