{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:40Z","timestamp":1750306780852,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000140911042"],"award-info":[{"award-number":["N000140911042"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0845559, CNS-0905537"],"award-info":[{"award-number":["CNS-0845559, CNS-0905537"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Secure Business Austria"},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF0910553"],"award-info":[{"award-number":["W911NF0910553"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523654","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"39-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Message in a bottle"],"prefix":"10.1145","author":[{"given":"Luca","family":"Invernizzi","sequence":"first","affiliation":[{"name":"UC Santa Barbara, California"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, California"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, California"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Gallery of css descramblers. www.cs.cmu.edu\/~dst\/DeCSS\/Gallery\/.  Gallery of css descramblers. www.cs.cmu.edu\/~dst\/DeCSS\/Gallery\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Agence France-Presse. Pakistan blocks Facebook over Mohammed cartoon. www.google.com\/hostednews\/afp\/article\/ALeqM5iqKZNUdJFQ6c8ctdkUW0C-vktIEA.  Agence France-Presse. Pakistan blocks Facebook over Mohammed cartoon. www.google.com\/hostednews\/afp\/article\/ALeqM5iqKZNUdJFQ6c8ctdkUW0C-vktIEA."},{"key":"e_1_3_2_1_3_1","unstructured":"Anonymizer. Home page. plone.anonymizer.com.  Anonymizer. Home page. plone.anonymizer.com."},{"key":"e_1_3_2_1_4_1","unstructured":"Bachrach D. Nunu C. Wallach D. and Wright M. #h00t: Censorship resistant microblogging. arXiv:1109.6874 (2011).  Bachrach D. Nunu C. Wallach D. and Wright M. #h00t: Censorship resistant microblogging. arXiv:1109.6874 (2011)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1361397.1361409"},{"volume-title":"Information Hiding","year":"2011","author":"Bas P.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314336"},{"key":"e_1_3_2_1_8_1","unstructured":"BlogPulse. Report on indexed blogs. goo.gl\/SEpDH 2011.  BlogPulse. Report on indexed blogs. goo.gl\/SEpDH 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1869956"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090583.1648610"},{"key":"e_1_3_2_1_11_1","unstructured":"BuiltWith. Content management system distribution. trends.builtwith.com\/cms 2012.  BuiltWith. Content management system distribution. trends.builtwith.com\/cms 2012."},{"volume-title":"USENIX Security Symposium","year":"2010","author":"Burnett S.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Clarke I. Sandberg O. Wiley B. and Hong T. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies (2001) Springer.   Clarke I. Sandberg O. Wiley B. and Hong T. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies (2001) Springer.","DOI":"10.1007\/3-540-44702-4_4"},{"key":"e_1_3_2_1_14_1","unstructured":"CNN. Egyptians brace for friday protests as internet messaging disrupted. articles.cnn.com\/2011-01-27.  CNN. Egyptians brace for friday protests as internet messaging disrupted. articles.cnn.com\/2011-01-27."},{"volume-title":"Security and Privacy, 2003. Proceedings. 2003 Symposium on.","author":"Danezis G.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.26"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_18_1","unstructured":"DomainTools. Internet statistic. www.domaintools.com\/internet-statistics\/.  DomainTools. Internet statistic. www.domaintools.com\/internet-statistics\/."},{"volume-title":"Proceedings of the 18th conference on USENIX security symposium.","author":"Evans N.","key":"e_1_3_2_1_19_1"},{"volume-title":"Proceedings of the 11th USENIX Security Symposium","year":"2002","author":"Feamster N.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_9"},{"key":"e_1_3_2_1_22_1","unstructured":"Fifield D. Hardison N. Stark J. Porras R. Boneh D. and Tor S. Evading censorship with browser-based proxies.  Fifield D. Hardison N. Stark J. Porras R. Boneh D. and Tor S. Evading censorship with browser-based proxies."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04431-1_3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2077629"},{"volume-title":"Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII (Feb.","year":"2011","author":"Filler T.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Filler T. Judas J. and Fridrich J. Minimizing embedding impact in steganography using trellis-coded quantization. IEEE Transactions on Information Forensics and Security (Feb. 2011).  Filler T. Judas J. and Fridrich J. Minimizing embedding impact in steganography using trellis-coded quantization. IEEE Transactions on Information Forensics and Security (Feb. 2011).","DOI":"10.1117\/12.838002"},{"volume-title":"Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI","year":"2009","author":"Filler T.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"France-Presse A. Kazakhstan blocks popular blogging platforms 2011.  France-Presse A. Kazakhstan blocks popular blogging platforms 2011."},{"key":"e_1_3_2_1_29_1","unstructured":"FriendFeed. Simple update protocol. code.google.com\/p\/simpleupdateprotocol.  FriendFeed. Simple update protocol. code.google.com\/p\/simpleupdateprotocol."},{"volume-title":"Proceedings of SPIE","year":"2006","author":"Goljan M.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"Google. Pubsubhubhub. code.google.com\/p\/pubsubhubbub.  