{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:56:10Z","timestamp":1776099370830,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T00:00:00Z","timestamp":1383523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517840.2517856","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"213-224","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["ScrambleSuit"],"prefix":"10.1145","author":[{"given":"Philipp","family":"Winter","sequence":"first","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"Tobias","family":"Pulls","sequence":"additional","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"Juergen","family":"Fuss","sequence":"additional","affiliation":[{"name":"Upper Austria University of Applied Sciences, Hagenberg, Austria"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","author":"Ptacek Thomas H.","year":"1998","journal-title":"Newsham. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, Inc."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342412"},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security","author":"Handley Mark","year":"2001"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452523"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317307.2317311"},{"key":"e_1_3_2_1_7_1","unstructured":"Christopher Rhoads and Loretta Chao. Iran's Web Spying Aided By Western Technology 2009. URL: http:\/\/online.wsj.com\/article\/SB124562668777335653.html.  Christopher Rhoads and Loretta Chao. Iran's Web Spying Aided By Western Technology 2009. URL: http:\/\/online.wsj.com\/article\/SB124562668777335653.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Jillian C. York. Government Internet Surveillance Starts With Eyes Built in the West 2011. URL: https:\/\/www.eff.org\/deeplinks\/2011\/09\/government-internet-surveillance-starts-eyes-built.  Jillian C. York. Government Internet Surveillance Starts With Eyes Built in the West 2011. URL: https:\/\/www.eff.org\/deeplinks\/2011\/09\/government-internet-surveillance-starts-eyes-built."},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Security","author":"Dingledine Roger","year":"2004"},{"key":"e_1_3_2_1_10_1","unstructured":"The Tor Project. Iran. URL: https:\/\/censorshipwiki.torproject.org\/CensorshipByCountry\/Iran.  The Tor Project. Iran. URL: https:\/\/censorshipwiki.torproject.org\/CensorshipByCountry\/Iran."},{"key":"e_1_3_2_1_11_1","volume-title":"FOCI. USENIX Association","author":"Winter Philipp","year":"2012"},{"key":"e_1_3_2_1_12_1","unstructured":"The Tor Project. Ethiopia. URL: https:\/\/censorshipwiki.torproject.org\/CensorshipByCountry\/Ethiopia.  The Tor Project. Ethiopia. URL: https:\/\/censorshipwiki.torproject.org\/CensorshipByCountry\/Ethiopia."},{"key":"e_1_3_2_1_13_1","unstructured":"Charles Arthur. China tightens \"Great Firewall\" internet control with new technology 2012. URL: http:\/\/www.guardian.co.uk\/technology\/2012\/dec\/14\/china-tightens-great-firewall-internet-control.  Charles Arthur. China tightens \"Great Firewall\" internet control with new technology 2012. URL: http:\/\/www.guardian.co.uk\/technology\/2012\/dec\/14\/china-tightens-great-firewall-internet-control."},{"key":"e_1_3_2_1_14_1","unstructured":"GFW actively probes obfs2 bridges 2013. URL: https:\/\/bugs.torproject.org\/8591.  GFW actively probes obfs2 bridges 2013. URL: https:\/\/bugs.torproject.org\/8591."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security","author":"Durumeric Zakir","year":"2013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382211"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_18_1","volume-title":"NDSS. The Internet Society","author":"Houmansadr Amir","year":"2013"},{"key":"e_1_3_2_1_19_1","volume-title":"HotPETS. Springer","author":"Zhou Wenxuan","year":"2013"},{"key":"e_1_3_2_1_20_1","unstructured":"The Tor Project. obfs2 (The Twobfuscator). URL: https:\/\/gitweb.torproject.org\/pluggable-transports\/obfsproxy.git\/blob\/HEAD:\/doc\/obfs2\/obfs2-protocol-spec.txt.  The Tor Project. obfs2 (The Twobfuscator). URL: https:\/\/gitweb.torproject.org\/pluggable-transports\/obfsproxy.git\/blob\/HEAD:\/doc\/obfs2\/obfs2-protocol-spec.txt."},{"key":"e_1_3_2_1_21_1","unstructured":"The Tor Project. obfs3 (The Threebfuscator). URL: https:\/\/gitweb.torproject.org\/pluggable-transports\/obfsproxy.git\/blob\/HEAD:\/doc\/obfs3\/obfs3-protocol-spec.txt.  The Tor Project. obfs3 (The Threebfuscator). URL: https:\/\/gitweb.torproject.org\/pluggable-transports\/obfsproxy.git\/blob\/HEAD:\/doc\/obfs3\/obfs3-protocol-spec.txt."},{"key":"e_1_3_2_1_22_1","unstructured":"Brandon Wiley. Dust: A Blocking-Resistant Internet Transport Protocol. Technical report University of Texas at Austin 2011.  Brandon Wiley. Dust: A Blocking-Resistant Internet Transport Protocol. Technical report University of Texas at Austin 2011."},{"key":"e_1_3_2_1_23_1","unstructured":"Viewing cable 09MUSCAT1039 SKYPE CRACKDOWN IN OMAN 2009. URL: http:\/\/wikileaks.org\/cable\/2009\/11\/09MUSCAT1039.html.  Viewing cable 09MUSCAT1039 SKYPE CRACKDOWN IN OMAN 2009. URL: http:\/\/wikileaks.org\/cable\/2009\/11\/09MUSCAT1039.html."},{"key":"e_1_3_2_1_24_1","unstructured":"Russian \"Clean Internet\" experiment gets green light 2013. URL: http:\/\/rt.com\/politics\/anti-pedophile-safe-internet-russian-169\/.  