{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:44Z","timestamp":1772041604148,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046730","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"187-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["Cirripede"],"prefix":"10.1145","author":[{"given":"Amir","family":"Houmansadr","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, USA"}]},{"given":"Giang T.K.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, USA"}]},{"given":"Matthew","family":"Caesar","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, Urbana-Champaign, USA"}]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DynaWeb. http:\/\/www.dongtaiwang.com\/home_en.php.  DynaWeb. http:\/\/www.dongtaiwang.com\/home_en.php."},{"key":"e_1_3_2_1_2_1","unstructured":"Ultrasurf. http:\/\/www.ultrareach.com.  Ultrasurf. http:\/\/www.ultrareach.com."},{"key":"e_1_3_2_1_3_1","volume-title":"Overview of advanced technologies and products. White paper","author":"Defeat","year":"2007","unstructured":"Defeat internet censorship : Overview of advanced technologies and products. White paper , Global Internet Freedom Consortium (GIFC) , November 2007 . Defeat internet censorship: Overview of advanced technologies and products. White paper, Global Internet Freedom Consortium (GIFC), November 2007."},{"key":"e_1_3_2_1_4_1","unstructured":"Tor partially blocked in China September 2007. https:\/\/blog.torproject.org\/blog\/tor-partially-blocked-china.  Tor partially blocked in China September 2007. https:\/\/blog.torproject.org\/blog\/tor-partially-blocked-china."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005152"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"issue":"9","key":"e_1_3_2_1_9_1","article-title":"Protecting user privacy on the web","volume":"4","author":"Boyan J.","year":"1997","unstructured":"J. Boyan . The anonymizer : Protecting user privacy on the web . Computer-Mediated Communication Magazine , 4 ( 9 ), September 1997 . J. Boyan. The anonymizer: Protecting user privacy on the web. Computer-Mediated Communication Magazine, 4(9), September 1997.","journal-title":"Computer-Mediated Communication Magazine"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"e_1_3_2_1_11_1","volume-title":"Jan.","author":"Cabuk S.","year":"2006","unstructured":"S. Cabuk . Network covert channels: Design, analysis, detection, and elimination , Jan. 2006 . S. Cabuk. Network covert channels: Design, analysis, detection, and elimination, Jan. 2006."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_13_1","first-page":"311","volume-title":"International Workshop on Design Issues in Anonymity and Unobservability","author":"Clarke I.","year":"2000","unstructured":"I. Clarke , O. Sandberg , B. Wiley , and T. W. Hong . Freenet: A distributed anonymous information storage and retrieval system . In International Workshop on Design Issues in Anonymity and Unobservability , pages 311 -- 320 , 2000 . I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In International Workshop on Design Issues in Anonymity and Unobservability, pages 311--320, 2000."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371977"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_2"},{"key":"e_1_3_2_1_16_1","unstructured":"R. Dingledine and N. Mathewson. Design of a blocking-resistant anonymity system. Technical report The Tor Project.  R. Dingledine and N. Mathewson. Design of a blocking-resistant anonymity system. Technical report The Tor Project."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_18_1","volume-title":"GLOBECOM '05. IEEE Global Telecommunications Conference, 2005., 2005","author":"Faloutsos M.","year":"2005","unstructured":"M. Faloutsos , S. Krishnamurthy , and B. Huffaker . On routing asymmetry in the internet . In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005., 2005 , 2005 . IEEE. M. Faloutsos, S. Krishnamurthy, and B. Huffaker. On routing asymmetry in the internet. In GLOBECOM '05. IEEE Global Telecommunications Conference, 2005., 2005, 2005. IEEE."