Google. Pubsubhubhub. code.google.com\/p\/pubsubhubbub."},{"key":"e_1_3_2_1_32_1","unstructured":"Greenstadt R. Zebrafish: A steganographic system. MIT (2002).  Greenstadt R. Zebrafish: A steganographic system. MIT (2002)."},{"volume-title":"Privacy Enhancing Technologies","year":"2002","author":"Hintz A.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"Human Rights Watch. Letter from human rights watch to skype and skype's response. www.hrw.org\/node\/11259\/section\/19.  Human Rights Watch. Letter from human rights watch to skype and skype's response. www.hrw.org\/node\/11259\/section\/19."},{"key":"e_1_3_2_1_35_1","unstructured":"Kelly S. and Cook S. Freedom on the net. Freedom House (2011).  Kelly S. and Cook S. Freedom on the net. Freedom House (2011)."},{"key":"e_1_3_2_1_36_1","unstructured":"Kolari P. Pings spings splogs and the splogosphere: 2007.  Kolari P. Pings spings splogs and the splogosphere: 2007."},{"key":"e_1_3_2_1_37_1","unstructured":"Labs B. The lucent personalized web assistant. www.bell-labs.com\/project\/lpwa 1997.  Labs B. The lucent personalized web assistant. www.bell-labs.com\/project\/lpwa 1997."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655193"},{"key":"e_1_3_2_1_39_1","unstructured":"Mimic S. Homepage. spammimic.com.  Mimic S. Homepage. spammimic.com."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_2_1_41_1","unstructured":"Netcraft. May 2012 web server survey. news.netcraft.com\/archives\/2012\/05\/02.  Netcraft. May 2012 web server survey. news.netcraft.com\/archives\/2012\/05\/02."},{"key":"e_1_3_2_1_42_1","unstructured":"Netresec. Forensics of chinese mitm on github. www.netresec.com\/?page=Blog&post=Forensics-of-Chinese-MITM-on-GitHub.  Netresec. Forensics of chinese mitm on github. www.netresec.com\/?page=Blog&post=Forensics-of-Chinese-MITM-on-GitHub."},{"key":"e_1_3_2_1_43_1","unstructured":"Noman H. and York J. West censoring east: The use of western technologies by middle east censors 2010-2011.  Noman H. and York J. West censoring east: The use of western technologies by middle east censors 2010-2011."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Palfrey J. Roberts H. York J. Faris R. and Zuckerman E. 2010 circumvention tool usage report.  Palfrey J. Roberts H. York J. Faris R. and Zuckerman E. 2010 circumvention tool usage report.","DOI":"10.2139\/ssrn.1940455"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd T. Filler T. and Bas P. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. 161--177.  Pevn\u00fd T. Filler T. and Bas P. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. 161--177.","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"e_1_3_2_1_47_1","unstructured":"Pingdom. The blog platforms of choice among the top 100 blogs. royal.pingdom.com\/2009\/01\/15 2009.  Pingdom. The blog platforms of choice among the top 100 blogs. royal.pingdom.com\/2009\/01\/15 2009."},{"key":"e_1_3_2_1_48_1","unstructured":"rssCloud. Homepage. rsscloud.org.  rssCloud. Homepage. rsscloud.org."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1134\/S0032946009020094"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.767893"},{"key":"e_1_3_2_1_51_1","unstructured":"TechCrunch. Syrian government blocks live video of crisis. eu.techcrunch.com\/2012\/02\/17.  TechCrunch. Syrian government blocks live video of crisis. eu.techcrunch.com\/2012\/02\/17."},{"key":"e_1_3_2_1_52_1","unstructured":"Tor. Bridges. www.torproject.org\/docs\/bridges.  Tor. Bridges. www.torproject.org\/docs\/bridges."},{"key":"e_1_3_2_1_53_1","unstructured":"Tor. Help users in Iran reach the internet. lists.torproject.org\/pipermail\/tor-talk\/2012-February.  Tor. Help users in Iran reach the internet. lists.torproject.org\/pipermail\/tor-talk\/2012-February."},{"key":"e_1_3_2_1_54_1","unstructured":"Tor. Iran blocks encrypted traffic. blog.torproject.org\/blog\/iran-partially-blocks-encrypted-network-traffic.  Tor. Iran blocks encrypted traffic. blog.torproject.org\/blog\/iran-partially-blocks-encrypted-network-traffic."},{"key":"e_1_3_2_1_55_1","unstructured":"Tor. Iran blocks Tor; Tor releases same-day fix.  Tor. Iran blocks Tor; Tor releases same-day fix."},{"key":"e_1_3_2_1_56_1","unstructured":"Tor. Tor partially blocked in China. blog.torproject.org\/blog\/tor-partially-blocked-china.  Tor. Tor partially blocked in China. blog.torproject.org\/blog\/tor-partially-blocked-china."},{"key":"e_1_3_2_1_57_1","unstructured":"Tor. Tor users via bridges from china. metrics.torproject.org.  Tor. Tor users via bridges from china. metrics.torproject.org."},{"volume-title":"Advances in Cryptology-EUROCRYPT","year":"2004","author":"Von Ahn L.","key":"e_1_3_2_1_58_1"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502002"},{"volume-title":"USENIX Security Symposium","year":"2000","author":"Waldman M.","key":"e_1_3_2_1_60_1"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921684"},{"volume-title":"USENIX Security Symposium","year":"2011","author":"Wustrow E.","key":"e_1_3_2_1_62_1"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"New Orleans Louisiana USA","acronym":"ACSAC '13"},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523654","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523654"}},"subtitle":["sailing past censorship"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":62,"alternative-id":["10.1145\/2523649.2523654","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523654","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}