{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:56Z","timestamp":1772164076881,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,17]],"date-time":"2015-08-17T00:00:00Z","timestamp":1439769600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["IIS-0964541"],"award-info":[{"award-number":["IIS-0964541"]}]},{"name":"ONR","award":["N00173-13-1-G001"],"award-info":[{"award-number":["N00173-13-1-G001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,17]]},"DOI":"10.1145\/2785956.2787509","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T10:09:20Z","timestamp":1440410960000},"page":"611-624","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Alibi Routing"],"prefix":"10.1145","author":[{"given":"Dave","family":"Levin","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Youndo","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Luke","family":"Valenta","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Zhihao","family":"Li","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Victoria","family":"Lai","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Cristian","family":"Lumezanu","sequence":"additional","affiliation":[{"name":"NEC Labs, Princeton, NJ, USA"}]},{"given":"Neil","family":"Spring","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Bobby","family":"Bhattacharjee","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,17]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592605"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402997"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317307.2317311"},{"key":"e_1_3_2_2_5_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"Anonymous","year":"2014","unstructured":"Anonymous . Towards a comprehensive picture of the Great Firewall's DNS censorship . USENIX Workshop on Free and Open Communications on the Internet (FOCI) , 2014 . Anonymous. Towards a comprehensive picture of the Great Firewall's DNS censorship. USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2014."},{"key":"e_1_3_2_2_6_1","volume-title":"The ARRL","author":"Radio Communications ARRL.","year":"2012","unstructured":"ARRL. The ARRL Handbook for Radio Communications . The ARRL , 89 th edition, 2012 . ARRL. The ARRL Handbook for Radio Communications. The ARRL, 89th edition, 2012.","edition":"89"},{"key":"e_1_3_2_2_7_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"Aryan S.","year":"2013","unstructured":"S. Aryan , H. Aryan , and J. A. Halderman . Internet censorship in Iran: A first look . In USENIX Workshop on Free and Open Communications on the Internet (FOCI) , 2013 . S. Aryan, H. Aryan, and J. A. Halderman. Internet censorship in Iran: A first look. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2013."},{"key":"e_1_3_2_2_8_1","first-page":"46","volume-title":"Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability","author":"Clarke I.","year":"2000","unstructured":"I. Clarke , O. Sandberg , B. Wiley , and T. W. Hong . Freenet: A distributed anonymous information storage and retrieval system . In Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability , pages 46 -- 66 , July 2000 . I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 46--66, July 2000."},{"key":"e_1_3_2_2_9_1","volume-title":"Workshop on Economics of Peer-to-Peer Systems (P2PEcon)","author":"Cohen B.","year":"2003","unstructured":"B. Cohen . Incentives build robustness in BitTorrent . In Workshop on Economics of Peer-to-Peer Systems (P2PEcon) , 2003 . B. Cohen. Incentives build robustness in BitTorrent. In Workshop on Economics of Peer-to-Peer Systems (P2PEcon), 2003."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_2_11_1","volume-title":"USENIX Security","author":"Feamster N.","year":"2002","unstructured":"N. Feamster , M. Balazinska , G. Harfst , H. Balakrishnan , and D. Karger . Infranet: Circumventing censorship and surveillance . In USENIX Security , 2002 . N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger. Infranet: Circumventing censorship and surveillance. In USENIX Security, 2002."},{"key":"e_1_3_2_2_12_1","volume-title":"The Feynman Lectures on Physics","author":"Feynman R.","year":"1963","unstructured":"R. Feynman , R. Leighton , and M. Sands . The Feynman Lectures on Physics Vol. 1 . (Chapter 26). Addison-Wesley , 1963 . R. Feynman, R. Leighton, and M. Sands. The Feynman Lectures on Physics Vol. 1. (Chapter 26). Addison-Wesley, 1963."},{"key":"e_1_3_2_2_13_1","unstructured":"Global Administrative Areas (GADM) Database. http:\/\/www.gadm.org.  Global Administrative Areas (GADM) Database. http:\/\/www.gadm.org."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592583"},{"key":"e_1_3_2_2_15_1","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Gummadi K.","year":"2004","unstructured":"K. Gummadi , H. Madhyastha , S. D. Gribble , H. M. Levy , and D. J. Wetherall . Improving the reliability of Internet paths with one-hop source routing . In Symposium on Operating Systems Design and Implementation (OSDI) , 2004 . K. Gummadi, H. Madhyastha, S. D. Gribble, H. M. Levy, and D. J. Wetherall. Improving the reliability of Internet paths with one-hop source routing. In Symposium on Operating Systems Design and Implementation (OSDI), 2004."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046730"},{"key":"e_1_3_2_2_18_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"Karlin J.","year":"2011","unstructured":"J. Karlin , D. Ellard , A. W. Jackson , C. E. Jones , G. Lauer , D. P. Mankins , and W. T. Strayer . Decoy routing: Toward unblockable Internet communication . In USENIX Workshop on Free and Open Communications on the Internet (FOCI) , 2011 . J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer. Decoy routing: Toward unblockable Internet communication. In USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2011."},{"key":"e_1_3_2_2_19_1","unstructured":"J. Karlin S. Forrest and J. Rexford. Nation-state routing: Censorship wiretapping and BGP. http:\/\/arxiv.org\/pdf\/0903.3218.pdf Mar. 2009.  