},{"key":"e_1_3_2_1_19_1","first-page":"247","volume-title":"Proceedings of the 11th USENIX Security Symposium (SECURITY-02)","author":"Feamster N.","year":"2002","unstructured":"N. Feamster , M. Balazinska , G. Harfst , H. Balakrishnan , and D. Karger . Infranet: Circumventing web censorship and surveillance . In Proceedings of the 11th USENIX Security Symposium (SECURITY-02) , pages 247 -- 262 , Berkeley, CA, USA, Aug. 5--9 2002 . USENIX Association. N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger. Infranet: Circumventing web censorship and surveillance. In Proceedings of the 11th USENIX Security Symposium (SECURITY-02), pages 247--262, Berkeley, CA, USA, Aug. 5--9 2002. USENIX Association."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_9"},{"key":"e_1_3_2_1_21_1","unstructured":"J. Frankel. http:\/\/waste.sourceforge.net.  J. Frankel. http:\/\/waste.sourceforge.net."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11560326_34"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315284"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_12"},{"key":"e_1_3_2_1_25_1","first-page":"194","volume-title":"International Workshop on Privacy Enhancing Technologies (PET), LNCS","author":"Giffin J.","year":"2002","unstructured":"J. Giffin , R. Greenstadt , P. Litwack , and R. Tibbetts . Covert messaging through TCP timestamps . In International Workshop on Privacy Enhancing Technologies (PET), LNCS , pages 194 -- 208 , 2002 . J. Giffin, R. Greenstadt, P. Litwack, and R. Tibbetts. Covert messaging through TCP timestamps. In International Workshop on Privacy Enhancing Technologies (PET), LNCS, pages 194--208, 2002."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233153"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/647594.731523"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179603"},{"key":"e_1_3_2_1_29_1","volume-title":"CoCo: coding-based covert timing channels for network flows. In the 13-th Information Hiding Conference","author":"Houmansadr A.","year":"2011","unstructured":"A. Houmansadr and N. Borisov . CoCo: coding-based covert timing channels for network flows. In the 13-th Information Hiding Conference . Springer , 2011 . A. Houmansadr and N. Borisov. CoCo: coding-based covert timing channels for network flows. In the 13-th Information Hiding Conference. Springer, 2011."},{"key":"e_1_3_2_1_30_1","volume-title":"Psiphon: Analysis and estimation","author":"Jia J.","year":"2004","unstructured":"J. Jia and P. Smith . Psiphon: Analysis and estimation , 2004 . http:\/\/www.cdf.toronto.edu\/ csc494h\/reports\/2004-fall\/psiphon_ae.html. J. Jia and P. Smith. Psiphon: Analysis and estimation, 2004. http:\/\/www.cdf.toronto.edu\/ csc494h\/reports\/2004-fall\/psiphon_ae.html."},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet","author":"Karlin J.","year":"2011","unstructured":"J. Karlin , D. Ellard , A. W. Jackson , C. E. Jones , G. Lauer , D. P. Mankins , and W. T. Strayer . Decoy routing: Toward unblockable internet communication . In USENIX Workshop on Free and Open Communications on the Internet , Aug. 2011 . J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer. Decoy routing: Toward unblockable internet communication. In USENIX Workshop on Free and Open Communications on the Internet, Aug. 2011."},{"key":"e_1_3_2_1_32_1","volume-title":"The CAIDA anonymized 2011 internet traces -","author":"Andersen D.","year":"2011","unstructured":"kc claffy, D. Andersen , and P. Hick . The CAIDA anonymized 2011 internet traces - August 2011 . http:\/\/www.caida.org\/data\/passive\/passive_2011_dataset.xml. kc claffy, D. Andersen, and P. Hick. The CAIDA anonymized 2011 internet traces - August 2011. http:\/\/www.caida.org\/data\/passive\/passive_2011_dataset.xml."},{"key":"e_1_3_2_1_33_1","volume-title":"A taxonomy of Internet censorship and anti-censorship","author":"Leberknight C. S.","year":"2010","unstructured":"C. S. Leberknight , M. Chiang , H. V. Poor , and F. Wong . A taxonomy of Internet censorship and anti-censorship , 2010 . http:\/\/www.princeton.edu\/ chiangm\/anticensorship.pdf. C. S. Leberknight, M. Chiang, H. V. Poor, and F. Wong. A taxonomy of Internet censorship and anti-censorship, 2010. http:\/\/www.princeton.edu\/ chiangm\/anticensorship.pdf."