{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T19:50:13Z","timestamp":1775505013411,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978312","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1702-1714","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Slitheen"],"prefix":"10.1145","author":[{"given":"Cecylia","family":"Bocovich","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"Aryan S.","year":"2013","unstructured":"S. Aryan , H. Aryan , and J. A. Halderman . Internet censorship in Iran: A first look . In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI) , 2013 . S. Aryan, H. Aryan, and J. A. Halderman. Internet censorship in Iran: A first look. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/13523270209696367"},{"key":"e_1_3_2_1_3_1","volume-title":"February","author":"Dingledine R.","year":"2012","unstructured":"R. Dingledine . Obfsproxy: The next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race , February 2012 . {Online; accessed 29-February-2016}. R. Dingledine. Obfsproxy: The next step in the censorship arms race. https:\/\/blog.torproject.org\/blog\/obfsproxy-next-step-censorship-arms-race, February 2012. {Online; accessed 29-February-2016}."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_5_1","first-page":"367","volume-title":"24th USENIX Security Symposium","author":"Dyer K. P.","year":"2015","unstructured":"K. P. Dyer , S. E. Coull , and T. Shrimpton . Marionette: A programmable network-traffic obfuscation system . In 24th USENIX Security Symposium , pages 367 -- 382 , 2015 . K. P. Dyer, S. E. Coull, and T. Shrimpton. Marionette: A programmable network-traffic obfuscation system. In 24th USENIX Security Symposium, pages 367--382, 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107049963"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366287"},{"key":"e_1_3_2_1_8_1","volume-title":"The WebSocket Protocol. RFC","author":"Fette I.","year":"2011","unstructured":"I. Fette and A. Melnikov . The WebSocket Protocol. RFC 6455, December 2011 . I. Fette and A. Melnikov. The WebSocket Protocol. RFC 6455, December 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2616"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655013"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046730"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23292"},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX workshop on free and open communications on the Internet","author":"Karlin J.","year":"2011","unstructured":"J. Karlin , D. Ellard , A. W. Jackson , C. E. Jones , G. Lauer , D. P. Mankins , and W. T. Strayer . Decoy routing: Toward unblockable internet communication . In USENIX workshop on free and open communications on the Internet , 2011 . J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer. Decoy routing: Toward unblockable internet communication. In USENIX workshop on free and open communications on the Internet, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_16_1","volume-title":"3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"Nabi Z.","year":"2013","unstructured":"Z. Nabi . The anatomy of web censorship in Pakistan . In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI) , 2013 . Z. Nabi. The anatomy of web censorship in Pakistan. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2013."},{"key":"e_1_3_2_1_17_1","unstructured":"Sandvine. White paper: Applying network policy control to asymmetric traffic: Considerations and solutions. https:\/\/www.sandvine.com\/downloads\/general\/whitepapers\/applying-network-policy-control-to-asymmetric-traffic.pdf.  Sandvine. White paper: Applying network policy control to asymmetric traffic: Considerations and solutions. https:\/\/www.sandvine.com\/downloads\/general\/whitepapers\/applying-network-policy-control-to-asymmetric-traffic.pdf."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382209"},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/www.torproject.org\/docs\/bridges. {Online","author":"Project The Tor","year":"2016","unstructured":"The Tor Project . Tor: Bridges . https:\/\/www.torproject.org\/docs\/bridges. {Online ; accessed 27- February - 2016 }. The Tor Project. Tor: Bridges. https:\/\/www.torproject.org\/docs\/bridges. {Online; accessed 27-February-2016}."},{"key":"e_1_3_2_1_20_1","volume-title":"September","author":"Project The Tor","year":"2009","unstructured":"The Tor Project . Torproject.org blocked by GFW in China : Sooner or later? https:\/\/blog.torproject.org\/blog\/tor-partially-blocked-china , September 2009 . {Online; accessed 27-February-2016}. The Tor Project. Torproject.org blocked by GFW in China: Sooner or later? https:\/\/blog.torproject.org\/blog\/tor-partially-blocked-china, September 2009. {Online; accessed 27-February-2016}."},{"key":"e_1_3_2_1_21_1","first-page":"143","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14","author":"Wang T.","year":"2014","unstructured":"T. Wang , X. Cai , R. Nithyanand , R. Johnson , and I. Goldberg . Effective attacks and provable defenses for website fingerprinting . In Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14 , pages 143 -- 157 , 2014 . T. Wang, X. Cai, R. Nithyanand, R. Johnson, and I. Goldberg. Effective attacks and provable defenses for website fingerprinting. In Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14, pages 143--157, 2014."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382211"},{"key":"e_1_3_2_1_23_1","volume-title":"2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI)","author":"Winter P.","year":"2012","unstructured":"P. Winter and S. Lindskog . How the Great Firewall of China is blocking Tor . In 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI) , 2012 . P. Winter and S. Lindskog. How the Great Firewall of China is blocking Tor. In 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517856"},{"key":"e_1_3_2_1_25_1","first-page":"159","volume-title":"23rd USENIX Security Symposium","author":"Wustrow E.","year":"2014","unstructured":"E. Wustrow , C. M. Swanson , and J. A. Halderman . Tapdance: End-to-middle anticensorship without flow blocking . In 23rd USENIX Security Symposium , pages 159 -- 174 , 2014 . E. Wustrow, C. M. Swanson, and J. A. Halderman. Tapdance: End-to-middle anticensorship without flow blocking. In 23rd USENIX Security Symposium, pages 159--174, 2014."},{"key":"e_1_3_2_1_26_1","volume-title":"20th USENIX Security Symposium","author":"Wustrow E.","year":"2011","unstructured":"E. Wustrow , S. Wolchok , I. Goldberg , and J. A. Halderman . Telex: Anticensorship in the network infrastructure . In 20th USENIX Security Symposium , 2011 . E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In 20th USENIX Security Symposium, 2011."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978312","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:17Z","timestamp":1750222577000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978312"}},"subtitle":["Perfectly Imitated Decoy Routing through Traffic Replacement"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":26,"alternative-id":["10.1145\/2976749.2978312","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978312","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}