J. Karlin S. Forrest and J. Rexford. Nation-state routing: Censorship wiretapping and BGP. http:\/\/arxiv.org\/pdf\/0903.3218.pdf Mar. 2009."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342435"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626323"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719046"},{"key":"e_1_3_2_2_24_1","volume-title":"Joint Workshop on the Economics of Networked Systems and Incentive-Based Computing (NetEcon+IBC)","author":"Levin D.","year":"2007","unstructured":"D. Levin , A. Bender , C. Lumezanu , N. Spring , and B. Bhattacharjee . Boycotting and extorting nodes in an internetwork . In Joint Workshop on the Economics of Networked Systems and Incentive-Based Computing (NetEcon+IBC) , 2007 . D. Levin, A. Bender, C. Lumezanu, N. Spring, and B. Bhattacharjee. Boycotting and extorting nodes in an internetwork. In Joint Workshop on the Economics of Networked Systems and Incentive-Based Computing (NetEcon+IBC), 2007."},{"key":"e_1_3_2_2_25_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Lumezanu C.","year":"2009","unstructured":"C. Lumezanu , R. Baden , D. Levin , B. Bhattacharjee , and N. Spring . Symbiotic relationships in Internet routing overlays . In USENIX Symposium on Networked Systems Design and Implementation (NSDI) , 2009 . C. Lumezanu, R. Baden, D. Levin, B. Bhattacharjee, and N. Spring. Symbiotic relationships in Internet routing overlays. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2009."},{"key":"e_1_3_2_2_26_1","unstructured":"MaxMind Inc. http:\/\/dev.maxmind.com\/geoip\/legacy\/geolite\/.  MaxMind Inc. http:\/\/dev.maxmind.com\/geoip\/legacy\/geolite\/."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779330.1779341"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079326"},{"key":"e_1_3_2_2_29_1","volume-title":"Internet surveillance and boomerang routing: A call for Canadian network sovereignty. Online:\\\\ http:\/\/ssrn.com\/abstract=2311792","author":"Obar J. A.","year":"2013","unstructured":"J. A. Obar and A. Clement . Internet surveillance and boomerang routing: A call for Canadian network sovereignty. Online:\\\\ http:\/\/ssrn.com\/abstract=2311792 , 2013 . J. A. Obar and A. Clement. Internet surveillance and boomerang routing: A call for Canadian network sovereignty. Online:\\\\ http:\/\/ssrn.com\/abstract=2311792, 2013."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/248156.248160"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"J. Postel. Internet Protocol. IETF RFC-791 1981","DOI":"10.17487\/rfc0791"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27443-5_29"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387589.1387592"},{"key":"e_1_3_2_2_34_1","volume-title":"Enemies of the internet","author":"Borders Reporters Without","year":"2013","unstructured":"Reporters Without Borders . Enemies of the internet 2013 , report. http:\/\/surveillance.rsf.org\/en\/wp-content\/uploads\/sites\/2\/2013\/03\/enemies-of-the-internet_2013.pdf, Mar. 2013. Reporters Without Borders. Enemies of the internet 2013, report. http:\/\/surveillance.rsf.org\/en\/wp-content\/uploads\/sites\/2\/2013\/03\/enemies-of-the-internet_2013.pdf, Mar. 2013."},{"key":"e_1_3_2_2_35_1","volume-title":"Jan.","author":"Rosen E.","year":"2001","unstructured":"E. Rosen , A. Viswanathan , and R. Callon . Multiprotocol label switching. IETF RFC-3031 , Jan. 2001 . E. Rosen, A. Viswanathan, and R. Callon. Multiprotocol label switching. IETF RFC-3031, Jan. 2001."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.748796"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382209"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.22"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102170"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1140814.1140816"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133613"},{"key":"e_1_3_2_2_42_1","volume-title":"Morgan Kaufmann","author":"Varghese G.","year":"2004","unstructured":"G. Varghese . Network Algorithmics : An Interdisciplinary Approach to Designing Fast Networked Devices . Morgan Kaufmann , 2004 . G. Varghese. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices. Morgan Kaufmann, 2004."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452537"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080103"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626335"},{"key":"e_1_3_2_2_46_1","volume-title":"IFIP International Information Security and Privacy Conference (SEC)","author":"Wustrow E.","year":"2011","unstructured":"E. Wustrow , S. Wolchok , I. Goldberg , and J. A. Halderman . Telex: Anticensorship in the network infrastructure . In IFIP International Information Security and Privacy Conference (SEC) , 2011 . E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In IFIP International Information Security and Privacy Conference (SEC), 2011."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893888"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159933"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.45"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342434"}],"event":{"name":"SIGCOMM '15: ACM SIGCOMM 2015 Conference","location":"London United Kingdom","acronym":"SIGCOMM '15","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785956.2787509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2785956.2787509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:42:38Z","timestamp":1750210958000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785956.2787509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,17]]},"references-count":50,"alternative-id":["10.1145\/2785956.2787509","10.1145\/2785956"],"URL":"https:\/\/doi.org\/10.1145\/2785956.2787509","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2829988.2787509","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,8,17]]},"assertion":[{"value":"2015-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}