},{"key":"e_1_3_2_1_34_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/BFb0052240","volume-title":"Advances in Cryptology -- CRYPTO '97","author":"Lim C.","year":"1997","unstructured":"C. Lim and P. Lee . A key recovery attack on discrete log-based schemes using a prime order subgroup . In B. S. Kaliski, editor, Advances in Cryptology -- CRYPTO '97 , volume 1294 of Lecture Notes in Computer Science , pages 249 -- 263 , Berlin, Heidelberg , 1997 . Springer . C. Lim and P. Lee. A key recovery attack on discrete log-based schemes using a prime order subgroup. In B. S. Kaliski, editor, Advances in Cryptology -- CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 249--263, Berlin, Heidelberg, 1997. Springer."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Y.\n      Liu D.\n      Ghosal F.\n      Armknecht A.-R.\n      Sadeghi S.\n      Schulz and \n      S.\n      Katzenbeisser\n  . \n  Hide and seek in time - robust covert timing channels\n  . In M. Backes and P. Ning editors ESORICS volume \n  5789\n   of \n  Lecture Notes in Computer Science pages \n  120\n  --\n  135\n  . \n  Springer 2009\n  .   Y. Liu D. Ghosal F. Armknecht A.-R. Sadeghi S. Schulz and S. Katzenbeisser. Hide and seek in time - robust covert timing channels. In M. Backes and P. Ning editors ESORICS volume 5789 of Lecture Notes in Computer Science pages 120--135. Springer 2009.","DOI":"10.1007\/978-3-642-04444-1_8"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_10"},{"key":"e_1_3_2_1_37_1","volume-title":"Nmap Network Scanning. Nmap project","author":"Lyon G. F.","year":"1999","unstructured":"G. F. Lyon . Nmap Network Scanning. Nmap project , 1999 . G. F. Lyon. Nmap Network Scanning. Nmap project, 1999."},{"key":"e_1_3_2_1_38_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/978-3-642-13122-6_29","volume-title":"Fun with Algorithms","author":"Mahdian M.","year":"2010","unstructured":"M. Mahdian . Fighting Censorship with Algorithms . In P. Boldi and L. Gargano, editors, Fun with Algorithms , volume 6099 of Lecture Notes in Computer Science , pages 296 -- 306 . Springer Berlin \/ Heidelberg , 2010 . M. Mahdian. Fighting Censorship with Algorithms. In P. Boldi and L. Gargano, editors, Fun with Algorithms, volume 6099 of Lecture Notes in Computer Science, pages 296--306. Springer Berlin \/ Heidelberg, 2010."},{"key":"e_1_3_2_1_39_1","volume-title":"Financial Cryptography and Data Security","author":"McCoy D.","year":"2011","unstructured":"D. McCoy , J. A. Morales , and K. Levchenko . Proximax: A Measurement Based System for Proxies Dissemination . In Financial Cryptography and Data Security , 2011 . D. McCoy, J. A. Morales, and K. Levchenko. Proximax: A Measurement Based System for Proxies Dissemination. In Financial Cryptography and Data Security, 2011."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655193"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_19"},{"key":"e_1_3_2_1_42_1","first-page":"297","volume-title":"IEEE Int. Symp. Information Theory","author":"Sullivan J. A.","year":"1998","unstructured":"J. A. O Sullivan , P. Moulin , and J. M. Ettinger . Information theoretic analysis of steganography . In IEEE Int. Symp. Information Theory , page 297 , 1998 . J. A. OSullivan, P. Moulin, and J. M. Ettinger. Information theoretic analysis of steganography. In IEEE Int. Symp. Information Theory, page 297, 1998."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/11861386_24"},{"key":"e_1_3_2_1_45_1","volume-title":"HTTP Over TLS. RFC 2818","author":"Rescorla E.","year":"2000","unstructured":"E. Rescorla . HTTP Over TLS. RFC 2818 . May 2000 . E. Rescorla. HTTP Over TLS. RFC 2818. May 2000."},{"key":"e_1_3_2_1_46_1","volume-title":"Covert channels in the TCP\/IP protocol suite. First Monday, 2(5)","author":"Rowland C. H.","year":"1997","unstructured":"C. H. Rowland . Covert channels in the TCP\/IP protocol suite. First Monday, 2(5) , 1997 . C. H. Rowland. Covert channels in the TCP\/IP protocol suite. First Monday, 2(5), 1997."},{"key":"e_1_3_2_1_47_1","volume-title":"Preventing Encrypted Traffic Analysis. Ph.D","author":"Schear N.","year":"2011","unstructured":"N. Schear . Preventing Encrypted Traffic Analysis. Ph.D ., University of Illinois at Urbana-Champaign , 2011 . N. Schear. Preventing Encrypted Traffic Analysis. Ph.D., University of Illinois at Urbana-Champaign, 2011."