Russian \"Clean Internet\" experiment gets green light 2013. URL: http:\/\/rt.com\/politics\/anti-pedophile-safe-internet-russian-169\/."},{"key":"e_1_3_2_1_25_1","unstructured":"Small Media. Iranian Internet Infrastructure and Policy Report: Election Edition 2013 (April - June) 2013.  Small Media. Iranian Internet Infrastructure and Policy Report: Election Edition 2013 (April - June) 2013."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068818"},{"key":"e_1_3_2_1_27_1","unstructured":"Eva Galperin and Jillian C. York. Syria goes dark 2012. https:\/\/www.eff.org\/deeplinks\/2012\/11\/syria-goes-dark.  Eva Galperin and Jillian C. York. Syria goes dark 2012. https:\/\/www.eff.org\/deeplinks\/2012\/11\/syria-goes-dark."},{"key":"e_1_3_2_1_28_1","volume-title":"Chalmers University of Technology","author":"Hjelmvik Erik","year":"2010"},{"key":"e_1_3_2_1_29_1","unstructured":"Brandon Wiley. Blocking-Resistant Protocol Classification Using Bayesian Model Selection. Technical report University of Texas at Austin 2011.  Brandon Wiley. Blocking-Resistant Protocol Classification Using Bayesian Model Selection. Technical report University of Texas at Austin 2011."},{"key":"e_1_3_2_1_30_1","unstructured":"The Tor Project. obfsproxy. URL: https:\/\/www.torproject.org\/projects\/obfsproxy.  The Tor Project. obfsproxy. URL: https:\/\/www.torproject.org\/projects\/obfsproxy."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382212"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_1_33_1","volume-title":"FOCI. USENIX Association","author":"Lincoln Patrick","year":"2012"},{"key":"e_1_3_2_1_34_1","volume-title":"Provably Undetectable Authentication. In ESORICS. Springer","author":"Vasserman Eugene Y.","year":"2007"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046569"},{"key":"e_1_3_2_1_36_1","unstructured":"Martin Johnson. China GitHub and the man-in-the-middle 2013. URL: https:\/\/en.greatfire.org\/blog\/2013\/jan\/china-github-and-man-middle.  Martin Johnson. China GitHub and the man-in-the-middle 2013. URL: https:\/\/en.greatfire.org\/blog\/2013\/jan\/china-github-and-man-middle."},{"key":"e_1_3_2_1_37_1","volume-title":"Massachusetts Institute of Technology","author":"Rivest Ronald L.","year":"1996"},{"key":"e_1_3_2_1_38_1","volume-title":"WEIS","author":"Laurie Ben","year":"2004"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Joseph Salowey Hao Zhou Pasi Eronen and Hannes Tschofenig. RFC 5077: Transport Layer Security (TLS) Session Resumption without Server-Side State 2008.  Joseph Salowey Hao Zhou Pasi Eronen and Hannes Tschofenig. RFC 5077: Transport Layer Security (TLS) Session Resumption without Server-Side State 2008.","DOI":"10.17487\/rfc5077"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Hugo Krawczyk Mihir Bellare and Ran Canetti. RFC 2104: HMAC: Keyed-Hashing for Message Authentication 1997.   Hugo Krawczyk Mihir Bellare and Ran Canetti. RFC 2104: HMAC: Keyed-Hashing for Message Authentication 1997.","DOI":"10.17487\/rfc2104"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195627"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Tero Kivinen and Mika Kojo. RFC 3526: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) 2003.   Tero Kivinen and Mika Kojo. RFC 3526: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) 2003.","DOI":"10.17487\/rfc3526"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Hugo Krawczyk and Pasi Eronen. RFC 5869: HMAC-based Extract-and-Expand Key Derivation Function (HKDF) 2010.  Hugo Krawczyk and Pasi Eronen. RFC 5869: HMAC-based Extract-and-Expand Key Derivation Function (HKDF) 2010.","DOI":"10.17487\/rfc5869"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_48_1","unstructured":"CAIDA. Packet size distribution comparison between Internet links in 1998 and 2008 2010. URL: http:\/\/www.caida.org\/research\/traffic-analysis\/pkt sizedistribution\/graphs.xml.  CAIDA. Packet size distribution comparison between Internet links in 1998 and 2008 2010. URL: http:\/\/www.caida.org\/research\/traffic-analysis\/pkt sizedistribution\/graphs.xml."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963024"},{"key":"e_1_3_2_1_50_1","unstructured":"ECRYPT II Yearly Report on Algorithms and Keysizes 2012.  ECRYPT II Yearly Report on Algorithms and Keysizes 2012."},{"key":"e_1_3_2_1_51_1","unstructured":"Dwayne C. Litzenberger. PyCrypto - The Python Cryptography Toolkit. URL: https:\/\/www.dlitz.net\/software\/pycrypto\/.  Dwayne C. Litzenberger. PyCrypto - The Python Cryptography Toolkit. URL: https:\/\/www.dlitz.net\/software\/pycrypto\/."},{"key":"e_1_3_2_1_52_1","volume-title":"NDSS. The Internet Society","author":"White Andrew M.","year":"2013"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","location":"Berlin Germany","acronym":"CCS'13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517840.2517856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:14Z","timestamp":1750232054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517840.2517856"}},"subtitle":["a polymorphic network protocol to circumvent censorship"],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":52,"alternative-id":["10.1145\/2517840.2517856","10.1145\/2517840"],"URL":"https:\/\/doi.org\/10.1145\/2517840.2517856","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}