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062145"},{"key":"e_1_3_2_1_49_1","first-page":"59","volume-title":"In Proceedings of the 2006 USENIX Security Symposium","author":"Shah G.","year":"2006","unstructured":"G. Shah , A. Molina , and M. Blaze . Keyboards and covert channels . In In Proceedings of the 2006 USENIX Security Symposium , pages 59 -- 75 , 2006 . G. Shah, A. Molina, and M. Blaze. Keyboards and covert channels. In In Proceedings of the 2006 USENIX Security Symposium, pages 59--75, 2006."},{"key":"e_1_3_2_1_50_1","unstructured":"M. Smeets and M. Koot. Research report: Covert channels. http:\/\/gray-world.net\/papers\/rr_cc_univAmsterdam.pdf feb 2006.  M. Smeets and M. Koot. Research report: Covert channels. http:\/\/gray-world.net\/papers\/rr_cc_univAmsterdam.pdf feb 2006."},{"key":"e_1_3_2_1_51_1","volume-title":"International Conference on Peer-to-peer Systems","author":"Sovran Y.","year":"2008","unstructured":"Y. Sovran , A. Libonati , and J. Li . Pass it on: social networks stymie censors . In International Conference on Peer-to-peer Systems , Feb. 2008 . Y. Sovran, A. Libonati, and J. Li. Pass it on: social networks stymie censors. In International Conference on Peer-to-peer Systems, Feb. 2008."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"e_1_3_2_1_53_1","first-page":"96","volume-title":"Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability","author":"Syverson P.","year":"2009","unstructured":"P. Syverson , G. Tsudik , M. Reed , and C. Landwehr . Towards an analysis of onion routing security. In H. Federrath, editor , Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability , pages 96 -- 114 . Springer-Verlag, LNCS 2009 , July 2000. P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96--114. Springer-Verlag, LNCS 2009, July 2000."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653709"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060313"},{"key":"e_1_3_2_1_56_1","volume-title":"NDSS","author":"Wright C. V.","year":"2009","unstructured":"C. V. Wright , S. E. Coull , and F. Monrose . Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis . In NDSS , 2009 . C. V. Wright, S. E. Coull, and F. Monrose. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. In NDSS, 2009."},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 20th USENIX Security Symposium","author":"Wustrow E.","year":"2011","unstructured":"E. Wustrow , S. Wolchok , I. Goldberg , and J. A. Halderman . Telex: Anticensorship in the network infrastructure . In Proceedings of the 20th USENIX Security Symposium , Aug. 2011 . E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In Proceedings of the 20th USENIX Security Symposium, Aug. 2011."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282415"},{"key":"e_1_3_2_1_59_1","first-page":"42","volume-title":"ICON","author":"Zander S.","year":"2007","unstructured":"S. Zander , G. J. Armitage , and P. Branch . An empirical evaluation of ip time to live covert channels . In ICON , pages 42 -- 47 . IEEE, 2007 . S. Zander, G. J. Armitage, and P. Branch. An empirical evaluation of ip time to live covert channels. In ICON, pages 42--47. IEEE, 2007."},{"key":"e_1_3_2_1_60_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1007\/978-3-642-20757-0_36","volume-title":"Networking (1)","author":"Zander S.","year":"2011","unstructured":"S. Zander , G. J. Armitage , and P. Branch . Stealthier inter-packet timing covert channels . In J. Domingo-Pascual, P. Manzoni, S. Palazzo, A. Pont, and C. M. Scoglio, editors, Networking (1) , volume 6640 of Lecture Notes in Computer Science , pages 458 -- 470 . Springer , 2011 . S. Zander, G. J. Armitage, and P. Branch. Stealthier inter-packet timing covert channels. In J. Domingo-Pascual, P. Manzoni, S. Palazzo, A. Pont, and C. M. Scoglio, editors, Networking (1), volume 6640 of Lecture Notes in Computer Science, pages 458--470. Springer, 2011."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1189191"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046730"}},"subtitle":["circumvention infrastructure using router redirection with plausible deniability"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":59,"alternative-id":["10.1145\/2046707.2046730","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046730","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}